:45.862438 46712 task_exit.go:204] [ 587: 591] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.862447 46712 task_signals.go:204] [ 587: 588] Signal 587, PID: 588, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.862455 46712 task_signals.go:204] [ 587: 590] Signal 587, PID: 590, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.862475 46712 task_exit.go:204] [ 587: 591] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.862491 46712 task_exit.go:204] [ 587: 591] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.862505 46712 task_exit.go:204] [ 587: 589] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.862513 46712 task_exit.go:204] [ 587: 589] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.862538 46712 task_exit.go:204] [ 587: 589] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.862550 46712 task_exit.go:204] [ 587: 590] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.862558 46712 task_exit.go:204] [ 587: 590] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.862572 46712 task_exit.go:204] [ 587: 590] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.862580 46712 task_exit.go:204] [ 587: 588] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.864079 46712 task_exit.go:204] [ 587: 588] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.864114 46712 task_exit.go:204] [ 587: 588] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.864126 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:45.864154 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:45.864161 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:45.864242 46712 task_exit.go:204] [ 587: 587] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.865366 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:45.869769 46712 syscalls.go:262] [ 592: 592] Allocating stack with size of 8388608 bytes D0712 20:27:45.869913 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:45.871057 46712 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:45.871112 46712 usertrap_amd64.go:106] [ 592: 592] Map a usertrap vma at 62000 D0712 20:27:45.871190 46712 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc000de8030 1 D0712 20:27:45.871212 46712 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:27:45.871660 46712 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:45.871681 46712 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc000de8030 2 D0712 20:27:45.871689 46712 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:27:45.872338 46712 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:45.872362 46712 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc000de8030 3 D0712 20:27:45.872369 46712 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:27:45.879121 46712 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:45.879155 46712 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc000de8030 4 D0712 20:27:45.879173 46712 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:27:45.880268 46712 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:45.880293 46712 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc000de8030 5 D0712 20:27:45.880304 46712 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:27:45.880362 46712 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46b214:sysno 13 D0712 20:27:45.880371 46712 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc000de8030 6 D0712 20:27:45.880377 46712 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:27:45.880899 46712 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:45.881013 46712 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc000de8030 7 D0712 20:27:45.881038 46712 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:27:45.881272 46712 usertrap_amd64.go:212] [ 592: 593] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:45.881307 46712 usertrap_amd64.go:122] [ 592: 593] Allocate a new trap: 0xc000de8030 8 D0712 20:27:45.881324 46712 usertrap_amd64.go:225] [ 592: 593] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:27:45.881613 46712 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:45.881643 46712 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc000de8030 9 D0712 20:27:45.881657 46712 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:27:45.881674 46712 usertrap_amd64.go:212] [ 592: 593] Found the pattern at ip 46af76:sysno 35 D0712 20:27:45.881681 46712 usertrap_amd64.go:122] [ 592: 593] Allocate a new trap: 0xc000de8030 10 D0712 20:27:45.881688 46712 usertrap_amd64.go:225] [ 592: 593] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:27:45.890939 46712 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46af29:sysno 293 D0712 20:27:45.890969 46712 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc000de8030 11 D0712 20:27:45.890980 46712 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:27:45.893429 46712 usertrap_amd64.go:212] [ 592: 593] Found the pattern at ip 46b020:sysno 39 D0712 20:27:45.893521 46712 usertrap_amd64.go:122] [ 592: 593] Allocate a new trap: 0xc000de8030 12 D0712 20:27:45.893539 46712 usertrap_amd64.go:225] [ 592: 593] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:27:45.893570 46712 usertrap_amd64.go:212] [ 592: 593] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:45.893582 46712 usertrap_amd64.go:122] [ 592: 593] Allocate a new trap: 0xc000de8030 13 D0712 20:27:45.893590 46712 usertrap_amd64.go:225] [ 592: 593] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:27:45.894466 46712 task_signals.go:470] [ 592: 592] Notified of signal 23 D0712 20:27:45.894553 46712 task_signals.go:220] [ 592: 592] Signal 23: delivering to handler D0712 20:27:45.902219 46712 usertrap_amd64.go:212] [ 592: 592] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:45.902244 46712 usertrap_amd64.go:122] [ 592: 592] Allocate a new trap: 0xc000de8030 14 D0712 20:27:45.902255 46712 usertrap_amd64.go:225] [ 592: 592] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:27:45.902325 46712 task_exit.go:204] [ 592: 592] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.902339 46712 task_exit.go:204] [ 592: 592] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.902367 46712 task_signals.go:204] [ 592: 595] Signal 592, PID: 595, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.902396 46712 task_exit.go:204] [ 592: 595] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.902406 46712 task_exit.go:204] [ 592: 595] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.902414 46712 task_exit.go:204] [ 592: 595] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.902396 46712 task_signals.go:204] [ 592: 594] Signal 592, PID: 594, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.902441 46712 task_exit.go:204] [ 592: 594] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.902440 46712 task_signals.go:204] [ 592: 596] Signal 592, PID: 596, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.902466 46712 task_signals.go:204] [ 592: 593] Signal 592, PID: 593, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.902477 46712 task_exit.go:204] [ 592: 594] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.902482 46712 task_exit.go:204] [ 592: 594] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.902495 46712 task_exit.go:204] [ 592: 596] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.902503 46712 task_exit.go:204] [ 592: 596] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.902510 46712 task_exit.go:204] [ 592: 596] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.902521 46712 task_exit.go:204] [ 592: 593] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.904036 46712 task_exit.go:204] [ 592: 593] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.904068 46712 task_exit.go:204] [ 592: 593] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.904082 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:45.904115 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:45.904134 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:45.904193 46712 task_exit.go:204] [ 592: 592] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.906160 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:45.907815 46712 syscalls.go:262] [ 597: 597] Allocating stack with size of 8388608 bytes D0712 20:27:45.907929 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:45.909340 46712 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:45.909393 46712 usertrap_amd64.go:106] [ 597: 597] Map a usertrap vma at 6a000 D0712 20:27:45.909538 46712 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc000de81b0 1 D0712 20:27:45.909565 46712 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:27:45.910007 46712 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:45.910036 46712 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc000de81b0 2 D0712 20:27:45.910046 46712 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:27:45.911072 46712 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:45.911128 46712 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc000de81b0 3 D0712 20:27:45.911153 46712 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:27:45.917726 46712 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:45.917758 46712 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc000de81b0 4 D0712 20:27:45.917773 46712 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:27:45.918953 46712 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:45.918990 46712 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc000de81b0 5 D0712 20:27:45.919003 46712 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:27:45.919041 46712 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46b214:sysno 13 D0712 20:27:45.919046 46712 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc000de81b0 6 D0712 20:27:45.919051 46712 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:27:45.919316 46712 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:45.919368 46712 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc000de81b0 7 D0712 20:27:45.919382 46712 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:27:45.919653 46712 usertrap_amd64.go:212] [ 597: 598] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:45.919682 46712 usertrap_amd64.go:122] [ 597: 598] Allocate a new trap: 0xc000de81b0 8 D0712 20:27:45.919694 46712 usertrap_amd64.go:225] [ 597: 598] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:27:45.919826 46712 usertrap_amd64.go:212] [ 597: 598] Found the pattern at ip 46af76:sysno 35 D0712 20:27:45.919848 46712 usertrap_amd64.go:122] [ 597: 598] Allocate a new trap: 0xc000de81b0 9 D0712 20:27:45.919858 46712 usertrap_amd64.go:225] [ 597: 598] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:27:45.919983 46712 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:45.920012 46712 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc000de81b0 10 D0712 20:27:45.920025 46712 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:27:45.927619 46712 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46af29:sysno 293 D0712 20:27:45.927649 46712 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc000de81b0 11 D0712 20:27:45.927659 46712 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:27:45.930299 46712 usertrap_amd64.go:212] [ 597: 598] Found the pattern at ip 46b020:sysno 39 D0712 20:27:45.930318 46712 usertrap_amd64.go:122] [ 597: 598] Allocate a new trap: 0xc000de81b0 12 D0712 20:27:45.930332 46712 usertrap_amd64.go:225] [ 597: 598] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:27:45.930430 46712 usertrap_amd64.go:212] [ 597: 598] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:45.930497 46712 usertrap_amd64.go:122] [ 597: 598] Allocate a new trap: 0xc000de81b0 13 D0712 20:27:45.930513 46712 usertrap_amd64.go:225] [ 597: 598] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:27:45.930604 46712 task_signals.go:470] [ 597: 597] Notified of signal 23 D0712 20:27:45.930704 46712 task_signals.go:220] [ 597: 597] Signal 23: delivering to handler I0712 20:27:45.938976 46712 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0712 20:27:45.939063 46712 usertrap_amd64.go:212] [ 597: 597] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:45.939089 46712 usertrap_amd64.go:122] [ 597: 597] Allocate a new trap: 0xc000de81b0 14 D0712 20:27:45.939106 46712 usertrap_amd64.go:225] [ 597: 597] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:27:45.939161 46712 task_exit.go:204] [ 597: 597] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.939201 46712 task_exit.go:204] [ 597: 597] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.939228 46712 task_signals.go:204] [ 597: 598] Signal 597, PID: 598, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.939240 46712 task_exit.go:204] [ 597: 598] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.939245 46712 task_exit.go:204] [ 597: 598] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.939249 46712 task_exit.go:204] [ 597: 598] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.939284 46712 task_signals.go:204] [ 597: 599] Signal 597, PID: 599, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.939293 46712 task_exit.go:204] [ 597: 599] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.939299 46712 task_exit.go:204] [ 597: 599] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.939303 46712 task_exit.go:204] [ 597: 599] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.939316 46712 task_signals.go:204] [ 597: 600] Signal 597, PID: 600, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.939337 46712 task_exit.go:204] [ 597: 600] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.939343 46712 task_exit.go:204] [ 597: 600] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.939349 46712 task_exit.go:204] [ 597: 600] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.939361 46712 task_signals.go:204] [ 597: 601] Signal 597, PID: 601, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.939368 46712 task_exit.go:204] [ 597: 601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.940913 46712 task_exit.go:204] [ 597: 601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.940984 46712 task_exit.go:204] [ 597: 601] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.941006 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:45.941049 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:45.941087 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:45.941238 46712 task_exit.go:204] [ 597: 597] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.941421 46712 task_signals.go:470] [ 6: 21] Notified of signal 23 D0712 20:27:45.941521 46712 task_signals.go:220] [ 6: 21] Signal 23: delivering to handler D0712 20:27:45.942197 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:45.944075 46712 syscalls.go:262] [ 602: 602] Allocating stack with size of 8388608 bytes D0712 20:27:45.944438 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:45.945896 46712 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:45.945940 46712 usertrap_amd64.go:106] [ 602: 602] Map a usertrap vma at 6a000 D0712 20:27:45.946051 46712 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc0007f0300 1 D0712 20:27:45.946078 46712 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:27:45.946582 46712 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:45.946599 46712 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc0007f0300 2 D0712 20:27:45.946606 46712 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:27:45.947385 46712 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:45.947409 46712 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc0007f0300 3 D0712 20:27:45.947424 46712 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:27:45.954106 46712 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:45.954136 46712 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc0007f0300 4 D0712 20:27:45.954148 46712 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:27:45.955295 46712 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:45.955320 46712 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc0007f0300 5 D0712 20:27:45.955356 46712 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:27:45.955425 46712 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b214:sysno 13 D0712 20:27:45.955478 46712 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc0007f0300 6 D0712 20:27:45.955488 46712 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:27:45.956046 46712 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:45.956070 46712 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc0007f0300 7 D0712 20:27:45.956080 46712 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:27:45.956255 46712 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:45.956273 46712 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc0007f0300 8 D0712 20:27:45.956279 46712 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:27:45.956334 46712 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46af76:sysno 35 D0712 20:27:45.956357 46712 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc0007f0300 9 D0712 20:27:45.956367 46712 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:27:45.956483 46712 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:45.956514 46712 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc0007f0300 10 D0712 20:27:45.956530 46712 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:27:45.964404 46712 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46af29:sysno 293 D0712 20:27:45.964442 46712 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc0007f0300 11 D0712 20:27:45.964454 46712 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:27:45.967052 46712 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46b020:sysno 39 D0712 20:27:45.967087 46712 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc0007f0300 12 D0712 20:27:45.967102 46712 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:27:45.967174 46712 usertrap_amd64.go:212] [ 602: 603] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:45.967193 46712 usertrap_amd64.go:122] [ 602: 603] Allocate a new trap: 0xc0007f0300 13 D0712 20:27:45.967207 46712 usertrap_amd64.go:225] [ 602: 603] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:27:45.967272 46712 task_signals.go:470] [ 602: 602] Notified of signal 23 D0712 20:27:45.967386 46712 task_signals.go:220] [ 602: 602] Signal 23: delivering to handler I0712 20:27:45.975048 46712 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0712 20:27:45.975184 46712 usertrap_amd64.go:212] [ 602: 602] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:45.975219 46712 usertrap_amd64.go:122] [ 602: 602] Allocate a new trap: 0xc0007f0300 14 D0712 20:27:45.975238 46712 usertrap_amd64.go:225] [ 602: 602] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:27:45.975322 46712 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.975365 46712 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.975401 46712 task_signals.go:204] [ 602: 606] Signal 602, PID: 606, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.975412 46712 task_signals.go:204] [ 602: 604] Signal 602, PID: 604, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.975431 46712 task_exit.go:204] [ 602: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.975427 46712 task_signals.go:204] [ 602: 605] Signal 602, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.975467 46712 task_signals.go:204] [ 602: 603] Signal 602, PID: 603, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:45.975492 46712 task_exit.go:204] [ 602: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.975523 46712 task_exit.go:204] [ 602: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.975541 46712 task_exit.go:204] [ 602: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.975550 46712 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.975586 46712 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.975601 46712 task_exit.go:204] [ 602: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.975621 46712 task_exit.go:204] [ 602: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:45.975645 46712 task_exit.go:204] [ 602: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.975652 46712 task_exit.go:204] [ 602: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.977042 46712 task_exit.go:204] [ 602: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:45.977076 46712 task_exit.go:204] [ 602: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.977098 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:45.977179 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:45.977192 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:45.977437 46712 task_exit.go:204] [ 602: 602] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:45.978162 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:45.980247 46712 syscalls.go:262] [ 607: 607] Allocating stack with size of 8388608 bytes D0712 20:27:45.980710 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:45.981978 46712 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:45.982006 46712 usertrap_amd64.go:106] [ 607: 607] Map a usertrap vma at 66000 D0712 20:27:45.982112 46712 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0007f06f0 1 D0712 20:27:45.982144 46712 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:45.982464 46712 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:45.982490 46712 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0007f06f0 2 D0712 20:27:45.982501 46712 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:45.983017 46712 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:45.983036 46712 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0007f06f0 3 D0712 20:27:45.983044 46712 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:45.988309 46712 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:45.988332 46712 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0007f06f0 4 D0712 20:27:45.988339 46712 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:45.989404 46712 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:45.989432 46712 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0007f06f0 5 D0712 20:27:45.989442 46712 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:45.989519 46712 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b214:sysno 13 D0712 20:27:45.989530 46712 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0007f06f0 6 D0712 20:27:45.989539 46712 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:45.989912 46712 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:45.989930 46712 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0007f06f0 7 D0712 20:27:45.989935 46712 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:45.990081 46712 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:45.990097 46712 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc0007f06f0 8 D0712 20:27:45.990103 46712 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:45.990277 46712 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46af76:sysno 35 D0712 20:27:45.990309 46712 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc0007f06f0 9 D0712 20:27:45.990326 46712 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:45.990343 46712 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:45.990350 46712 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0007f06f0 10 D0712 20:27:45.990360 46712 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:45.997964 46712 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46af29:sysno 293 D0712 20:27:45.997995 46712 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0007f06f0 11 D0712 20:27:45.998004 46712 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:46.001526 46712 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.001552 46712 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc0007f06f0 12 D0712 20:27:46.001562 46712 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:46.001577 46712 usertrap_amd64.go:212] [ 607: 608] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.001582 46712 usertrap_amd64.go:122] [ 607: 608] Allocate a new trap: 0xc0007f06f0 13 D0712 20:27:46.001587 46712 usertrap_amd64.go:225] [ 607: 608] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:46.001608 46712 task_signals.go:470] [ 607: 607] Notified of signal 23 D0712 20:27:46.001711 46712 task_signals.go:220] [ 607: 607] Signal 23: delivering to handler I0712 20:27:46.008426 46712 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0712 20:27:46.008525 46712 usertrap_amd64.go:212] [ 607: 607] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.008537 46712 usertrap_amd64.go:122] [ 607: 607] Allocate a new trap: 0xc0007f06f0 14 D0712 20:27:46.008549 46712 usertrap_amd64.go:225] [ 607: 607] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:46.009090 46712 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.009121 46712 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.009148 46712 task_signals.go:204] [ 607: 610] Signal 607, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.009164 46712 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.009172 46712 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.009179 46712 task_exit.go:204] [ 607: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.009160 46712 task_signals.go:204] [ 607: 609] Signal 607, PID: 609, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.009203 46712 task_signals.go:204] [ 607: 611] Signal 607, PID: 611, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.009218 46712 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.009227 46712 task_signals.go:204] [ 607: 608] Signal 607, PID: 608, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.009250 46712 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.009265 46712 task_exit.go:204] [ 607: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.009280 46712 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.009297 46712 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.009301 46712 task_exit.go:204] [ 607: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.009308 46712 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.010806 46712 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.010838 46712 task_exit.go:204] [ 607: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.010850 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.010883 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.010911 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.011056 46712 task_exit.go:204] [ 607: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.011873 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.013338 46712 syscalls.go:262] [ 612: 612] Allocating stack with size of 8388608 bytes D0712 20:27:46.013524 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.015749 46712 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.015805 46712 usertrap_amd64.go:106] [ 612: 612] Map a usertrap vma at 65000 D0712 20:27:46.015937 46712 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000e70420 1 D0712 20:27:46.015973 46712 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:27:46.016409 46712 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.016437 46712 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000e70420 2 D0712 20:27:46.016455 46712 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:27:46.017252 46712 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.017275 46712 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000e70420 3 D0712 20:27:46.017288 46712 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:27:46.023904 46712 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.023941 46712 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000e70420 4 D0712 20:27:46.023956 46712 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:27:46.025251 46712 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.025279 46712 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000e70420 5 D0712 20:27:46.025291 46712 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:27:46.025358 46712 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.025379 46712 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000e70420 6 D0712 20:27:46.025387 46712 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:27:46.026025 46712 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.026035 46712 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000e70420 7 D0712 20:27:46.026042 46712 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:27:46.026222 46712 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.026246 46712 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc000e70420 8 D0712 20:27:46.026258 46712 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:27:46.026501 46712 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.026527 46712 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000e70420 9 D0712 20:27:46.026540 46712 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:27:46.026570 46712 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.026578 46712 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc000e70420 10 D0712 20:27:46.026586 46712 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:27:46.033701 46712 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.033727 46712 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000e70420 11 D0712 20:27:46.033739 46712 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:27:46.037056 46712 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.037088 46712 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc000e70420 12 D0712 20:27:46.037101 46712 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:27:46.037186 46712 usertrap_amd64.go:212] [ 612: 613] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.037206 46712 usertrap_amd64.go:122] [ 612: 613] Allocate a new trap: 0xc000e70420 13 D0712 20:27:46.037214 46712 usertrap_amd64.go:225] [ 612: 613] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:27:46.037303 46712 task_signals.go:470] [ 612: 612] Notified of signal 23 D0712 20:27:46.037438 46712 task_signals.go:220] [ 612: 612] Signal 23: delivering to handler I0712 20:27:46.045643 46712 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0712 20:27:46.045771 46712 usertrap_amd64.go:212] [ 612: 612] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.045796 46712 usertrap_amd64.go:122] [ 612: 612] Allocate a new trap: 0xc000e70420 14 D0712 20:27:46.045823 46712 usertrap_amd64.go:225] [ 612: 612] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:27:46.045913 46712 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.045956 46712 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.045960 46712 task_signals.go:204] [ 612: 613] Signal 612, PID: 613, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.045990 46712 task_signals.go:204] [ 612: 616] Signal 612, PID: 616, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.045986 46712 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.045988 46712 task_signals.go:204] [ 612: 615] Signal 612, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.046001 46712 task_exit.go:204] [ 612: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.046034 46712 task_exit.go:204] [ 612: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.046046 46712 task_exit.go:204] [ 612: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.046064 46712 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.046061 46712 task_signals.go:204] [ 612: 614] Signal 612, PID: 614, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.046078 46712 task_exit.go:204] [ 612: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.046101 46712 task_exit.go:204] [ 612: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.046138 46712 task_exit.go:204] [ 612: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.046154 46712 task_exit.go:204] [ 612: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.046167 46712 task_exit.go:204] [ 612: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.047676 46712 task_exit.go:204] [ 612: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.047705 46712 task_exit.go:204] [ 612: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.047728 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.047763 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.047774 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.047938 46712 task_exit.go:204] [ 612: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.048490 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.048609 46712 task_signals.go:481] [ 6: 8] No task notified of signal 23 D0712 20:27:46.050450 46712 syscalls.go:262] [ 617: 617] Allocating stack with size of 8388608 bytes D0712 20:27:46.050603 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.050663 46712 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0712 20:27:46.052869 46712 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.052913 46712 usertrap_amd64.go:106] [ 617: 617] Map a usertrap vma at 69000 D0712 20:27:46.053184 46712 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000de8db0 1 D0712 20:27:46.053235 46712 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:27:46.054021 46712 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.054061 46712 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000de8db0 2 D0712 20:27:46.054081 46712 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:27:46.055932 46712 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.055969 46712 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000de8db0 3 D0712 20:27:46.055987 46712 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:27:46.064617 46712 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.064664 46712 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000de8db0 4 D0712 20:27:46.064692 46712 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:27:46.066322 46712 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.066363 46712 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000de8db0 5 D0712 20:27:46.066380 46712 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:27:46.066449 46712 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.066475 46712 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000de8db0 6 D0712 20:27:46.066484 46712 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:27:46.066982 46712 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.067019 46712 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000de8db0 7 D0712 20:27:46.067032 46712 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:27:46.067297 46712 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.067328 46712 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc000de8db0 8 D0712 20:27:46.067339 46712 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:27:46.067659 46712 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.067682 46712 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc000de8db0 9 D0712 20:27:46.067691 46712 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:27:46.067715 46712 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.067766 46712 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000de8db0 10 D0712 20:27:46.067787 46712 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:27:46.068369 46712 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.068408 46712 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc000de8db0 11 D0712 20:27:46.068421 46712 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:27:46.068478 46712 usertrap_amd64.go:212] [ 617: 618] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.068491 46712 usertrap_amd64.go:122] [ 617: 618] Allocate a new trap: 0xc000de8db0 12 D0712 20:27:46.068497 46712 usertrap_amd64.go:225] [ 617: 618] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:27:46.068548 46712 task_signals.go:470] [ 617: 617] Notified of signal 23 D0712 20:27:46.068636 46712 task_signals.go:220] [ 617: 617] Signal 23: delivering to handler D0712 20:27:46.077285 46712 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.077320 46712 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000de8db0 13 D0712 20:27:46.077331 46712 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:27:46.080264 46712 task_signals.go:470] [ 617: 617] Notified of signal 23 D0712 20:27:46.080337 46712 task_signals.go:220] [ 617: 617] Signal 23: delivering to handler I0712 20:27:46.089108 46712 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0712 20:27:46.089237 46712 usertrap_amd64.go:212] [ 617: 617] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.089253 46712 usertrap_amd64.go:122] [ 617: 617] Allocate a new trap: 0xc000de8db0 14 D0712 20:27:46.089269 46712 usertrap_amd64.go:225] [ 617: 617] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:27:46.089380 46712 task_exit.go:204] [ 617: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.089425 46712 task_exit.go:204] [ 617: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.089455 46712 task_signals.go:204] [ 617: 619] Signal 617, PID: 619, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.089478 46712 task_signals.go:204] [ 617: 618] Signal 617, PID: 618, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.089490 46712 task_exit.go:204] [ 617: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.089515 46712 task_signals.go:204] [ 617: 621] Signal 617, PID: 621, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.089558 46712 task_signals.go:204] [ 617: 620] Signal 617, PID: 620, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.089597 46712 task_exit.go:204] [ 617: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.089608 46712 task_exit.go:204] [ 617: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.089649 46712 task_exit.go:204] [ 617: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.089699 46712 task_exit.go:204] [ 617: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.089708 46712 task_exit.go:204] [ 617: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.089725 46712 task_exit.go:204] [ 617: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.089742 46712 task_exit.go:204] [ 617: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.089759 46712 task_exit.go:204] [ 617: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.089772 46712 task_exit.go:204] [ 617: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.091444 46712 task_exit.go:204] [ 617: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.091478 46712 task_exit.go:204] [ 617: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.091493 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.091712 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.091750 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.091950 46712 task_exit.go:204] [ 617: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.092837 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.094553 46712 syscalls.go:262] [ 622: 622] Allocating stack with size of 8388608 bytes D0712 20:27:46.094642 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.095985 46712 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.096062 46712 usertrap_amd64.go:106] [ 622: 622] Map a usertrap vma at 6a000 D0712 20:27:46.096174 46712 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc000e70990 1 D0712 20:27:46.096240 46712 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:27:46.096772 46712 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.096805 46712 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc000e70990 2 D0712 20:27:46.096818 46712 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:27:46.097746 46712 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.097778 46712 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc000e70990 3 D0712 20:27:46.097792 46712 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:27:46.104698 46712 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.104738 46712 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc000e70990 4 D0712 20:27:46.104755 46712 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:27:46.106711 46712 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.106801 46712 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc000e70990 5 D0712 20:27:46.106828 46712 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:27:46.106903 46712 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.106928 46712 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc000e70990 6 D0712 20:27:46.106956 46712 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:27:46.107571 46712 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.107606 46712 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc000e70990 7 D0712 20:27:46.107619 46712 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:27:46.108017 46712 usertrap_amd64.go:212] [ 622: 623] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.108051 46712 usertrap_amd64.go:122] [ 622: 623] Allocate a new trap: 0xc000e70990 8 D0712 20:27:46.108064 46712 usertrap_amd64.go:225] [ 622: 623] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:27:46.108290 46712 usertrap_amd64.go:212] [ 622: 623] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.108318 46712 usertrap_amd64.go:122] [ 622: 623] Allocate a new trap: 0xc000e70990 9 D0712 20:27:46.108329 46712 usertrap_amd64.go:225] [ 622: 623] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:27:46.108587 46712 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.108627 46712 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc000e70990 10 D0712 20:27:46.108669 46712 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:27:46.117779 46712 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.117819 46712 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc000e70990 11 D0712 20:27:46.117839 46712 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:27:46.120480 46712 usertrap_amd64.go:212] [ 622: 623] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.120500 46712 usertrap_amd64.go:122] [ 622: 623] Allocate a new trap: 0xc000e70990 12 D0712 20:27:46.120513 46712 usertrap_amd64.go:225] [ 622: 623] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:27:46.120599 46712 usertrap_amd64.go:212] [ 622: 623] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.120677 46712 usertrap_amd64.go:122] [ 622: 623] Allocate a new trap: 0xc000e70990 13 D0712 20:27:46.120701 46712 usertrap_amd64.go:225] [ 622: 623] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:27:46.120752 46712 task_signals.go:470] [ 622: 622] Notified of signal 23 D0712 20:27:46.120852 46712 task_signals.go:220] [ 622: 622] Signal 23: delivering to handler I0712 20:27:46.130577 46712 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0712 20:27:46.130719 46712 usertrap_amd64.go:212] [ 622: 622] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.130737 46712 usertrap_amd64.go:122] [ 622: 622] Allocate a new trap: 0xc000e70990 14 D0712 20:27:46.130751 46712 usertrap_amd64.go:225] [ 622: 622] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:27:46.130834 46712 task_exit.go:204] [ 622: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.130858 46712 task_exit.go:204] [ 622: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.130875 46712 task_signals.go:204] [ 622: 624] Signal 622, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.130912 46712 task_signals.go:204] [ 622: 626] Signal 622, PID: 626, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.130889 46712 task_signals.go:204] [ 622: 625] Signal 622, PID: 625, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.130914 46712 task_exit.go:204] [ 622: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.130916 46712 task_signals.go:204] [ 622: 623] Signal 622, PID: 623, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.130934 46712 task_exit.go:204] [ 622: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.130962 46712 task_exit.go:204] [ 622: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.131000 46712 task_exit.go:204] [ 622: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.131026 46712 task_exit.go:204] [ 622: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.131038 46712 task_exit.go:204] [ 622: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.131060 46712 task_exit.go:204] [ 622: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.131071 46712 task_exit.go:204] [ 622: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.131084 46712 task_exit.go:204] [ 622: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.131094 46712 task_exit.go:204] [ 622: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.132614 46712 task_exit.go:204] [ 622: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.132653 46712 task_exit.go:204] [ 622: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.132671 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.132707 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.132726 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.132815 46712 task_exit.go:204] [ 622: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.133503 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.135285 46712 syscalls.go:262] [ 627: 627] Allocating stack with size of 8388608 bytes D0712 20:27:46.135591 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.137196 46712 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.137252 46712 usertrap_amd64.go:106] [ 627: 627] Map a usertrap vma at 64000 D0712 20:27:46.137361 46712 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000541140 1 D0712 20:27:46.137406 46712 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:27:46.138211 46712 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.138245 46712 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000541140 2 D0712 20:27:46.138257 46712 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:27:46.138907 46712 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.138937 46712 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000541140 3 D0712 20:27:46.138979 46712 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:27:46.144381 46712 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.144412 46712 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000541140 4 D0712 20:27:46.144425 46712 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:27:46.145791 46712 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.145820 46712 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000541140 5 D0712 20:27:46.145834 46712 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:27:46.145959 46712 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.145979 46712 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000541140 6 D0712 20:27:46.145988 46712 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:27:46.146319 46712 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.146339 46712 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000541140 7 D0712 20:27:46.146347 46712 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:27:46.146554 46712 usertrap_amd64.go:212] [ 627: 628] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.146576 46712 usertrap_amd64.go:122] [ 627: 628] Allocate a new trap: 0xc000541140 8 D0712 20:27:46.146594 46712 usertrap_amd64.go:225] [ 627: 628] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:27:46.146859 46712 usertrap_amd64.go:212] [ 627: 628] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.146896 46712 usertrap_amd64.go:122] [ 627: 628] Allocate a new trap: 0xc000541140 9 D0712 20:27:46.146914 46712 usertrap_amd64.go:225] [ 627: 628] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:27:46.147051 46712 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.147074 46712 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000541140 10 D0712 20:27:46.147086 46712 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:27:46.147185 46712 usertrap_amd64.go:212] [ 627: 630] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:46.147212 46712 usertrap_amd64.go:122] [ 627: 630] Allocate a new trap: 0xc000541140 11 D0712 20:27:46.147225 46712 usertrap_amd64.go:225] [ 627: 630] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:27:46.154890 46712 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.154920 46712 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000541140 12 D0712 20:27:46.154934 46712 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:27:46.157472 46712 usertrap_amd64.go:212] [ 627: 628] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.157504 46712 usertrap_amd64.go:122] [ 627: 628] Allocate a new trap: 0xc000541140 13 D0712 20:27:46.157520 46712 usertrap_amd64.go:225] [ 627: 628] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:27:46.157554 46712 usertrap_amd64.go:212] [ 627: 628] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.157571 46712 usertrap_amd64.go:122] [ 627: 628] Allocate a new trap: 0xc000541140 14 D0712 20:27:46.157579 46712 usertrap_amd64.go:225] [ 627: 628] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:27:46.157594 46712 task_signals.go:470] [ 627: 627] Notified of signal 23 D0712 20:27:46.157696 46712 task_signals.go:220] [ 627: 627] Signal 23: delivering to handler D0712 20:27:46.164920 46712 usertrap_amd64.go:212] [ 627: 627] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.164992 46712 usertrap_amd64.go:122] [ 627: 627] Allocate a new trap: 0xc000541140 15 D0712 20:27:46.165010 46712 usertrap_amd64.go:225] [ 627: 627] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0712 20:27:46.165045 46712 task_exit.go:204] [ 627: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.165125 46712 task_signals.go:204] [ 627: 628] Signal 627, PID: 628, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.165151 46712 task_signals.go:204] [ 627: 629] Signal 627, PID: 629, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.165156 46712 task_signals.go:204] [ 627: 630] Signal 627, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.165178 46712 task_signals.go:204] [ 627: 631] Signal 627, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.165202 46712 task_exit.go:204] [ 627: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.165221 46712 task_exit.go:204] [ 627: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.165233 46712 task_exit.go:204] [ 627: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.165240 46712 task_exit.go:204] [ 627: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.165252 46712 task_exit.go:204] [ 627: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.165281 46712 task_exit.go:204] [ 627: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.165287 46712 task_exit.go:204] [ 627: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.165295 46712 task_exit.go:204] [ 627: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.165303 46712 task_exit.go:204] [ 627: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.165308 46712 task_exit.go:204] [ 627: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.165317 46712 task_exit.go:204] [ 627: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.166466 46712 task_exit.go:204] [ 627: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.166502 46712 task_exit.go:204] [ 627: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.166517 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.166549 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.166577 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.166636 46712 task_exit.go:204] [ 627: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.166758 46712 task_signals.go:470] [ 6: 8] Notified of signal 23 D0712 20:27:46.166848 46712 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0712 20:27:46.167512 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.168790 46712 syscalls.go:262] [ 632: 632] Allocating stack with size of 8388608 bytes D0712 20:27:46.168897 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.170279 46712 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.170356 46712 usertrap_amd64.go:106] [ 632: 632] Map a usertrap vma at 69000 D0712 20:27:46.170455 46712 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc000de99e0 1 D0712 20:27:46.170490 46712 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:27:46.170962 46712 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.171002 46712 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc000de99e0 2 D0712 20:27:46.171021 46712 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:27:46.171945 46712 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.172007 46712 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc000de99e0 3 D0712 20:27:46.172026 46712 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:27:46.179184 46712 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.179222 46712 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc000de99e0 4 D0712 20:27:46.179238 46712 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:27:46.180623 46712 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.180666 46712 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc000de99e0 5 D0712 20:27:46.180681 46712 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:27:46.180738 46712 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.180745 46712 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc000de99e0 6 D0712 20:27:46.180771 46712 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:27:46.181082 46712 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.181104 46712 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc000de99e0 7 D0712 20:27:46.181113 46712 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:27:46.181305 46712 usertrap_amd64.go:212] [ 632: 633] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.181328 46712 usertrap_amd64.go:122] [ 632: 633] Allocate a new trap: 0xc000de99e0 8 D0712 20:27:46.181343 46712 usertrap_amd64.go:225] [ 632: 633] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:27:46.181533 46712 usertrap_amd64.go:212] [ 632: 633] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.181555 46712 usertrap_amd64.go:122] [ 632: 633] Allocate a new trap: 0xc000de99e0 9 D0712 20:27:46.181564 46712 usertrap_amd64.go:225] [ 632: 633] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:27:46.181655 46712 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.181689 46712 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc000de99e0 10 D0712 20:27:46.181707 46712 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:27:46.182059 46712 usertrap_amd64.go:212] [ 632: 635] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:46.182127 46712 usertrap_amd64.go:122] [ 632: 635] Allocate a new trap: 0xc000de99e0 11 D0712 20:27:46.182179 46712 usertrap_amd64.go:225] [ 632: 635] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:27:46.189803 46712 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.189838 46712 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc000de99e0 12 D0712 20:27:46.189851 46712 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46af29 trap addr 693c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:27:46.192842 46712 usertrap_amd64.go:212] [ 632: 633] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.192884 46712 usertrap_amd64.go:122] [ 632: 633] Allocate a new trap: 0xc000de99e0 13 D0712 20:27:46.192901 46712 usertrap_amd64.go:225] [ 632: 633] Apply the binary patch addr 46b020 trap addr 69410 ([184 39 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:27:46.192988 46712 usertrap_amd64.go:212] [ 632: 633] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.193019 46712 usertrap_amd64.go:122] [ 632: 633] Allocate a new trap: 0xc000de99e0 14 D0712 20:27:46.193034 46712 usertrap_amd64.go:225] [ 632: 633] Apply the binary patch addr 46b04f trap addr 69460 ([184 234 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:27:46.193131 46712 task_signals.go:470] [ 632: 632] Notified of signal 23 D0712 20:27:46.193239 46712 task_signals.go:220] [ 632: 632] Signal 23: delivering to handler I0712 20:27:46.200929 46712 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0712 20:27:46.201059 46712 usertrap_amd64.go:212] [ 632: 632] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.201073 46712 usertrap_amd64.go:122] [ 632: 632] Allocate a new trap: 0xc000de99e0 15 D0712 20:27:46.201094 46712 usertrap_amd64.go:225] [ 632: 632] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0712 20:27:46.201258 46712 task_exit.go:204] [ 632: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.201357 46712 task_exit.go:204] [ 632: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.201458 46712 task_signals.go:204] [ 632: 633] Signal 632, PID: 633, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.201486 46712 task_exit.go:204] [ 632: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.201506 46712 task_exit.go:204] [ 632: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.201513 46712 task_exit.go:204] [ 632: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.201491 46712 task_signals.go:204] [ 632: 634] Signal 632, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.201563 46712 task_signals.go:204] [ 632: 636] Signal 632, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.201591 46712 task_exit.go:204] [ 632: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.201532 46712 task_signals.go:204] [ 632: 635] Signal 632, PID: 635, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.201609 46712 task_exit.go:204] [ 632: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.201616 46712 task_exit.go:204] [ 632: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.201548 46712 task_signals.go:204] [ 632: 637] Signal 632, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.201629 46712 task_exit.go:204] [ 632: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.201673 46712 task_exit.go:204] [ 632: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.201729 46712 task_exit.go:204] [ 632: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.201750 46712 task_exit.go:204] [ 632: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.201840 46712 task_exit.go:204] [ 632: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.201849 46712 task_exit.go:204] [ 632: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.201872 46712 task_exit.go:204] [ 632: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.203446 46712 task_exit.go:204] [ 632: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.203488 46712 task_exit.go:204] [ 632: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.203510 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.203560 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.203593 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.203874 46712 task_exit.go:204] [ 632: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.204782 46712 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.206370 46712 syscalls.go:262] [ 638: 638] Allocating stack with size of 8388608 bytes D0712 20:27:46.206513 46712 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.207847 46712 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.207890 46712 usertrap_amd64.go:106] [ 638: 638] Map a usertrap vma at 66000 D0712 20:27:46.207999 46712 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc000e70c90 1 D0712 20:27:46.208020 46712 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:46.208531 46712 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.208556 46712 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc000e70c90 2 D0712 20:27:46.208566 46712 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:46.209362 46712 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.209402 46712 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc000e70c90 3 D0712 20:27:46.209422 46712 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:46.217291 46712 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.217338 46712 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc000e70c90 4 D0712 20:27:46.217358 46712 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:46.218929 46712 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.218972 46712 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc000e70c90 5 D0712 20:27:46.218989 46712 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:46.219069 46712 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.219100 46712 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc000e70c90 6 D0712 20:27:46.219109 46712 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:46.219602 46712 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.219631 46712 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc000e70c90 7 D0712 20:27:46.219639 46712 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:46.219915 46712 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.219940 46712 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc000e70c90 8 D0712 20:27:46.219950 46712 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:46.220277 46712 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.220304 46712 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc000e70c90 9 D0712 20:27:46.220315 46712 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:46.220325 46712 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.220332 46712 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc000e70c90 10 D0712 20:27:46.220340 46712 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:46.227524 46712 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.227556 46712 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc000e70c90 11 D0712 20:27:46.227567 46712 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:46.231405 46712 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.231448 46712 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc000e70c90 12 D0712 20:27:46.231460 46712 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:46.231514 46712 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.231534 46712 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc000e70c90 13 D0712 20:27:46.231560 46712 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:46.231703 46712 task_signals.go:470] [ 638: 638] Notified of signal 23 D0712 20:27:46.231754 46712 task_signals.go:179] [ 638: 638] Restarting syscall 202: interrupted by signal 23 D0712 20:27:46.231769 46712 task_signals.go:220] [ 638: 638] Signal 23: delivering to handler I0712 20:27:46.238041 46712 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0712 20:27:46.238195 46712 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:46.238221 46712 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc000e70c90 14 D0712 20:27:46.238251 46712 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b6e0 trap addr 66460 ([184 24 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:46.238285 46712 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.238302 46712 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc000e70c90 15 D0712 20:27:46.238319 46712 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0712 20:27:46.238409 46712 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.238454 46712 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.238489 46712 task_signals.go:204] [ 638: 639] Signal 638, PID: 639, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.238496 46712 task_signals.go:204] [ 638: 641] Signal 638, PID: 641, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.238507 46712 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.238525 46712 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.238544 46712 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.238568 46712 task_signals.go:204] [ 638: 640] Signal 638, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.238564 46712 task_signals.go:204] [ 638: 643] Signal 638, PID: 643, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.238607 46712 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.238619 46712 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.238624 46712 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.238639 46712 task_signals.go:204] [ 638: 642] Signal 638, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.238648 46712 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.238662 46712 task_exit.go:204] [ 638: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.238676 46712 task_exit.go:204] [ 638: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.238683 46712 task_exit.go:204] [ 638: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.238697 46712 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.238740 46712 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.238756 46712 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.240408 46712 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.240441 46712 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.240459 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.240549 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.240582 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.240694 46712 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.241555 46712 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.243099 46712 syscalls.go:262] [ 644: 644] Allocating stack with size of 8388608 bytes D0712 20:27:46.243321 46712 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.245502 46712 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.245544 46712 usertrap_amd64.go:106] [ 644: 644] Map a usertrap vma at 69000 D0712 20:27:46.245625 46712 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc0007f0a50 1 D0712 20:27:46.245642 46712 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:27:46.245857 46712 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.245864 46712 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc0007f0a50 2 D0712 20:27:46.245870 46712 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:27:46.246475 46712 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.246502 46712 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc0007f0a50 3 D0712 20:27:46.246514 46712 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:27:46.253764 46712 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.253798 46712 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc0007f0a50 4 D0712 20:27:46.253811 46712 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:27:46.254861 46712 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.254891 46712 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc0007f0a50 5 D0712 20:27:46.254904 46712 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:27:46.254954 46712 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.254970 46712 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc0007f0a50 6 D0712 20:27:46.254978 46712 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:27:46.255193 46712 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.255222 46712 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc0007f0a50 7 D0712 20:27:46.255232 46712 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:27:46.255414 46712 usertrap_amd64.go:212] [ 644: 645] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.255432 46712 usertrap_amd64.go:122] [ 644: 645] Allocate a new trap: 0xc0007f0a50 8 D0712 20:27:46.255446 46712 usertrap_amd64.go:225] [ 644: 645] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:27:46.255669 46712 usertrap_amd64.go:212] [ 644: 645] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.255695 46712 usertrap_amd64.go:122] [ 644: 645] Allocate a new trap: 0xc0007f0a50 9 D0712 20:27:46.255703 46712 usertrap_amd64.go:225] [ 644: 645] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:27:46.255722 46712 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.255768 46712 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc0007f0a50 10 D0712 20:27:46.255783 46712 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:27:46.263409 46712 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.263443 46712 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc0007f0a50 11 D0712 20:27:46.263457 46712 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:27:46.266555 46712 usertrap_amd64.go:212] [ 644: 645] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.266640 46712 usertrap_amd64.go:122] [ 644: 645] Allocate a new trap: 0xc0007f0a50 12 D0712 20:27:46.266665 46712 usertrap_amd64.go:225] [ 644: 645] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:27:46.266735 46712 usertrap_amd64.go:212] [ 644: 645] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.266755 46712 usertrap_amd64.go:122] [ 644: 645] Allocate a new trap: 0xc0007f0a50 13 D0712 20:27:46.266766 46712 usertrap_amd64.go:225] [ 644: 645] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:27:46.267443 46712 task_signals.go:470] [ 644: 644] Notified of signal 23 D0712 20:27:46.267614 46712 task_signals.go:220] [ 644: 644] Signal 23: delivering to handler I0712 20:27:46.274879 46712 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0712 20:27:46.275040 46712 usertrap_amd64.go:212] [ 644: 644] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.275081 46712 usertrap_amd64.go:122] [ 644: 644] Allocate a new trap: 0xc0007f0a50 14 D0712 20:27:46.275098 46712 usertrap_amd64.go:225] [ 644: 644] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:27:46.275170 46712 task_exit.go:204] [ 644: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.275205 46712 task_exit.go:204] [ 644: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.275238 46712 task_signals.go:204] [ 644: 647] Signal 644, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.275301 46712 task_exit.go:204] [ 644: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.275287 46712 task_signals.go:204] [ 644: 645] Signal 644, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.275271 46712 task_signals.go:204] [ 644: 646] Signal 644, PID: 646, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.275312 46712 task_exit.go:204] [ 644: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.275348 46712 task_exit.go:204] [ 644: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.275386 46712 task_exit.go:204] [ 644: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.275385 46712 task_signals.go:204] [ 644: 648] Signal 644, PID: 648, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.275401 46712 task_exit.go:204] [ 644: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.275423 46712 task_exit.go:204] [ 644: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.275438 46712 task_exit.go:204] [ 644: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.275448 46712 task_exit.go:204] [ 644: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.275458 46712 task_exit.go:204] [ 644: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.275470 46712 task_exit.go:204] [ 644: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.276895 46712 task_exit.go:204] [ 644: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.276924 46712 task_exit.go:204] [ 644: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.276980 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.277013 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.277034 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.277081 46712 task_exit.go:204] [ 644: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.277860 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.279371 46712 syscalls.go:262] [ 649: 649] Allocating stack with size of 8388608 bytes D0712 20:27:46.279651 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.280824 46712 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.280865 46712 usertrap_amd64.go:106] [ 649: 649] Map a usertrap vma at 60000 D0712 20:27:46.281090 46712 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0005e3650 1 D0712 20:27:46.281136 46712 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:27:46.281710 46712 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.281738 46712 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0005e3650 2 D0712 20:27:46.281751 46712 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:27:46.282608 46712 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.282642 46712 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0005e3650 3 D0712 20:27:46.282663 46712 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:27:46.289310 46712 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.289366 46712 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0005e3650 4 D0712 20:27:46.289381 46712 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:27:46.290672 46712 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.290708 46712 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0005e3650 5 D0712 20:27:46.290726 46712 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:27:46.290851 46712 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.290870 46712 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0005e3650 6 D0712 20:27:46.290882 46712 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:27:46.291233 46712 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.291257 46712 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0005e3650 7 D0712 20:27:46.291284 46712 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:27:46.291510 46712 usertrap_amd64.go:212] [ 649: 650] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.291542 46712 usertrap_amd64.go:122] [ 649: 650] Allocate a new trap: 0xc0005e3650 8 D0712 20:27:46.291557 46712 usertrap_amd64.go:225] [ 649: 650] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:27:46.291677 46712 usertrap_amd64.go:212] [ 649: 650] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.291705 46712 usertrap_amd64.go:122] [ 649: 650] Allocate a new trap: 0xc0005e3650 9 D0712 20:27:46.291716 46712 usertrap_amd64.go:225] [ 649: 650] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:27:46.291843 46712 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.291858 46712 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0005e3650 10 D0712 20:27:46.291869 46712 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:27:46.292860 46712 usertrap_amd64.go:212] [ 649: 650] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.292894 46712 usertrap_amd64.go:122] [ 649: 650] Allocate a new trap: 0xc0005e3650 11 D0712 20:27:46.292909 46712 usertrap_amd64.go:225] [ 649: 650] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:27:46.293009 46712 usertrap_amd64.go:212] [ 649: 650] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.293021 46712 usertrap_amd64.go:122] [ 649: 650] Allocate a new trap: 0xc0005e3650 12 D0712 20:27:46.293050 46712 usertrap_amd64.go:225] [ 649: 650] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:27:46.293117 46712 task_signals.go:470] [ 649: 649] Notified of signal 23 D0712 20:27:46.293160 46712 task_signals.go:220] [ 649: 649] Signal 23: delivering to handler D0712 20:27:46.300985 46712 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.301016 46712 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0005e3650 13 D0712 20:27:46.301029 46712 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:27:46.305522 46712 task_signals.go:470] [ 649: 649] Notified of signal 23 D0712 20:27:46.305933 46712 task_signals.go:220] [ 649: 649] Signal 23: delivering to handler D0712 20:27:46.315543 46712 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.315604 46712 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0005e3650 14 D0712 20:27:46.315624 46712 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:27:46.315683 46712 task_exit.go:204] [ 649: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.315718 46712 task_exit.go:204] [ 649: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.315742 46712 task_signals.go:204] [ 649: 653] Signal 649, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.315765 46712 task_signals.go:204] [ 649: 650] Signal 649, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.315777 46712 task_exit.go:204] [ 649: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.315777 46712 task_signals.go:204] [ 649: 652] Signal 649, PID: 652, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.315800 46712 task_exit.go:204] [ 649: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.315816 46712 task_exit.go:204] [ 649: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.315736 46712 task_signals.go:204] [ 649: 651] Signal 649, PID: 651, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.315840 46712 task_exit.go:204] [ 649: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.315849 46712 task_exit.go:204] [ 649: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.315856 46712 task_exit.go:204] [ 649: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.315869 46712 task_exit.go:204] [ 649: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.315916 46712 task_exit.go:204] [ 649: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.315933 46712 task_exit.go:204] [ 649: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.315954 46712 task_exit.go:204] [ 649: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.317220 46712 task_exit.go:204] [ 649: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.317260 46712 task_exit.go:204] [ 649: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.317277 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.317314 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.317322 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.317393 46712 task_exit.go:204] [ 649: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.318299 46712 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.319999 46712 syscalls.go:262] [ 654: 654] Allocating stack with size of 8388608 bytes D0712 20:27:46.320106 46712 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.321523 46712 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.321572 46712 usertrap_amd64.go:106] [ 654: 654] Map a usertrap vma at 63000 D0712 20:27:46.321736 46712 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0008b0240 1 D0712 20:27:46.321771 46712 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:46.322333 46712 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.322366 46712 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0008b0240 2 D0712 20:27:46.322377 46712 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:46.323208 46712 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.323235 46712 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0008b0240 3 D0712 20:27:46.323247 46712 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:46.329885 46712 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.329927 46712 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0008b0240 4 D0712 20:27:46.329940 46712 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:46.331316 46712 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.331353 46712 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0008b0240 5 D0712 20:27:46.331366 46712 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:46.331441 46712 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.331452 46712 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0008b0240 6 D0712 20:27:46.331466 46712 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:46.331882 46712 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.331906 46712 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0008b0240 7 D0712 20:27:46.331915 46712 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:46.332122 46712 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.332145 46712 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0008b0240 8 D0712 20:27:46.332154 46712 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:46.332353 46712 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.332407 46712 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0008b0240 9 D0712 20:27:46.332425 46712 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:46.332580 46712 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.332612 46712 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0008b0240 10 D0712 20:27:46.332627 46712 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:46.340613 46712 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.340649 46712 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0008b0240 11 D0712 20:27:46.340662 46712 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:46.344106 46712 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.344214 46712 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0008b0240 12 D0712 20:27:46.344237 46712 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:46.344278 46712 usertrap_amd64.go:212] [ 654: 655] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.344310 46712 usertrap_amd64.go:122] [ 654: 655] Allocate a new trap: 0xc0008b0240 13 D0712 20:27:46.344327 46712 usertrap_amd64.go:225] [ 654: 655] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:46.344409 46712 task_signals.go:470] [ 654: 654] Notified of signal 23 D0712 20:27:46.344512 46712 task_signals.go:220] [ 654: 654] Signal 23: delivering to handler D0712 20:27:46.351690 46712 usertrap_amd64.go:212] [ 654: 654] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.351728 46712 usertrap_amd64.go:122] [ 654: 654] Allocate a new trap: 0xc0008b0240 14 D0712 20:27:46.351741 46712 usertrap_amd64.go:225] [ 654: 654] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:46.351832 46712 task_exit.go:204] [ 654: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.351863 46712 task_exit.go:204] [ 654: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.351886 46712 task_signals.go:204] [ 654: 656] Signal 654, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.351899 46712 task_signals.go:204] [ 654: 657] Signal 654, PID: 657, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.351925 46712 task_exit.go:204] [ 654: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.351943 46712 task_signals.go:204] [ 654: 658] Signal 654, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.351966 46712 task_signals.go:204] [ 654: 655] Signal 654, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.351994 46712 task_exit.go:204] [ 654: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.352002 46712 task_exit.go:204] [ 654: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.352031 46712 task_exit.go:204] [ 654: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.352119 46712 task_exit.go:204] [ 654: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.352141 46712 task_exit.go:204] [ 654: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.352165 46712 task_exit.go:204] [ 654: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.352177 46712 task_exit.go:204] [ 654: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.352194 46712 task_exit.go:204] [ 654: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.352209 46712 task_exit.go:204] [ 654: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.353708 46712 task_exit.go:204] [ 654: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.353783 46712 task_exit.go:204] [ 654: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.353808 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.355063 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.355114 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.355232 46712 task_exit.go:204] [ 654: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.355343 46712 task_signals.go:470] [ 6: 19] Notified of signal 23 D0712 20:27:46.355380 46712 task_signals.go:220] [ 6: 19] Signal 23: delivering to handler D0712 20:27:46.356107 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.358147 46712 syscalls.go:262] [ 659: 659] Allocating stack with size of 8388608 bytes D0712 20:27:46.358410 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.359874 46712 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.359948 46712 usertrap_amd64.go:106] [ 659: 659] Map a usertrap vma at 67000 D0712 20:27:46.360113 46712 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc000541f50 1 D0712 20:27:46.360163 46712 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:27:46.360815 46712 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.360874 46712 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc000541f50 2 D0712 20:27:46.360890 46712 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:27:46.361918 46712 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.361995 46712 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc000541f50 3 D0712 20:27:46.362024 46712 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:27:46.370106 46712 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.370142 46712 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc000541f50 4 D0712 20:27:46.370158 46712 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:27:46.372925 46712 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.372987 46712 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc000541f50 5 D0712 20:27:46.373001 46712 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:27:46.373067 46712 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.373093 46712 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc000541f50 6 D0712 20:27:46.373112 46712 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:27:46.373384 46712 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.373408 46712 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc000541f50 7 D0712 20:27:46.373418 46712 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:27:46.373643 46712 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.373682 46712 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc000541f50 8 D0712 20:27:46.373710 46712 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:27:46.373895 46712 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.373923 46712 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc000541f50 9 D0712 20:27:46.373939 46712 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:27:46.373956 46712 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.373977 46712 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc000541f50 10 D0712 20:27:46.374056 46712 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:27:46.381993 46712 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.382066 46712 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc000541f50 11 D0712 20:27:46.382088 46712 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:27:46.384969 46712 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.385048 46712 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc000541f50 12 D0712 20:27:46.385069 46712 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:27:46.385162 46712 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.385173 46712 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc000541f50 13 D0712 20:27:46.385185 46712 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:27:46.385207 46712 task_signals.go:470] [ 659: 659] Notified of signal 23 D0712 20:27:46.385278 46712 task_signals.go:220] [ 659: 659] Signal 23: delivering to handler D0712 20:27:46.393512 46712 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.393548 46712 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc000541f50 14 D0712 20:27:46.393559 46712 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:27:46.393607 46712 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.393626 46712 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.393659 46712 task_signals.go:204] [ 659: 662] Signal 659, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.393679 46712 task_signals.go:204] [ 659: 663] Signal 659, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.393679 46712 task_signals.go:204] [ 659: 660] Signal 659, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.393696 46712 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.393674 46712 task_signals.go:204] [ 659: 661] Signal 659, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.393713 46712 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.393719 46712 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.393736 46712 task_signals.go:204] [ 659: 664] Signal 659, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.393745 46712 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.393966 46712 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.393993 46712 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.394021 46712 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.394044 46712 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.394052 46712 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.394066 46712 task_exit.go:204] [ 659: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.394090 46712 task_exit.go:204] [ 659: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.394102 46712 task_exit.go:204] [ 659: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.394115 46712 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.395283 46712 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.395315 46712 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.395332 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.395360 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.395367 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.395598 46712 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.396244 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.398110 46712 syscalls.go:262] [ 665: 665] Allocating stack with size of 8388608 bytes D0712 20:27:46.398455 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.399698 46712 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.399734 46712 usertrap_amd64.go:106] [ 665: 665] Map a usertrap vma at 68000 D0712 20:27:46.399856 46712 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0008b0540 1 D0712 20:27:46.399898 46712 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:27:46.400385 46712 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.400446 46712 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0008b0540 2 D0712 20:27:46.400468 46712 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:27:46.401325 46712 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.401350 46712 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0008b0540 3 D0712 20:27:46.401360 46712 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:27:46.407734 46712 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.407766 46712 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0008b0540 4 D0712 20:27:46.407780 46712 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:27:46.409576 46712 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.409621 46712 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0008b0540 5 D0712 20:27:46.409637 46712 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:27:46.409801 46712 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.409827 46712 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0008b0540 6 D0712 20:27:46.409836 46712 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:27:46.410068 46712 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.410096 46712 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0008b0540 7 D0712 20:27:46.410106 46712 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:27:46.410306 46712 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.410330 46712 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0008b0540 8 D0712 20:27:46.410339 46712 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:27:46.410474 46712 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.410490 46712 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0008b0540 9 D0712 20:27:46.410501 46712 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:27:46.410743 46712 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.410791 46712 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0008b0540 10 D0712 20:27:46.410805 46712 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b020 trap addr 68320 ([184 39 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:27:46.410823 46712 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.410831 46712 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0008b0540 11 D0712 20:27:46.410837 46712 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b04f trap addr 68370 ([184 234 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:27:46.410934 46712 task_signals.go:470] [ 665: 665] Notified of signal 23 D0712 20:27:46.411305 46712 task_signals.go:220] [ 665: 665] Signal 23: delivering to handler D0712 20:27:46.411525 46712 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.411568 46712 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0008b0540 12 D0712 20:27:46.411616 46712 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b57c trap addr 683c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:27:46.420213 46712 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.420244 46712 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0008b0540 13 D0712 20:27:46.420259 46712 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:27:46.422613 46712 task_signals.go:470] [ 665: 665] Notified of signal 23 D0712 20:27:46.422967 46712 task_signals.go:220] [ 665: 665] Signal 23: delivering to handler D0712 20:27:46.423087 46712 task_signals.go:481] [ 665: 665] No task notified of signal 23 D0712 20:27:46.423124 46712 task_signals.go:220] [ 665: 665] Signal 23: delivering to handler D0712 20:27:46.430955 46712 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.431079 46712 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0008b0540 14 D0712 20:27:46.431110 46712 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:27:46.431182 46712 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.431206 46712 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.431332 46712 task_signals.go:204] [ 665: 668] Signal 665, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.431338 46712 task_signals.go:204] [ 665: 666] Signal 665, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.431367 46712 task_signals.go:204] [ 665: 669] Signal 665, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.431376 46712 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.431397 46712 task_signals.go:204] [ 665: 667] Signal 665, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.431409 46712 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.431415 46712 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.431430 46712 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.431440 46712 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.431446 46712 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.431455 46712 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.431480 46712 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.431487 46712 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.431500 46712 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.432883 46712 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.432911 46712 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.432931 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.436151 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.436221 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.436548 46712 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.437446 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.439359 46712 syscalls.go:262] [ 670: 670] Allocating stack with size of 8388608 bytes D0712 20:27:46.439494 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.440774 46712 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.440810 46712 usertrap_amd64.go:106] [ 670: 670] Map a usertrap vma at 62000 D0712 20:27:46.440885 46712 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc0008b0b10 1 D0712 20:27:46.440920 46712 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:27:46.441625 46712 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.441663 46712 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc0008b0b10 2 D0712 20:27:46.441674 46712 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:27:46.442328 46712 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.442352 46712 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc0008b0b10 3 D0712 20:27:46.442361 46712 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:27:46.449384 46712 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.449406 46712 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc0008b0b10 4 D0712 20:27:46.449419 46712 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:27:46.450963 46712 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.451009 46712 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc0008b0b10 5 D0712 20:27:46.451030 46712 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:27:46.451105 46712 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.451114 46712 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc0008b0b10 6 D0712 20:27:46.451123 46712 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:27:46.451557 46712 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.451580 46712 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc0008b0b10 7 D0712 20:27:46.451593 46712 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:27:46.451774 46712 usertrap_amd64.go:212] [ 670: 671] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.451788 46712 usertrap_amd64.go:122] [ 670: 671] Allocate a new trap: 0xc0008b0b10 8 D0712 20:27:46.451796 46712 usertrap_amd64.go:225] [ 670: 671] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:27:46.451864 46712 usertrap_amd64.go:212] [ 670: 671] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.451872 46712 usertrap_amd64.go:122] [ 670: 671] Allocate a new trap: 0xc0008b0b10 9 D0712 20:27:46.451877 46712 usertrap_amd64.go:225] [ 670: 671] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:27:46.452011 46712 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.452040 46712 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc0008b0b10 10 D0712 20:27:46.452053 46712 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:27:46.452597 46712 usertrap_amd64.go:212] [ 670: 671] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.452646 46712 usertrap_amd64.go:122] [ 670: 671] Allocate a new trap: 0xc0008b0b10 11 D0712 20:27:46.452666 46712 usertrap_amd64.go:225] [ 670: 671] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:27:46.452724 46712 usertrap_amd64.go:212] [ 670: 671] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.452752 46712 usertrap_amd64.go:122] [ 670: 671] Allocate a new trap: 0xc0008b0b10 12 D0712 20:27:46.452820 46712 usertrap_amd64.go:225] [ 670: 671] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:27:46.452969 46712 task_signals.go:470] [ 670: 670] Notified of signal 23 D0712 20:27:46.453009 46712 task_signals.go:220] [ 670: 670] Signal 23: delivering to handler D0712 20:27:46.460864 46712 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.460902 46712 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc0008b0b10 13 D0712 20:27:46.460925 46712 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:27:46.463868 46712 task_signals.go:470] [ 670: 670] Notified of signal 23 D0712 20:27:46.464756 46712 task_signals.go:220] [ 670: 670] Signal 23: delivering to handler D0712 20:27:46.465041 46712 task_signals.go:481] [ 670: 670] No task notified of signal 23 D0712 20:27:46.465268 46712 task_signals.go:220] [ 670: 670] Signal 23: delivering to handler D0712 20:27:46.476333 46712 usertrap_amd64.go:212] [ 670: 670] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.476405 46712 usertrap_amd64.go:122] [ 670: 670] Allocate a new trap: 0xc0008b0b10 14 D0712 20:27:46.476439 46712 usertrap_amd64.go:225] [ 670: 670] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:27:46.476612 46712 task_exit.go:204] [ 670: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.476652 46712 task_exit.go:204] [ 670: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.476713 46712 task_signals.go:204] [ 670: 674] Signal 670, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.476837 46712 task_exit.go:204] [ 670: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.476870 46712 task_exit.go:204] [ 670: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.476878 46712 task_exit.go:204] [ 670: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.476717 46712 task_signals.go:204] [ 670: 672] Signal 670, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.476906 46712 task_exit.go:204] [ 670: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.476923 46712 task_exit.go:204] [ 670: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.476785 46712 task_signals.go:204] [ 670: 673] Signal 670, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.476772 46712 task_signals.go:204] [ 670: 671] Signal 670, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.476929 46712 task_exit.go:204] [ 670: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.476995 46712 task_exit.go:204] [ 670: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.477044 46712 task_exit.go:204] [ 670: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.477053 46712 task_exit.go:204] [ 670: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.477081 46712 task_exit.go:204] [ 670: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.478596 46712 task_exit.go:204] [ 670: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.478629 46712 task_exit.go:204] [ 670: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.478648 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.479362 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.479401 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.479838 46712 task_exit.go:204] [ 670: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.480667 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.482718 46712 syscalls.go:262] [ 675: 675] Allocating stack with size of 8388608 bytes D0712 20:27:46.482995 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.484364 46712 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.484410 46712 usertrap_amd64.go:106] [ 675: 675] Map a usertrap vma at 67000 D0712 20:27:46.484534 46712 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000a9e6f0 1 D0712 20:27:46.484584 46712 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:27:46.485240 46712 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.485298 46712 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000a9e6f0 2 D0712 20:27:46.485324 46712 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:27:46.486194 46712 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.486227 46712 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000a9e6f0 3 D0712 20:27:46.486246 46712 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:27:46.493211 46712 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.493256 46712 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000a9e6f0 4 D0712 20:27:46.493272 46712 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:27:46.494425 46712 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.494448 46712 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000a9e6f0 5 D0712 20:27:46.494462 46712 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:27:46.494578 46712 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.494598 46712 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000a9e6f0 6 D0712 20:27:46.494607 46712 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:27:46.494897 46712 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.494927 46712 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000a9e6f0 7 D0712 20:27:46.494941 46712 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:27:46.495214 46712 usertrap_amd64.go:212] [ 675: 676] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.495233 46712 usertrap_amd64.go:122] [ 675: 676] Allocate a new trap: 0xc000a9e6f0 8 D0712 20:27:46.495245 46712 usertrap_amd64.go:225] [ 675: 676] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:27:46.495585 46712 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.495600 46712 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000a9e6f0 9 D0712 20:27:46.495632 46712 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:27:46.495654 46712 usertrap_amd64.go:212] [ 675: 676] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.495664 46712 usertrap_amd64.go:122] [ 675: 676] Allocate a new trap: 0xc000a9e6f0 10 D0712 20:27:46.495673 46712 usertrap_amd64.go:225] [ 675: 676] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:27:46.504208 46712 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.504252 46712 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000a9e6f0 11 D0712 20:27:46.504271 46712 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:27:46.507748 46712 usertrap_amd64.go:212] [ 675: 676] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.507812 46712 usertrap_amd64.go:122] [ 675: 676] Allocate a new trap: 0xc000a9e6f0 12 D0712 20:27:46.507834 46712 usertrap_amd64.go:225] [ 675: 676] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:27:46.507901 46712 usertrap_amd64.go:212] [ 675: 676] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.507914 46712 usertrap_amd64.go:122] [ 675: 676] Allocate a new trap: 0xc000a9e6f0 13 D0712 20:27:46.507924 46712 usertrap_amd64.go:225] [ 675: 676] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:27:46.507950 46712 task_signals.go:470] [ 675: 675] Notified of signal 23 D0712 20:27:46.508518 46712 task_signals.go:220] [ 675: 675] Signal 23: delivering to handler D0712 20:27:46.516170 46712 usertrap_amd64.go:212] [ 675: 675] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.516218 46712 usertrap_amd64.go:122] [ 675: 675] Allocate a new trap: 0xc000a9e6f0 14 D0712 20:27:46.516242 46712 usertrap_amd64.go:225] [ 675: 675] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:27:46.516309 46712 task_exit.go:204] [ 675: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.516337 46712 task_exit.go:204] [ 675: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.516346 46712 task_signals.go:204] [ 675: 676] Signal 675, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.516362 46712 task_signals.go:204] [ 675: 679] Signal 675, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.516375 46712 task_exit.go:204] [ 675: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.516354 46712 task_signals.go:204] [ 675: 677] Signal 675, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.516390 46712 task_exit.go:204] [ 675: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.516395 46712 task_exit.go:204] [ 675: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.516415 46712 task_exit.go:204] [ 675: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.516424 46712 task_exit.go:204] [ 675: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.516443 46712 task_exit.go:204] [ 675: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.516453 46712 task_exit.go:204] [ 675: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.516475 46712 task_exit.go:204] [ 675: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.516481 46712 task_exit.go:204] [ 675: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.516416 46712 task_signals.go:204] [ 675: 678] Signal 675, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.516509 46712 task_exit.go:204] [ 675: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.518093 46712 task_exit.go:204] [ 675: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.518126 46712 task_exit.go:204] [ 675: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.518141 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.518177 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.518195 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.518368 46712 task_exit.go:204] [ 675: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.518871 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.520219 46712 syscalls.go:262] [ 680: 680] Allocating stack with size of 8388608 bytes D0712 20:27:46.520325 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.521867 46712 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.521901 46712 usertrap_amd64.go:106] [ 680: 680] Map a usertrap vma at 62000 D0712 20:27:46.522004 46712 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc000a9eba0 1 D0712 20:27:46.522032 46712 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:27:46.522352 46712 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.522369 46712 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc000a9eba0 2 D0712 20:27:46.522379 46712 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:27:46.523452 46712 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.523514 46712 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc000a9eba0 3 D0712 20:27:46.523532 46712 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:27:46.531090 46712 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.531162 46712 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc000a9eba0 4 D0712 20:27:46.531216 46712 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:27:46.532812 46712 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.532868 46712 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc000a9eba0 5 D0712 20:27:46.532885 46712 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:27:46.533034 46712 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.533055 46712 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc000a9eba0 6 D0712 20:27:46.533065 46712 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:27:46.533867 46712 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.533912 46712 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc000a9eba0 7 D0712 20:27:46.533933 46712 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:27:46.534252 46712 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.534272 46712 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc000a9eba0 8 D0712 20:27:46.534285 46712 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:27:46.534714 46712 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.534734 46712 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc000a9eba0 9 D0712 20:27:46.534745 46712 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:27:46.534767 46712 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.534775 46712 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc000a9eba0 10 D0712 20:27:46.534781 46712 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:27:46.543501 46712 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.543545 46712 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc000a9eba0 11 D0712 20:27:46.543561 46712 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:27:46.546282 46712 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.546326 46712 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc000a9eba0 12 D0712 20:27:46.546345 46712 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:27:46.546593 46712 usertrap_amd64.go:212] [ 680: 681] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.546626 46712 usertrap_amd64.go:122] [ 680: 681] Allocate a new trap: 0xc000a9eba0 13 D0712 20:27:46.546640 46712 usertrap_amd64.go:225] [ 680: 681] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:27:46.546752 46712 task_signals.go:470] [ 680: 680] Notified of signal 23 D0712 20:27:46.547623 46712 task_signals.go:220] [ 680: 680] Signal 23: delivering to handler D0712 20:27:46.557188 46712 usertrap_amd64.go:212] [ 680: 680] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.557236 46712 usertrap_amd64.go:122] [ 680: 680] Allocate a new trap: 0xc000a9eba0 14 D0712 20:27:46.557255 46712 usertrap_amd64.go:225] [ 680: 680] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:27:46.557338 46712 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.557366 46712 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.557402 46712 task_signals.go:204] [ 680: 681] Signal 680, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.557429 46712 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.557439 46712 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.557446 46712 task_exit.go:204] [ 680: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.557470 46712 task_signals.go:204] [ 680: 682] Signal 680, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.557501 46712 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.557511 46712 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.557527 46712 task_exit.go:204] [ 680: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.557551 46712 task_signals.go:204] [ 680: 683] Signal 680, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.557571 46712 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.557580 46712 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.557593 46712 task_exit.go:204] [ 680: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.557623 46712 task_signals.go:204] [ 680: 684] Signal 680, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.557644 46712 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.558988 46712 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.559046 46712 task_exit.go:204] [ 680: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.559063 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.563090 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.563125 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.563306 46712 task_exit.go:204] [ 680: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.564287 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.567318 46712 syscalls.go:262] [ 685: 685] Allocating stack with size of 8388608 bytes D0712 20:27:46.567493 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.568634 46712 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.568670 46712 usertrap_amd64.go:106] [ 685: 685] Map a usertrap vma at 60000 D0712 20:27:46.568831 46712 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc0007f1590 1 D0712 20:27:46.568869 46712 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:27:46.569880 46712 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.569906 46712 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc0007f1590 2 D0712 20:27:46.569925 46712 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:27:46.570781 46712 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.570807 46712 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc0007f1590 3 D0712 20:27:46.570819 46712 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:27:46.577527 46712 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.577564 46712 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc0007f1590 4 D0712 20:27:46.577582 46712 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:27:46.578906 46712 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.578935 46712 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc0007f1590 5 D0712 20:27:46.578947 46712 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:27:46.579036 46712 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.579054 46712 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc0007f1590 6 D0712 20:27:46.579062 46712 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:27:46.579341 46712 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.579361 46712 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc0007f1590 7 D0712 20:27:46.579371 46712 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:27:46.579610 46712 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.579634 46712 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc0007f1590 8 D0712 20:27:46.579653 46712 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:27:46.579921 46712 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.579938 46712 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc0007f1590 9 D0712 20:27:46.579948 46712 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:27:46.580028 46712 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.580037 46712 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc0007f1590 10 D0712 20:27:46.580145 46712 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:27:46.589399 46712 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.589437 46712 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc0007f1590 11 D0712 20:27:46.589448 46712 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:27:46.591926 46712 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.591964 46712 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc0007f1590 12 D0712 20:27:46.591979 46712 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:27:46.592077 46712 usertrap_amd64.go:212] [ 685: 686] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.592108 46712 usertrap_amd64.go:122] [ 685: 686] Allocate a new trap: 0xc0007f1590 13 D0712 20:27:46.592125 46712 usertrap_amd64.go:225] [ 685: 686] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:27:46.592228 46712 task_signals.go:470] [ 685: 685] Notified of signal 23 D0712 20:27:46.592331 46712 task_signals.go:220] [ 685: 685] Signal 23: delivering to handler I0712 20:27:46.601182 46712 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0712 20:27:46.601292 46712 usertrap_amd64.go:212] [ 685: 685] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.601309 46712 usertrap_amd64.go:122] [ 685: 685] Allocate a new trap: 0xc0007f1590 14 D0712 20:27:46.601321 46712 usertrap_amd64.go:225] [ 685: 685] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:27:46.601415 46712 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.601456 46712 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.601460 46712 task_signals.go:204] [ 685: 686] Signal 685, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.601491 46712 task_signals.go:204] [ 685: 689] Signal 685, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.601495 46712 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.601512 46712 task_signals.go:204] [ 685: 687] Signal 685, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.601527 46712 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.601537 46712 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.601543 46712 task_exit.go:204] [ 685: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.601558 46712 task_signals.go:204] [ 685: 688] Signal 685, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.601567 46712 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.601576 46712 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.601582 46712 task_exit.go:204] [ 685: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.601592 46712 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.601650 46712 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.601681 46712 task_exit.go:204] [ 685: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.602937 46712 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.602969 46712 task_exit.go:204] [ 685: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.602989 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.603040 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.603050 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.603229 46712 task_exit.go:204] [ 685: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.603555 46712 task_signals.go:470] [ 6: 8] Notified of signal 23 D0712 20:27:46.603607 46712 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0712 20:27:46.603908 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.605683 46712 syscalls.go:262] [ 690: 690] Allocating stack with size of 8388608 bytes D0712 20:27:46.605807 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.607044 46712 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.607155 46712 usertrap_amd64.go:106] [ 690: 690] Map a usertrap vma at 60000 D0712 20:27:46.607261 46712 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a9ec00 1 D0712 20:27:46.607368 46712 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:27:46.607987 46712 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.608020 46712 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a9ec00 2 D0712 20:27:46.608033 46712 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:27:46.608921 46712 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.608984 46712 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a9ec00 3 D0712 20:27:46.609000 46712 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:27:46.615785 46712 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.615855 46712 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a9ec00 4 D0712 20:27:46.615879 46712 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:27:46.616974 46712 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.617011 46712 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a9ec00 5 D0712 20:27:46.617033 46712 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:27:46.617133 46712 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.617159 46712 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a9ec00 6 D0712 20:27:46.617171 46712 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:27:46.617177 46712 sampler.go:191] Time: Adjusting syscall overhead down to 588 D0712 20:27:46.617663 46712 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.617694 46712 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a9ec00 7 D0712 20:27:46.617705 46712 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:27:46.617892 46712 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.617915 46712 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000a9ec00 8 D0712 20:27:46.617927 46712 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:27:46.618143 46712 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.618167 46712 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000a9ec00 9 D0712 20:27:46.618183 46712 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:27:46.618297 46712 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.618314 46712 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a9ec00 10 D0712 20:27:46.618325 46712 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:27:46.626111 46712 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.626146 46712 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a9ec00 11 D0712 20:27:46.626159 46712 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:27:46.628977 46712 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.629011 46712 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000a9ec00 12 D0712 20:27:46.629025 46712 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:27:46.629169 46712 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.629208 46712 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000a9ec00 13 D0712 20:27:46.629222 46712 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:27:46.629335 46712 task_signals.go:470] [ 690: 690] Notified of signal 23 D0712 20:27:46.629434 46712 task_signals.go:220] [ 690: 690] Signal 23: delivering to handler D0712 20:27:46.637448 46712 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.637487 46712 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000a9ec00 14 D0712 20:27:46.637501 46712 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:27:46.637687 46712 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.637727 46712 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.637750 46712 task_signals.go:204] [ 690: 692] Signal 690, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.637772 46712 task_signals.go:204] [ 690: 693] Signal 690, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.637789 46712 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.637814 46712 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.637809 46712 task_signals.go:204] [ 690: 691] Signal 690, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.637819 46712 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.637860 46712 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.637898 46712 task_signals.go:204] [ 690: 694] Signal 690, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.637934 46712 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.637943 46712 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.637963 46712 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.637983 46712 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.637997 46712 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.638008 46712 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.639300 46712 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.639329 46712 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.639343 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.639369 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.639381 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.639574 46712 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.639994 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.641434 46712 syscalls.go:262] [ 695: 695] Allocating stack with size of 8388608 bytes D0712 20:27:46.641514 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.643471 46712 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.643526 46712 usertrap_amd64.go:106] [ 695: 695] Map a usertrap vma at 60000 D0712 20:27:46.643639 46712 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0008b1dd0 1 D0712 20:27:46.643673 46712 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:27:46.644126 46712 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.644167 46712 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0008b1dd0 2 D0712 20:27:46.644180 46712 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:27:46.644826 46712 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.644852 46712 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0008b1dd0 3 D0712 20:27:46.644862 46712 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:27:46.652623 46712 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.652664 46712 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0008b1dd0 4 D0712 20:27:46.652675 46712 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:27:46.654087 46712 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.654152 46712 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0008b1dd0 5 D0712 20:27:46.654163 46712 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:27:46.654258 46712 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.654267 46712 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0008b1dd0 6 D0712 20:27:46.654278 46712 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:27:46.654632 46712 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.654656 46712 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0008b1dd0 7 D0712 20:27:46.654672 46712 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:27:46.654876 46712 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.654897 46712 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc0008b1dd0 8 D0712 20:27:46.654906 46712 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:27:46.655218 46712 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.655247 46712 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc0008b1dd0 9 D0712 20:27:46.655260 46712 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:27:46.655408 46712 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.655423 46712 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0008b1dd0 10 D0712 20:27:46.655431 46712 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:27:46.655636 46712 usertrap_amd64.go:212] [ 695: 698] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:46.655658 46712 usertrap_amd64.go:122] [ 695: 698] Allocate a new trap: 0xc0008b1dd0 11 D0712 20:27:46.655718 46712 usertrap_amd64.go:225] [ 695: 698] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:27:46.664136 46712 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.664171 46712 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0008b1dd0 12 D0712 20:27:46.664185 46712 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:27:46.666772 46712 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.666819 46712 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc0008b1dd0 13 D0712 20:27:46.666842 46712 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:27:46.666892 46712 usertrap_amd64.go:212] [ 695: 696] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.666912 46712 usertrap_amd64.go:122] [ 695: 696] Allocate a new trap: 0xc0008b1dd0 14 D0712 20:27:46.666928 46712 usertrap_amd64.go:225] [ 695: 696] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:27:46.667011 46712 task_signals.go:470] [ 695: 695] Notified of signal 23 D0712 20:27:46.667126 46712 task_signals.go:220] [ 695: 695] Signal 23: delivering to handler D0712 20:27:46.675386 46712 usertrap_amd64.go:212] [ 695: 695] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.675426 46712 usertrap_amd64.go:122] [ 695: 695] Allocate a new trap: 0xc0008b1dd0 15 D0712 20:27:46.675444 46712 usertrap_amd64.go:225] [ 695: 695] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0712 20:27:46.675521 46712 task_exit.go:204] [ 695: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.675559 46712 task_exit.go:204] [ 695: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.675585 46712 task_signals.go:204] [ 695: 697] Signal 695, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.675739 46712 task_exit.go:204] [ 695: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.675772 46712 task_exit.go:204] [ 695: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.675596 46712 task_signals.go:204] [ 695: 698] Signal 695, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.675781 46712 task_exit.go:204] [ 695: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.675635 46712 task_signals.go:204] [ 695: 696] Signal 695, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.675621 46712 task_signals.go:204] [ 695: 699] Signal 695, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.675822 46712 task_exit.go:204] [ 695: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.675856 46712 task_exit.go:204] [ 695: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.675877 46712 task_exit.go:204] [ 695: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.675901 46712 task_exit.go:204] [ 695: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.675934 46712 task_exit.go:204] [ 695: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.675942 46712 task_exit.go:204] [ 695: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.675960 46712 task_exit.go:204] [ 695: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.677409 46712 task_exit.go:204] [ 695: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.677448 46712 task_exit.go:204] [ 695: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.677465 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.677514 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.677541 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.677774 46712 task_exit.go:204] [ 695: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.678429 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.680158 46712 syscalls.go:262] [ 700: 700] Allocating stack with size of 8388608 bytes D0712 20:27:46.680335 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.682253 46712 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.682299 46712 usertrap_amd64.go:106] [ 700: 700] Map a usertrap vma at 63000 D0712 20:27:46.682380 46712 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000a9f0e0 1 D0712 20:27:46.682411 46712 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:46.682918 46712 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.682953 46712 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000a9f0e0 2 D0712 20:27:46.682969 46712 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:46.683516 46712 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.683545 46712 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000a9f0e0 3 D0712 20:27:46.683560 46712 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:46.689926 46712 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.689965 46712 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000a9f0e0 4 D0712 20:27:46.689980 46712 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:46.691692 46712 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.691727 46712 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000a9f0e0 5 D0712 20:27:46.691742 46712 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:46.691822 46712 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.691840 46712 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000a9f0e0 6 D0712 20:27:46.691854 46712 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:46.692355 46712 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.692381 46712 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000a9f0e0 7 D0712 20:27:46.692392 46712 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:46.692609 46712 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.692638 46712 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc000a9f0e0 8 D0712 20:27:46.692651 46712 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:46.692815 46712 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.692839 46712 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc000a9f0e0 9 D0712 20:27:46.692849 46712 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:46.692861 46712 usertrap_amd64.go:212] [ 700: 702] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:46.692868 46712 usertrap_amd64.go:122] [ 700: 702] Allocate a new trap: 0xc000a9f0e0 10 D0712 20:27:46.692877 46712 usertrap_amd64.go:225] [ 700: 702] Apply the binary patch addr 46b6e0 trap addr 63320 ([184 24 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:46.692903 46712 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.692914 46712 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000a9f0e0 11 D0712 20:27:46.692928 46712 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46b57c trap addr 63370 ([184 202 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:46.701486 46712 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.701537 46712 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000a9f0e0 12 D0712 20:27:46.701554 46712 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:46.704008 46712 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.704045 46712 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc000a9f0e0 13 D0712 20:27:46.704063 46712 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:46.704145 46712 usertrap_amd64.go:212] [ 700: 701] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.704174 46712 usertrap_amd64.go:122] [ 700: 701] Allocate a new trap: 0xc000a9f0e0 14 D0712 20:27:46.704186 46712 usertrap_amd64.go:225] [ 700: 701] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:46.704223 46712 task_signals.go:470] [ 700: 700] Notified of signal 23 D0712 20:27:46.704293 46712 task_signals.go:220] [ 700: 700] Signal 23: delivering to handler D0712 20:27:46.711876 46712 usertrap_amd64.go:212] [ 700: 700] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.711922 46712 usertrap_amd64.go:122] [ 700: 700] Allocate a new trap: 0xc000a9f0e0 15 D0712 20:27:46.711936 46712 usertrap_amd64.go:225] [ 700: 700] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 20:27:46.712022 46712 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.712049 46712 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.712089 46712 task_signals.go:204] [ 700: 704] Signal 700, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.712117 46712 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.712096 46712 task_signals.go:204] [ 700: 702] Signal 700, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.712124 46712 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.712143 46712 task_exit.go:204] [ 700: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.712178 46712 task_signals.go:204] [ 700: 701] Signal 700, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.712190 46712 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.712204 46712 task_signals.go:204] [ 700: 703] Signal 700, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.712232 46712 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.712237 46712 task_exit.go:204] [ 700: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.712248 46712 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.712254 46712 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.712274 46712 task_exit.go:204] [ 700: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.712284 46712 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.713572 46712 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.713628 46712 task_exit.go:204] [ 700: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.713644 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.713688 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.713709 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.713764 46712 task_exit.go:204] [ 700: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.714582 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.716275 46712 syscalls.go:262] [ 705: 705] Allocating stack with size of 8388608 bytes D0712 20:27:46.716435 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.718177 46712 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.718228 46712 usertrap_amd64.go:106] [ 705: 705] Map a usertrap vma at 68000 D0712 20:27:46.718370 46712 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0001daf00 1 D0712 20:27:46.718404 46712 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:27:46.718849 46712 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.718871 46712 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0001daf00 2 D0712 20:27:46.718881 46712 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:27:46.719748 46712 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.719783 46712 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0001daf00 3 D0712 20:27:46.719800 46712 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:27:46.726528 46712 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.726570 46712 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0001daf00 4 D0712 20:27:46.726584 46712 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:27:46.728081 46712 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.728121 46712 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0001daf00 5 D0712 20:27:46.728138 46712 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:27:46.728212 46712 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.728236 46712 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0001daf00 6 D0712 20:27:46.728244 46712 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:27:46.728624 46712 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.728646 46712 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0001daf00 7 D0712 20:27:46.728652 46712 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:27:46.728840 46712 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.728883 46712 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc0001daf00 8 D0712 20:27:46.728901 46712 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:27:46.729466 46712 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.729506 46712 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc0001daf00 9 D0712 20:27:46.729523 46712 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:27:46.729537 46712 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.729545 46712 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0001daf00 10 D0712 20:27:46.729553 46712 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:27:46.738296 46712 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.738368 46712 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0001daf00 11 D0712 20:27:46.738407 46712 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:27:46.741291 46712 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.741332 46712 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc0001daf00 12 D0712 20:27:46.741348 46712 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:27:46.741418 46712 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.741456 46712 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc0001daf00 13 D0712 20:27:46.741480 46712 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:27:46.741554 46712 task_signals.go:470] [ 705: 705] Notified of signal 23 D0712 20:27:46.741640 46712 task_signals.go:220] [ 705: 705] Signal 23: delivering to handler D0712 20:27:46.750327 46712 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.750362 46712 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc0001daf00 14 D0712 20:27:46.750380 46712 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:27:46.750495 46712 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.750530 46712 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.750572 46712 task_signals.go:204] [ 705: 708] Signal 705, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.750598 46712 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.750617 46712 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.750623 46712 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.750593 46712 task_signals.go:204] [ 705: 707] Signal 705, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.750645 46712 task_signals.go:204] [ 705: 709] Signal 705, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.750653 46712 task_signals.go:204] [ 705: 706] Signal 705, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.750669 46712 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.750699 46712 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.750715 46712 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.750736 46712 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.750747 46712 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.750754 46712 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.750777 46712 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.752197 46712 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.752261 46712 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.752286 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.752332 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.752359 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.752709 46712 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.753464 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.755132 46712 syscalls.go:262] [ 710: 710] Allocating stack with size of 8388608 bytes D0712 20:27:46.755289 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.757783 46712 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.757827 46712 usertrap_amd64.go:106] [ 710: 710] Map a usertrap vma at 67000 D0712 20:27:46.757965 46712 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001831530 1 D0712 20:27:46.757994 46712 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:27:46.758477 46712 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.758502 46712 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001831530 2 D0712 20:27:46.758512 46712 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:27:46.759277 46712 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.759300 46712 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001831530 3 D0712 20:27:46.759311 46712 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:27:46.766190 46712 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.766235 46712 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001831530 4 D0712 20:27:46.766249 46712 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:27:46.767533 46712 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.767563 46712 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001831530 5 D0712 20:27:46.767573 46712 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:27:46.767641 46712 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.767651 46712 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001831530 6 D0712 20:27:46.767658 46712 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:27:46.767977 46712 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.768005 46712 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001831530 7 D0712 20:27:46.768013 46712 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:27:46.768195 46712 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.768219 46712 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc001831530 8 D0712 20:27:46.768229 46712 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:27:46.768537 46712 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.768568 46712 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001831530 9 D0712 20:27:46.768579 46712 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:27:46.768610 46712 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.768620 46712 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc001831530 10 D0712 20:27:46.768629 46712 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:27:46.778140 46712 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.778166 46712 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001831530 11 D0712 20:27:46.778175 46712 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:27:46.780607 46712 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.780658 46712 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc001831530 12 D0712 20:27:46.780679 46712 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:27:46.780757 46712 usertrap_amd64.go:212] [ 710: 711] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.780793 46712 usertrap_amd64.go:122] [ 710: 711] Allocate a new trap: 0xc001831530 13 D0712 20:27:46.780806 46712 usertrap_amd64.go:225] [ 710: 711] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:27:46.780876 46712 task_signals.go:470] [ 710: 710] Notified of signal 23 D0712 20:27:46.780988 46712 task_signals.go:220] [ 710: 710] Signal 23: delivering to handler D0712 20:27:46.789124 46712 usertrap_amd64.go:212] [ 710: 710] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.789157 46712 usertrap_amd64.go:122] [ 710: 710] Allocate a new trap: 0xc001831530 14 D0712 20:27:46.789170 46712 usertrap_amd64.go:225] [ 710: 710] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:27:46.789245 46712 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.789277 46712 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.789323 46712 task_signals.go:204] [ 710: 711] Signal 710, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.789350 46712 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.789361 46712 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.789331 46712 task_signals.go:204] [ 710: 712] Signal 710, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.789368 46712 task_exit.go:204] [ 710: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.789413 46712 task_signals.go:204] [ 710: 713] Signal 710, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.789423 46712 task_signals.go:204] [ 710: 714] Signal 710, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.789438 46712 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.789463 46712 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.789471 46712 task_exit.go:204] [ 710: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.789489 46712 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.789506 46712 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.789513 46712 task_exit.go:204] [ 710: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.789524 46712 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.790693 46712 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.790726 46712 task_exit.go:204] [ 710: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.790741 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.790778 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.790787 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.790965 46712 task_exit.go:204] [ 710: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.791706 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.793169 46712 syscalls.go:262] [ 715: 715] Allocating stack with size of 8388608 bytes D0712 20:27:46.793309 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.794912 46712 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.794945 46712 usertrap_amd64.go:106] [ 715: 715] Map a usertrap vma at 62000 D0712 20:27:46.795047 46712 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000a9f2f0 1 D0712 20:27:46.795067 46712 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:27:46.795633 46712 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.795649 46712 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000a9f2f0 2 D0712 20:27:46.795660 46712 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:27:46.796412 46712 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.796439 46712 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000a9f2f0 3 D0712 20:27:46.796449 46712 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:27:46.803054 46712 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.803078 46712 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000a9f2f0 4 D0712 20:27:46.803087 46712 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:27:46.804269 46712 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.804284 46712 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000a9f2f0 5 D0712 20:27:46.804294 46712 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:27:46.804351 46712 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.804361 46712 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000a9f2f0 6 D0712 20:27:46.804368 46712 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:27:46.804591 46712 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.804627 46712 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000a9f2f0 7 D0712 20:27:46.804637 46712 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:27:46.804799 46712 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.804828 46712 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc000a9f2f0 8 D0712 20:27:46.804838 46712 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:27:46.805057 46712 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:46.805070 46712 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc000a9f2f0 9 D0712 20:27:46.805078 46712 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b6e0 trap addr 622d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:27:46.805092 46712 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.805111 46712 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc000a9f2f0 10 D0712 20:27:46.805121 46712 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:27:46.805279 46712 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.805308 46712 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc000a9f2f0 11 D0712 20:27:46.805321 46712 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46af76 trap addr 62370 ([184 35 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:27:46.812165 46712 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.812197 46712 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000a9f2f0 12 D0712 20:27:46.812209 46712 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46af29 trap addr 623c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:27:46.815973 46712 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.816037 46712 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc000a9f2f0 13 D0712 20:27:46.816055 46712 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b020 trap addr 62410 ([184 39 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:27:46.816147 46712 usertrap_amd64.go:212] [ 715: 716] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.816167 46712 usertrap_amd64.go:122] [ 715: 716] Allocate a new trap: 0xc000a9f2f0 14 D0712 20:27:46.816182 46712 usertrap_amd64.go:225] [ 715: 716] Apply the binary patch addr 46b04f trap addr 62460 ([184 234 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:27:46.816245 46712 task_signals.go:470] [ 715: 715] Notified of signal 23 D0712 20:27:46.816344 46712 task_signals.go:220] [ 715: 715] Signal 23: delivering to handler I0712 20:27:46.822786 46712 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0712 20:27:46.822850 46712 usertrap_amd64.go:212] [ 715: 715] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.822859 46712 usertrap_amd64.go:122] [ 715: 715] Allocate a new trap: 0xc000a9f2f0 15 D0712 20:27:46.822870 46712 usertrap_amd64.go:225] [ 715: 715] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0712 20:27:46.822900 46712 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.822927 46712 task_signals.go:204] [ 715: 718] Signal 715, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.822929 46712 task_signals.go:204] [ 715: 717] Signal 715, PID: 717, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.822932 46712 task_signals.go:204] [ 715: 719] Signal 715, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.822940 46712 task_signals.go:204] [ 715: 716] Signal 715, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.822968 46712 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.822998 46712 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.823025 46712 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.823034 46712 task_exit.go:204] [ 715: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.823052 46712 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.823079 46712 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.823087 46712 task_exit.go:204] [ 715: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.823099 46712 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.823108 46712 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.823118 46712 task_exit.go:204] [ 715: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.823131 46712 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.824371 46712 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.824407 46712 task_exit.go:204] [ 715: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.824426 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.824463 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.824481 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.824692 46712 task_exit.go:204] [ 715: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.825456 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.826971 46712 syscalls.go:262] [ 720: 720] Allocating stack with size of 8388608 bytes D0712 20:27:46.827138 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.829280 46712 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.829388 46712 usertrap_amd64.go:106] [ 720: 720] Map a usertrap vma at 65000 D0712 20:27:46.829489 46712 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001831b00 1 D0712 20:27:46.829525 46712 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:27:46.829766 46712 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.829785 46712 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001831b00 2 D0712 20:27:46.829794 46712 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:27:46.830324 46712 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.830349 46712 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001831b00 3 D0712 20:27:46.830366 46712 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:27:46.837958 46712 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.837999 46712 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001831b00 4 D0712 20:27:46.838016 46712 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:27:46.839638 46712 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.839701 46712 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001831b00 5 D0712 20:27:46.839720 46712 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:27:46.839786 46712 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.839791 46712 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001831b00 6 D0712 20:27:46.839796 46712 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:27:46.840672 46712 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.840714 46712 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001831b00 7 D0712 20:27:46.840728 46712 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:27:46.841059 46712 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.841085 46712 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc001831b00 8 D0712 20:27:46.841100 46712 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:27:46.841278 46712 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.841297 46712 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc001831b00 9 D0712 20:27:46.841305 46712 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:27:46.841562 46712 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.841583 46712 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001831b00 10 D0712 20:27:46.841590 46712 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:27:46.850978 46712 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.851032 46712 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001831b00 11 D0712 20:27:46.851054 46712 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:27:46.853958 46712 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.854006 46712 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc001831b00 12 D0712 20:27:46.854062 46712 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:27:46.854093 46712 usertrap_amd64.go:212] [ 720: 721] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.854107 46712 usertrap_amd64.go:122] [ 720: 721] Allocate a new trap: 0xc001831b00 13 D0712 20:27:46.854114 46712 usertrap_amd64.go:225] [ 720: 721] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:27:46.854132 46712 task_signals.go:470] [ 720: 720] Notified of signal 23 D0712 20:27:46.854169 46712 task_signals.go:220] [ 720: 720] Signal 23: delivering to handler D0712 20:27:46.863802 46712 usertrap_amd64.go:212] [ 720: 720] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.863895 46712 usertrap_amd64.go:122] [ 720: 720] Allocate a new trap: 0xc001831b00 14 D0712 20:27:46.863918 46712 usertrap_amd64.go:225] [ 720: 720] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:27:46.864016 46712 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.864067 46712 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.864095 46712 task_signals.go:204] [ 720: 721] Signal 720, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.864088 46712 task_signals.go:204] [ 720: 722] Signal 720, PID: 722, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.864133 46712 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.864164 46712 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.864171 46712 task_exit.go:204] [ 720: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.864142 46712 task_signals.go:204] [ 720: 723] Signal 720, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.864114 46712 task_signals.go:204] [ 720: 724] Signal 720, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.864203 46712 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.864248 46712 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.864267 46712 task_exit.go:204] [ 720: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.864280 46712 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.864396 46712 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.864421 46712 task_exit.go:204] [ 720: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.864444 46712 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.865906 46712 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.866091 46712 task_exit.go:204] [ 720: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.866191 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.866282 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.866297 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.866396 46712 task_exit.go:204] [ 720: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.867280 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.868858 46712 syscalls.go:262] [ 725: 725] Allocating stack with size of 8388608 bytes D0712 20:27:46.869041 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.873585 46712 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.873638 46712 usertrap_amd64.go:106] [ 725: 725] Map a usertrap vma at 60000 D0712 20:27:46.873751 46712 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc001831c50 1 D0712 20:27:46.873772 46712 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:27:46.874181 46712 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.874197 46712 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc001831c50 2 D0712 20:27:46.874205 46712 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:27:46.875570 46712 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.875617 46712 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc001831c50 3 D0712 20:27:46.875636 46712 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:27:46.884077 46712 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.884111 46712 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc001831c50 4 D0712 20:27:46.884124 46712 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:27:46.885267 46712 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.885304 46712 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc001831c50 5 D0712 20:27:46.885319 46712 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:27:46.885397 46712 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.885427 46712 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc001831c50 6 D0712 20:27:46.885460 46712 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:27:46.885849 46712 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.885866 46712 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc001831c50 7 D0712 20:27:46.885873 46712 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:27:46.886017 46712 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.886036 46712 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc001831c50 8 D0712 20:27:46.886043 46712 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:27:46.886156 46712 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:46.886186 46712 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc001831c50 9 D0712 20:27:46.886199 46712 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46b6e0 trap addr 602d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:27:46.886297 46712 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.886326 46712 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc001831c50 10 D0712 20:27:46.886341 46712 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:27:46.886407 46712 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.886433 46712 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc001831c50 11 D0712 20:27:46.886441 46712 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46af76 trap addr 60370 ([184 35 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:27:46.894076 46712 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.894120 46712 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc001831c50 12 D0712 20:27:46.894134 46712 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46af29 trap addr 603c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:27:46.896829 46712 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.896863 46712 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc001831c50 13 D0712 20:27:46.896877 46712 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46b020 trap addr 60410 ([184 39 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:27:46.896969 46712 usertrap_amd64.go:212] [ 725: 726] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.896999 46712 usertrap_amd64.go:122] [ 725: 726] Allocate a new trap: 0xc001831c50 14 D0712 20:27:46.897014 46712 usertrap_amd64.go:225] [ 725: 726] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:27:46.897075 46712 task_signals.go:470] [ 725: 725] Notified of signal 23 D0712 20:27:46.897151 46712 task_signals.go:220] [ 725: 725] Signal 23: delivering to handler I0712 20:27:46.904647 46712 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0712 20:27:46.904742 46712 usertrap_amd64.go:212] [ 725: 725] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.904773 46712 usertrap_amd64.go:122] [ 725: 725] Allocate a new trap: 0xc001831c50 15 D0712 20:27:46.904784 46712 usertrap_amd64.go:225] [ 725: 725] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0712 20:27:46.904891 46712 task_exit.go:204] [ 725: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.904910 46712 task_exit.go:204] [ 725: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.904935 46712 task_signals.go:204] [ 725: 727] Signal 725, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.905017 46712 task_exit.go:204] [ 725: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.905017 46712 task_signals.go:204] [ 725: 726] Signal 725, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.905039 46712 task_exit.go:204] [ 725: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.905046 46712 task_exit.go:204] [ 725: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.904933 46712 task_signals.go:204] [ 725: 728] Signal 725, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.905026 46712 task_signals.go:204] [ 725: 729] Signal 725, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.905065 46712 task_exit.go:204] [ 725: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.905115 46712 task_exit.go:204] [ 725: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.905134 46712 task_exit.go:204] [ 725: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.905158 46712 task_exit.go:204] [ 725: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.905170 46712 task_exit.go:204] [ 725: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.905177 46712 task_exit.go:204] [ 725: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.905199 46712 task_exit.go:204] [ 725: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.906448 46712 task_exit.go:204] [ 725: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.906492 46712 task_exit.go:204] [ 725: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.906508 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.906551 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.906570 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.906606 46712 task_exit.go:204] [ 725: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.907285 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.908478 46712 syscalls.go:262] [ 730: 730] Allocating stack with size of 8388608 bytes D0712 20:27:46.908637 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.909949 46712 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.909987 46712 usertrap_amd64.go:106] [ 730: 730] Map a usertrap vma at 68000 D0712 20:27:46.910089 46712 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0001db7d0 1 D0712 20:27:46.910138 46712 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:27:46.910807 46712 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.910832 46712 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0001db7d0 2 D0712 20:27:46.910843 46712 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:27:46.911354 46712 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.911375 46712 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0001db7d0 3 D0712 20:27:46.911383 46712 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:27:46.916914 46712 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.916965 46712 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0001db7d0 4 D0712 20:27:46.916977 46712 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:27:46.918357 46712 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.918383 46712 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0001db7d0 5 D0712 20:27:46.918392 46712 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:27:46.918443 46712 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.918455 46712 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0001db7d0 6 D0712 20:27:46.918461 46712 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:27:46.918626 46712 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.918644 46712 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0001db7d0 7 D0712 20:27:46.918650 46712 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:27:46.918816 46712 usertrap_amd64.go:212] [ 730: 731] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.918840 46712 usertrap_amd64.go:122] [ 730: 731] Allocate a new trap: 0xc0001db7d0 8 D0712 20:27:46.918852 46712 usertrap_amd64.go:225] [ 730: 731] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:27:46.918998 46712 usertrap_amd64.go:212] [ 730: 732] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:46.919023 46712 usertrap_amd64.go:122] [ 730: 732] Allocate a new trap: 0xc0001db7d0 9 D0712 20:27:46.919035 46712 usertrap_amd64.go:225] [ 730: 732] Apply the binary patch addr 46b6e0 trap addr 682d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:27:46.919055 46712 usertrap_amd64.go:212] [ 730: 731] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.919062 46712 usertrap_amd64.go:122] [ 730: 731] Allocate a new trap: 0xc0001db7d0 10 D0712 20:27:46.919069 46712 usertrap_amd64.go:225] [ 730: 731] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:27:46.919080 46712 usertrap_amd64.go:212] [ 730: 732] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.919088 46712 usertrap_amd64.go:122] [ 730: 732] Allocate a new trap: 0xc0001db7d0 11 D0712 20:27:46.919096 46712 usertrap_amd64.go:225] [ 730: 732] Apply the binary patch addr 46b57c trap addr 68370 ([184 202 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:27:46.926314 46712 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.926343 46712 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0001db7d0 12 D0712 20:27:46.926352 46712 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:27:46.929309 46712 usertrap_amd64.go:212] [ 730: 731] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.929343 46712 usertrap_amd64.go:122] [ 730: 731] Allocate a new trap: 0xc0001db7d0 13 D0712 20:27:46.929359 46712 usertrap_amd64.go:225] [ 730: 731] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:27:46.929446 46712 usertrap_amd64.go:212] [ 730: 731] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.929463 46712 usertrap_amd64.go:122] [ 730: 731] Allocate a new trap: 0xc0001db7d0 14 D0712 20:27:46.929474 46712 usertrap_amd64.go:225] [ 730: 731] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:27:46.929509 46712 task_signals.go:470] [ 730: 730] Notified of signal 23 D0712 20:27:46.929597 46712 task_signals.go:220] [ 730: 730] Signal 23: delivering to handler D0712 20:27:46.936826 46712 usertrap_amd64.go:212] [ 730: 730] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.936856 46712 usertrap_amd64.go:122] [ 730: 730] Allocate a new trap: 0xc0001db7d0 15 D0712 20:27:46.936865 46712 usertrap_amd64.go:225] [ 730: 730] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0712 20:27:46.936929 46712 task_exit.go:204] [ 730: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.937003 46712 task_exit.go:204] [ 730: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.937047 46712 task_signals.go:204] [ 730: 733] Signal 730, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.937073 46712 task_exit.go:204] [ 730: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.937082 46712 task_exit.go:204] [ 730: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.937087 46712 task_exit.go:204] [ 730: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.937037 46712 task_signals.go:204] [ 730: 732] Signal 730, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.937116 46712 task_exit.go:204] [ 730: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.937122 46712 task_exit.go:204] [ 730: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.937121 46712 task_signals.go:204] [ 730: 734] Signal 730, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.937136 46712 task_exit.go:204] [ 730: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.937094 46712 task_signals.go:204] [ 730: 731] Signal 730, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.937217 46712 task_exit.go:204] [ 730: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.937256 46712 task_exit.go:204] [ 730: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.937267 46712 task_exit.go:204] [ 730: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.937282 46712 task_exit.go:204] [ 730: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.938454 46712 task_exit.go:204] [ 730: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.938487 46712 task_exit.go:204] [ 730: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.938510 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.938563 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.938575 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.938665 46712 task_exit.go:204] [ 730: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.938886 46712 task_signals.go:470] [ 6: 8] Notified of signal 23 D0712 20:27:46.938982 46712 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0712 20:27:46.939646 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.941407 46712 syscalls.go:262] [ 735: 735] Allocating stack with size of 8388608 bytes D0712 20:27:46.941590 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.952377 46712 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.952445 46712 usertrap_amd64.go:106] [ 735: 735] Map a usertrap vma at 65000 D0712 20:27:46.952682 46712 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc00086b1a0 1 D0712 20:27:46.952743 46712 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:27:46.953399 46712 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.953429 46712 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc00086b1a0 2 D0712 20:27:46.953437 46712 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:27:46.955004 46712 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.955057 46712 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc00086b1a0 3 D0712 20:27:46.955073 46712 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:27:46.963511 46712 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:46.963583 46712 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc00086b1a0 4 D0712 20:27:46.963609 46712 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:27:46.965363 46712 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:46.965399 46712 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc00086b1a0 5 D0712 20:27:46.965418 46712 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:27:46.965649 46712 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46b214:sysno 13 D0712 20:27:46.965689 46712 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc00086b1a0 6 D0712 20:27:46.965722 46712 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:27:46.966037 46712 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:46.966059 46712 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc00086b1a0 7 D0712 20:27:46.966068 46712 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:27:46.966260 46712 usertrap_amd64.go:212] [ 735: 736] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:46.966287 46712 usertrap_amd64.go:122] [ 735: 736] Allocate a new trap: 0xc00086b1a0 8 D0712 20:27:46.966299 46712 usertrap_amd64.go:225] [ 735: 736] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:27:46.966445 46712 usertrap_amd64.go:212] [ 735: 736] Found the pattern at ip 46af76:sysno 35 D0712 20:27:46.966478 46712 usertrap_amd64.go:122] [ 735: 736] Allocate a new trap: 0xc00086b1a0 9 D0712 20:27:46.966493 46712 usertrap_amd64.go:225] [ 735: 736] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:27:46.966605 46712 usertrap_amd64.go:212] [ 735: 738] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:46.966630 46712 usertrap_amd64.go:122] [ 735: 738] Allocate a new trap: 0xc00086b1a0 10 D0712 20:27:46.966640 46712 usertrap_amd64.go:225] [ 735: 738] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:27:46.966762 46712 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:46.966793 46712 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc00086b1a0 11 D0712 20:27:46.966805 46712 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:27:46.975672 46712 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46af29:sysno 293 D0712 20:27:46.975698 46712 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc00086b1a0 12 D0712 20:27:46.975715 46712 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:27:46.978291 46712 usertrap_amd64.go:212] [ 735: 736] Found the pattern at ip 46b020:sysno 39 D0712 20:27:46.978362 46712 usertrap_amd64.go:122] [ 735: 736] Allocate a new trap: 0xc00086b1a0 13 D0712 20:27:46.978389 46712 usertrap_amd64.go:225] [ 735: 736] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:27:46.978465 46712 usertrap_amd64.go:212] [ 735: 736] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:46.978471 46712 usertrap_amd64.go:122] [ 735: 736] Allocate a new trap: 0xc00086b1a0 14 D0712 20:27:46.978478 46712 usertrap_amd64.go:225] [ 735: 736] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:27:46.978498 46712 task_signals.go:470] [ 735: 735] Notified of signal 23 D0712 20:27:46.978593 46712 task_signals.go:220] [ 735: 735] Signal 23: delivering to handler I0712 20:27:46.986861 46712 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0712 20:27:46.986972 46712 usertrap_amd64.go:212] [ 735: 735] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:46.987003 46712 usertrap_amd64.go:122] [ 735: 735] Allocate a new trap: 0xc00086b1a0 15 D0712 20:27:46.987015 46712 usertrap_amd64.go:225] [ 735: 735] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0712 20:27:46.987117 46712 task_exit.go:204] [ 735: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.987141 46712 task_exit.go:204] [ 735: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.987173 46712 task_signals.go:204] [ 735: 738] Signal 735, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.987173 46712 task_signals.go:204] [ 735: 737] Signal 735, PID: 737, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.987195 46712 task_exit.go:204] [ 735: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.987226 46712 task_exit.go:204] [ 735: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.987287 46712 task_exit.go:204] [ 735: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.987306 46712 task_exit.go:204] [ 735: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.987319 46712 task_exit.go:204] [ 735: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.987323 46712 task_exit.go:204] [ 735: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.987346 46712 task_signals.go:204] [ 735: 736] Signal 735, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.987356 46712 task_exit.go:204] [ 735: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.987364 46712 task_exit.go:204] [ 735: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.987370 46712 task_exit.go:204] [ 735: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.987387 46712 task_signals.go:204] [ 735: 739] Signal 735, PID: 739, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:46.987413 46712 task_exit.go:204] [ 735: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:46.988674 46712 task_exit.go:204] [ 735: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:46.988705 46712 task_exit.go:204] [ 735: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.988718 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:46.988750 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:46.988786 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:46.989044 46712 task_exit.go:204] [ 735: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:46.989245 46712 task_signals.go:470] [ 6: 8] Notified of signal 23 D0712 20:27:46.989353 46712 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0712 20:27:46.989921 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.991674 46712 syscalls.go:262] [ 740: 740] Allocating stack with size of 8388608 bytes D0712 20:27:46.991848 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:46.993112 46712 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:46.993159 46712 usertrap_amd64.go:106] [ 740: 740] Map a usertrap vma at 61000 D0712 20:27:46.993289 46712 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d4c420 1 D0712 20:27:46.993319 46712 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:27:46.993814 46712 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:46.993839 46712 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d4c420 2 D0712 20:27:46.993857 46712 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:27:46.994842 46712 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:46.994862 46712 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d4c420 3 D0712 20:27:46.994876 46712 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:27:47.002840 46712 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.002889 46712 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d4c420 4 D0712 20:27:47.002905 46712 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:27:47.004208 46712 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.004226 46712 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d4c420 5 D0712 20:27:47.004240 46712 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:27:47.004320 46712 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.004338 46712 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d4c420 6 D0712 20:27:47.004355 46712 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:27:47.004691 46712 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.004719 46712 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d4c420 7 D0712 20:27:47.004728 46712 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:27:47.004920 46712 usertrap_amd64.go:212] [ 740: 741] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.004996 46712 usertrap_amd64.go:122] [ 740: 741] Allocate a new trap: 0xc000d4c420 8 D0712 20:27:47.005014 46712 usertrap_amd64.go:225] [ 740: 741] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:27:47.005242 46712 usertrap_amd64.go:212] [ 740: 741] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.005275 46712 usertrap_amd64.go:122] [ 740: 741] Allocate a new trap: 0xc000d4c420 9 D0712 20:27:47.005291 46712 usertrap_amd64.go:225] [ 740: 741] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:27:47.005317 46712 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.005324 46712 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d4c420 10 D0712 20:27:47.005413 46712 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:27:47.012904 46712 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.012936 46712 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d4c420 11 D0712 20:27:47.012978 46712 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:27:47.015600 46712 usertrap_amd64.go:212] [ 740: 741] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.015628 46712 usertrap_amd64.go:122] [ 740: 741] Allocate a new trap: 0xc000d4c420 12 D0712 20:27:47.015641 46712 usertrap_amd64.go:225] [ 740: 741] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:27:47.015703 46712 usertrap_amd64.go:212] [ 740: 741] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.015715 46712 usertrap_amd64.go:122] [ 740: 741] Allocate a new trap: 0xc000d4c420 13 D0712 20:27:47.015724 46712 usertrap_amd64.go:225] [ 740: 741] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:27:47.015753 46712 task_signals.go:470] [ 740: 740] Notified of signal 23 D0712 20:27:47.015892 46712 task_signals.go:220] [ 740: 740] Signal 23: delivering to handler I0712 20:27:47.023522 46712 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0712 20:27:47.023602 46712 usertrap_amd64.go:212] [ 740: 740] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.023610 46712 usertrap_amd64.go:122] [ 740: 740] Allocate a new trap: 0xc000d4c420 14 D0712 20:27:47.023619 46712 usertrap_amd64.go:225] [ 740: 740] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:27:47.023645 46712 task_exit.go:204] [ 740: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.023662 46712 task_exit.go:204] [ 740: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.023684 46712 task_signals.go:204] [ 740: 743] Signal 740, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.023682 46712 task_signals.go:204] [ 740: 742] Signal 740, PID: 742, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.023699 46712 task_exit.go:204] [ 740: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.023714 46712 task_signals.go:204] [ 740: 741] Signal 740, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.023725 46712 task_exit.go:204] [ 740: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.023740 46712 task_exit.go:204] [ 740: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.023756 46712 task_signals.go:204] [ 740: 744] Signal 740, PID: 744, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.023772 46712 task_exit.go:204] [ 740: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.023777 46712 task_exit.go:204] [ 740: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.023781 46712 task_exit.go:204] [ 740: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.023791 46712 task_exit.go:204] [ 740: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.023811 46712 task_exit.go:204] [ 740: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.023826 46712 task_exit.go:204] [ 740: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.023832 46712 task_exit.go:204] [ 740: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.025030 46712 task_exit.go:204] [ 740: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.025064 46712 task_exit.go:204] [ 740: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.025076 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.025140 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.025181 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.025230 46712 task_exit.go:204] [ 740: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.026066 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.027725 46712 syscalls.go:262] [ 745: 745] Allocating stack with size of 8388608 bytes D0712 20:27:47.027911 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.029083 46712 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.029141 46712 usertrap_amd64.go:106] [ 745: 745] Map a usertrap vma at 66000 D0712 20:27:47.029298 46712 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000a9fda0 1 D0712 20:27:47.029489 46712 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:47.030093 46712 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.030159 46712 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000a9fda0 2 D0712 20:27:47.030186 46712 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:47.031056 46712 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.031092 46712 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000a9fda0 3 D0712 20:27:47.031105 46712 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:47.038704 46712 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.038740 46712 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000a9fda0 4 D0712 20:27:47.038753 46712 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:47.040050 46712 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.040082 46712 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000a9fda0 5 D0712 20:27:47.040106 46712 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:47.040160 46712 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.040165 46712 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000a9fda0 6 D0712 20:27:47.040171 46712 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:47.040382 46712 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.040410 46712 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000a9fda0 7 D0712 20:27:47.040433 46712 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:47.040617 46712 usertrap_amd64.go:212] [ 745: 746] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.040644 46712 usertrap_amd64.go:122] [ 745: 746] Allocate a new trap: 0xc000a9fda0 8 D0712 20:27:47.040654 46712 usertrap_amd64.go:225] [ 745: 746] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:47.040921 46712 usertrap_amd64.go:212] [ 745: 746] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.040967 46712 usertrap_amd64.go:122] [ 745: 746] Allocate a new trap: 0xc000a9fda0 9 D0712 20:27:47.040979 46712 usertrap_amd64.go:225] [ 745: 746] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:47.041070 46712 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.041095 46712 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000a9fda0 10 D0712 20:27:47.041109 46712 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:47.048089 46712 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.048120 46712 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000a9fda0 11 D0712 20:27:47.048133 46712 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:47.051337 46712 usertrap_amd64.go:212] [ 745: 746] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.051379 46712 usertrap_amd64.go:122] [ 745: 746] Allocate a new trap: 0xc000a9fda0 12 D0712 20:27:47.051396 46712 usertrap_amd64.go:225] [ 745: 746] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:47.051457 46712 usertrap_amd64.go:212] [ 745: 746] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.051488 46712 usertrap_amd64.go:122] [ 745: 746] Allocate a new trap: 0xc000a9fda0 13 D0712 20:27:47.051502 46712 usertrap_amd64.go:225] [ 745: 746] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:47.051554 46712 task_signals.go:470] [ 745: 745] Notified of signal 23 D0712 20:27:47.051737 46712 task_signals.go:220] [ 745: 745] Signal 23: delivering to handler D0712 20:27:47.058121 46712 usertrap_amd64.go:212] [ 745: 745] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.058149 46712 usertrap_amd64.go:122] [ 745: 745] Allocate a new trap: 0xc000a9fda0 14 D0712 20:27:47.058159 46712 usertrap_amd64.go:225] [ 745: 745] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:47.058226 46712 task_exit.go:204] [ 745: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.058251 46712 task_exit.go:204] [ 745: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.058272 46712 task_signals.go:204] [ 745: 748] Signal 745, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.058269 46712 task_signals.go:204] [ 745: 747] Signal 745, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.058284 46712 task_exit.go:204] [ 745: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.058293 46712 task_exit.go:204] [ 745: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.058300 46712 task_exit.go:204] [ 745: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.058315 46712 task_signals.go:204] [ 745: 746] Signal 745, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.058326 46712 task_exit.go:204] [ 745: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.058361 46712 task_signals.go:204] [ 745: 749] Signal 745, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.058374 46712 task_exit.go:204] [ 745: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.058378 46712 task_exit.go:204] [ 745: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.058388 46712 task_exit.go:204] [ 745: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.058400 46712 task_exit.go:204] [ 745: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.058403 46712 task_exit.go:204] [ 745: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.058409 46712 task_exit.go:204] [ 745: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.059588 46712 task_exit.go:204] [ 745: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.059623 46712 task_exit.go:204] [ 745: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.059647 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.059706 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.059725 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.059916 46712 task_exit.go:204] [ 745: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.060676 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.062024 46712 syscalls.go:262] [ 750: 750] Allocating stack with size of 8388608 bytes D0712 20:27:47.062170 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.063375 46712 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.063417 46712 usertrap_amd64.go:106] [ 750: 750] Map a usertrap vma at 61000 D0712 20:27:47.063624 46712 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc00107d0b0 1 D0712 20:27:47.063673 46712 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:27:47.064057 46712 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.064086 46712 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc00107d0b0 2 D0712 20:27:47.064100 46712 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:27:47.064557 46712 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.064581 46712 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc00107d0b0 3 D0712 20:27:47.064591 46712 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:27:47.071744 46712 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.071794 46712 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc00107d0b0 4 D0712 20:27:47.071813 46712 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:27:47.073127 46712 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.073158 46712 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc00107d0b0 5 D0712 20:27:47.073170 46712 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:27:47.073245 46712 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.073265 46712 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc00107d0b0 6 D0712 20:27:47.073280 46712 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:27:47.073543 46712 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.073569 46712 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc00107d0b0 7 D0712 20:27:47.073579 46712 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:27:47.073756 46712 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.073781 46712 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc00107d0b0 8 D0712 20:27:47.073796 46712 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:27:47.074075 46712 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.074113 46712 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc00107d0b0 9 D0712 20:27:47.074163 46712 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:27:47.074179 46712 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.074192 46712 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc00107d0b0 10 D0712 20:27:47.074210 46712 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:27:47.082268 46712 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.082301 46712 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc00107d0b0 11 D0712 20:27:47.082317 46712 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:27:47.084865 46712 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.085089 46712 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc00107d0b0 12 D0712 20:27:47.085125 46712 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:27:47.085171 46712 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.085185 46712 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc00107d0b0 13 D0712 20:27:47.085195 46712 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:27:47.085239 46712 task_signals.go:470] [ 750: 750] Notified of signal 23 D0712 20:27:47.085344 46712 task_signals.go:220] [ 750: 750] Signal 23: delivering to handler D0712 20:27:47.094392 46712 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.094455 46712 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc00107d0b0 14 D0712 20:27:47.094473 46712 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:27:47.094579 46712 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.094661 46712 task_signals.go:204] [ 750: 751] Signal 750, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.094658 46712 task_signals.go:204] [ 750: 754] Signal 750, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.094703 46712 task_signals.go:204] [ 750: 752] Signal 750, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.094770 46712 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.094796 46712 task_signals.go:204] [ 750: 753] Signal 750, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.094817 46712 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.094865 46712 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.094881 46712 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.094910 46712 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.094929 46712 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.094935 46712 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.094949 46712 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.094960 46712 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.094966 46712 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.094996 46712 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.096211 46712 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.096245 46712 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.096297 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.096339 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.096380 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.096579 46712 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.097580 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.099197 46712 syscalls.go:262] [ 755: 755] Allocating stack with size of 8388608 bytes D0712 20:27:47.099418 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.100796 46712 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.100845 46712 usertrap_amd64.go:106] [ 755: 755] Map a usertrap vma at 63000 D0712 20:27:47.100998 46712 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc001d08390 1 D0712 20:27:47.101044 46712 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:47.101548 46712 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.101600 46712 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc001d08390 2 D0712 20:27:47.101619 46712 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:47.102513 46712 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.102548 46712 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc001d08390 3 D0712 20:27:47.102561 46712 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:47.109361 46712 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.109411 46712 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc001d08390 4 D0712 20:27:47.109427 46712 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:47.110595 46712 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.110628 46712 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc001d08390 5 D0712 20:27:47.110642 46712 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:47.110713 46712 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.110721 46712 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc001d08390 6 D0712 20:27:47.110729 46712 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:47.111044 46712 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.111068 46712 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc001d08390 7 D0712 20:27:47.111078 46712 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:47.111265 46712 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.111284 46712 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc001d08390 8 D0712 20:27:47.111294 46712 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:47.111382 46712 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.111396 46712 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc001d08390 9 D0712 20:27:47.111404 46712 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:47.111650 46712 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.111682 46712 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc001d08390 10 D0712 20:27:47.111695 46712 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:47.121875 46712 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.121920 46712 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc001d08390 11 D0712 20:27:47.121943 46712 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:47.124551 46712 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.124600 46712 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc001d08390 12 D0712 20:27:47.124617 46712 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:47.124729 46712 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.124752 46712 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc001d08390 13 D0712 20:27:47.124762 46712 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:47.124808 46712 task_signals.go:470] [ 755: 755] Notified of signal 23 D0712 20:27:47.124912 46712 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler D0712 20:27:47.133610 46712 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.133658 46712 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc001d08390 14 D0712 20:27:47.133674 46712 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:47.133739 46712 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.133767 46712 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.133805 46712 task_signals.go:204] [ 755: 759] Signal 755, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.133824 46712 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.133833 46712 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.133808 46712 task_signals.go:204] [ 755: 757] Signal 755, PID: 757, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.133839 46712 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.133879 46712 task_signals.go:204] [ 755: 756] Signal 755, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.133901 46712 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.133916 46712 task_signals.go:204] [ 755: 758] Signal 755, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.133935 46712 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.133959 46712 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.133969 46712 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.133975 46712 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.133979 46712 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.133990 46712 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.135384 46712 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.135439 46712 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.135458 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.135493 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.135532 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.135567 46712 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.136464 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.138046 46712 syscalls.go:262] [ 760: 760] Allocating stack with size of 8388608 bytes D0712 20:27:47.138345 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.139551 46712 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.139597 46712 usertrap_amd64.go:106] [ 760: 760] Map a usertrap vma at 61000 D0712 20:27:47.139670 46712 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc001d083f0 1 D0712 20:27:47.139711 46712 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:27:47.140160 46712 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.140194 46712 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc001d083f0 2 D0712 20:27:47.140209 46712 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:27:47.141147 46712 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.141174 46712 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc001d083f0 3 D0712 20:27:47.141188 46712 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:27:47.146965 46712 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.146989 46712 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc001d083f0 4 D0712 20:27:47.146999 46712 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:27:47.148304 46712 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.148331 46712 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc001d083f0 5 D0712 20:27:47.148341 46712 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:27:47.148411 46712 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.148421 46712 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc001d083f0 6 D0712 20:27:47.148428 46712 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:27:47.148672 46712 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.148683 46712 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc001d083f0 7 D0712 20:27:47.148691 46712 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:27:47.148839 46712 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.148851 46712 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc001d083f0 8 D0712 20:27:47.148860 46712 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:27:47.149150 46712 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.149180 46712 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc001d083f0 9 D0712 20:27:47.149191 46712 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:27:47.149246 46712 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.149267 46712 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc001d083f0 10 D0712 20:27:47.149275 46712 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:27:47.149695 46712 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.149719 46712 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc001d083f0 11 D0712 20:27:47.149729 46712 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:27:47.149844 46712 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.149859 46712 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc001d083f0 12 D0712 20:27:47.149869 46712 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:27:47.149950 46712 task_signals.go:470] [ 760: 760] Notified of signal 23 D0712 20:27:47.150053 46712 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler D0712 20:27:47.156120 46712 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.156150 46712 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc001d083f0 13 D0712 20:27:47.156163 46712 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:27:47.161967 46712 task_signals.go:470] [ 760: 760] Notified of signal 23 D0712 20:27:47.162044 46712 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler D0712 20:27:47.165548 46712 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.165574 46712 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc001d083f0 14 D0712 20:27:47.165587 46712 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:27:47.165654 46712 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.165682 46712 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.165729 46712 task_signals.go:204] [ 760: 761] Signal 760, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.165742 46712 task_signals.go:204] [ 760: 763] Signal 760, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.165754 46712 task_signals.go:204] [ 760: 764] Signal 760, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.165765 46712 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.165798 46712 task_signals.go:204] [ 760: 762] Signal 760, PID: 762, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.165812 46712 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.165822 46712 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.165831 46712 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.165837 46712 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.165840 46712 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.165847 46712 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.165863 46712 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.165867 46712 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.165874 46712 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.166990 46712 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.167018 46712 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.167030 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.167065 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.167076 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.167242 46712 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.167402 46712 task_signals.go:470] [ 6: 21] Notified of signal 23 D0712 20:27:47.167448 46712 task_signals.go:179] [ 6: 21] Restarting syscall 202: interrupted by signal 23 D0712 20:27:47.167521 46712 task_signals.go:220] [ 6: 21] Signal 23: delivering to handler D0712 20:27:47.168027 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.169951 46712 syscalls.go:262] [ 765: 765] Allocating stack with size of 8388608 bytes D0712 20:27:47.170140 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.171494 46712 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.171552 46712 usertrap_amd64.go:106] [ 765: 765] Map a usertrap vma at 64000 D0712 20:27:47.171694 46712 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc00107d530 1 D0712 20:27:47.171735 46712 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:27:47.172287 46712 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.172343 46712 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc00107d530 2 D0712 20:27:47.172359 46712 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:27:47.173107 46712 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.173134 46712 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc00107d530 3 D0712 20:27:47.173144 46712 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:27:47.179474 46712 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.179511 46712 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc00107d530 4 D0712 20:27:47.179526 46712 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:27:47.180654 46712 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.180676 46712 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc00107d530 5 D0712 20:27:47.180686 46712 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:27:47.180760 46712 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.180765 46712 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc00107d530 6 D0712 20:27:47.180771 46712 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:27:47.181313 46712 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.181341 46712 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc00107d530 7 D0712 20:27:47.181349 46712 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:27:47.181548 46712 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.181578 46712 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc00107d530 8 D0712 20:27:47.181590 46712 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:27:47.181785 46712 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.181814 46712 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc00107d530 9 D0712 20:27:47.181913 46712 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:27:47.181957 46712 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.181987 46712 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc00107d530 10 D0712 20:27:47.182004 46712 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:27:47.188491 46712 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.188520 46712 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc00107d530 11 D0712 20:27:47.188532 46712 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:27:47.192552 46712 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.192588 46712 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc00107d530 12 D0712 20:27:47.192615 46712 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:27:47.192646 46712 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.192653 46712 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc00107d530 13 D0712 20:27:47.192659 46712 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:27:47.192672 46712 task_signals.go:470] [ 765: 765] Notified of signal 23 D0712 20:27:47.192872 46712 task_signals.go:220] [ 765: 765] Signal 23: delivering to handler D0712 20:27:47.198367 46712 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.198398 46712 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc00107d530 14 D0712 20:27:47.198408 46712 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:27:47.198460 46712 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.198488 46712 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.198507 46712 task_signals.go:204] [ 765: 768] Signal 765, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.198508 46712 task_signals.go:204] [ 765: 767] Signal 765, PID: 767, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.198520 46712 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.198583 46712 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.198587 46712 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.198597 46712 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.198604 46712 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.198610 46712 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.198623 46712 task_signals.go:204] [ 765: 769] Signal 765, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.198644 46712 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.198659 46712 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.198666 46712 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.198679 46712 task_signals.go:204] [ 765: 766] Signal 765, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.198687 46712 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.199662 46712 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.199688 46712 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.199697 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.199761 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.199768 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.199896 46712 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.200727 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.202126 46712 syscalls.go:262] [ 770: 770] Allocating stack with size of 8388608 bytes D0712 20:27:47.202261 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.202886 46712 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.202921 46712 usertrap_amd64.go:106] [ 770: 770] Map a usertrap vma at 6a000 D0712 20:27:47.203067 46712 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d4cfc0 1 D0712 20:27:47.203092 46712 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:27:47.203529 46712 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.203565 46712 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d4cfc0 2 D0712 20:27:47.203576 46712 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:27:47.204165 46712 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.204192 46712 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d4cfc0 3 D0712 20:27:47.204200 46712 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:27:47.209313 46712 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.209341 46712 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d4cfc0 4 D0712 20:27:47.209353 46712 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:27:47.210764 46712 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.210800 46712 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d4cfc0 5 D0712 20:27:47.210813 46712 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:27:47.210886 46712 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.210907 46712 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d4cfc0 6 D0712 20:27:47.210914 46712 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:27:47.211281 46712 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.211305 46712 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d4cfc0 7 D0712 20:27:47.211313 46712 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:27:47.211478 46712 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.211499 46712 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000d4cfc0 8 D0712 20:27:47.211508 46712 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:27:47.211655 46712 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.211689 46712 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000d4cfc0 9 D0712 20:27:47.211702 46712 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:27:47.211994 46712 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.212042 46712 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d4cfc0 10 D0712 20:27:47.212055 46712 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:27:47.221906 46712 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.221939 46712 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d4cfc0 11 D0712 20:27:47.221953 46712 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:27:47.224758 46712 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.224799 46712 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000d4cfc0 12 D0712 20:27:47.224813 46712 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:27:47.224913 46712 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.224970 46712 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000d4cfc0 13 D0712 20:27:47.225006 46712 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:27:47.225040 46712 task_signals.go:470] [ 770: 770] Notified of signal 23 D0712 20:27:47.225138 46712 task_signals.go:220] [ 770: 770] Signal 23: delivering to handler D0712 20:27:47.234698 46712 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.234745 46712 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d4cfc0 14 D0712 20:27:47.234761 46712 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:27:47.234908 46712 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.234956 46712 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.234993 46712 task_signals.go:204] [ 770: 772] Signal 770, PID: 772, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.235020 46712 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.235031 46712 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.235038 46712 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.235059 46712 task_signals.go:204] [ 770: 771] Signal 770, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.235079 46712 task_signals.go:204] [ 770: 774] Signal 770, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.235091 46712 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.235109 46712 task_signals.go:204] [ 770: 773] Signal 770, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.235126 46712 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.235134 46712 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.235144 46712 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.235152 46712 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.235167 46712 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.235177 46712 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.237000 46712 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.237037 46712 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.237307 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.237365 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.237379 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.237511 46712 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.238743 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.240859 46712 syscalls.go:262] [ 775: 775] Allocating stack with size of 8388608 bytes D0712 20:27:47.241287 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.242434 46712 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.242473 46712 usertrap_amd64.go:106] [ 775: 775] Map a usertrap vma at 64000 D0712 20:27:47.242532 46712 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc001d08f00 1 D0712 20:27:47.242558 46712 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:27:47.243060 46712 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.243087 46712 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc001d08f00 2 D0712 20:27:47.243101 46712 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:27:47.244031 46712 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.244086 46712 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc001d08f00 3 D0712 20:27:47.244109 46712 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:27:47.251453 46712 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.251490 46712 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc001d08f00 4 D0712 20:27:47.251503 46712 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:27:47.252714 46712 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.252757 46712 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc001d08f00 5 D0712 20:27:47.252779 46712 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:27:47.252877 46712 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.252899 46712 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc001d08f00 6 D0712 20:27:47.252914 46712 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:27:47.253218 46712 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.253238 46712 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc001d08f00 7 D0712 20:27:47.253255 46712 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:27:47.253477 46712 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.253498 46712 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc001d08f00 8 D0712 20:27:47.253509 46712 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:27:47.253997 46712 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:47.254186 46712 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc001d08f00 9 D0712 20:27:47.254201 46712 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b6e0 trap addr 642d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:27:47.254301 46712 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.254313 46712 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc001d08f00 10 D0712 20:27:47.254387 46712 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:27:47.254427 46712 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.254437 46712 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc001d08f00 11 D0712 20:27:47.254446 46712 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46af76 trap addr 64370 ([184 35 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:27:47.263135 46712 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.263167 46712 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc001d08f00 12 D0712 20:27:47.263194 46712 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:27:47.267354 46712 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.267388 46712 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc001d08f00 13 D0712 20:27:47.267399 46712 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:27:47.267449 46712 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.267458 46712 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc001d08f00 14 D0712 20:27:47.267467 46712 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:27:47.267507 46712 task_signals.go:470] [ 775: 775] Notified of signal 23 D0712 20:27:47.267591 46712 task_signals.go:220] [ 775: 775] Signal 23: delivering to handler D0712 20:27:47.274069 46712 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.274104 46712 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc001d08f00 15 D0712 20:27:47.274115 46712 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0712 20:27:47.274187 46712 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.274235 46712 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.274268 46712 task_signals.go:204] [ 775: 776] Signal 775, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.274282 46712 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.274291 46712 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.274298 46712 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.274326 46712 task_signals.go:204] [ 775: 777] Signal 775, PID: 777, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.274338 46712 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.274347 46712 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.274356 46712 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.274372 46712 task_signals.go:204] [ 775: 778] Signal 775, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.274380 46712 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.274385 46712 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.274392 46712 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.274405 46712 task_signals.go:204] [ 775: 779] Signal 775, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.274426 46712 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.275964 46712 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.276013 46712 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.276039 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.276094 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.276111 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.276194 46712 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.277109 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.278998 46712 syscalls.go:262] [ 780: 780] Allocating stack with size of 8388608 bytes D0712 20:27:47.279375 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.281388 46712 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.281504 46712 usertrap_amd64.go:106] [ 780: 780] Map a usertrap vma at 69000 D0712 20:27:47.281685 46712 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001bf58c0 1 D0712 20:27:47.281724 46712 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:27:47.282120 46712 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.282210 46712 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001bf58c0 2 D0712 20:27:47.282231 46712 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:27:47.283032 46712 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.283054 46712 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001bf58c0 3 D0712 20:27:47.283063 46712 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:27:47.290746 46712 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.290781 46712 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001bf58c0 4 D0712 20:27:47.290795 46712 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:27:47.292275 46712 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.292317 46712 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001bf58c0 5 D0712 20:27:47.292331 46712 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:27:47.292374 46712 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.292379 46712 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001bf58c0 6 D0712 20:27:47.292384 46712 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:27:47.292752 46712 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.292769 46712 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001bf58c0 7 D0712 20:27:47.292776 46712 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:27:47.293025 46712 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.293153 46712 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc001bf58c0 8 D0712 20:27:47.293196 46712 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:27:47.293446 46712 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.293466 46712 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001bf58c0 9 D0712 20:27:47.293478 46712 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:27:47.293555 46712 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.293571 46712 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc001bf58c0 10 D0712 20:27:47.293581 46712 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:27:47.294092 46712 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.294132 46712 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc001bf58c0 11 D0712 20:27:47.294144 46712 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:27:47.294206 46712 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.294258 46712 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc001bf58c0 12 D0712 20:27:47.294274 46712 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:27:47.294401 46712 task_signals.go:470] [ 780: 780] Notified of signal 23 D0712 20:27:47.294460 46712 task_signals.go:220] [ 780: 780] Signal 23: delivering to handler D0712 20:27:47.302029 46712 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.302070 46712 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001bf58c0 13 D0712 20:27:47.302080 46712 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:27:47.306153 46712 task_signals.go:470] [ 780: 780] Notified of signal 23 D0712 20:27:47.306292 46712 task_signals.go:220] [ 780: 780] Signal 23: delivering to handler D0712 20:27:47.313469 46712 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.313518 46712 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001bf58c0 14 D0712 20:27:47.313538 46712 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:27:47.313620 46712 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.313660 46712 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.313692 46712 task_signals.go:204] [ 780: 783] Signal 780, PID: 783, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.313700 46712 task_signals.go:204] [ 780: 785] Signal 780, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.313722 46712 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.313716 46712 task_signals.go:204] [ 780: 781] Signal 780, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.313734 46712 task_signals.go:204] [ 780: 782] Signal 780, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.313752 46712 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.313763 46712 task_signals.go:204] [ 780: 784] Signal 780, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.313784 46712 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.313790 46712 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.313803 46712 task_exit.go:204] [ 780: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.313813 46712 task_exit.go:204] [ 780: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.313818 46712 task_exit.go:204] [ 780: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.313835 46712 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.313872 46712 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.313880 46712 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.313919 46712 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.313927 46712 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.313937 46712 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.315629 46712 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.315656 46712 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.315674 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.315714 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.315744 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.315870 46712 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.316640 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.318296 46712 syscalls.go:262] [ 786: 786] Allocating stack with size of 8388608 bytes D0712 20:27:47.318422 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.319278 46712 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.319347 46712 usertrap_amd64.go:106] [ 786: 786] Map a usertrap vma at 69000 D0712 20:27:47.319417 46712 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000d4d5f0 1 D0712 20:27:47.319439 46712 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:27:47.319790 46712 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.319803 46712 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000d4d5f0 2 D0712 20:27:47.319811 46712 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:27:47.320762 46712 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.320791 46712 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000d4d5f0 3 D0712 20:27:47.320801 46712 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:27:47.327495 46712 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.327526 46712 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000d4d5f0 4 D0712 20:27:47.327541 46712 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:27:47.328602 46712 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.328633 46712 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000d4d5f0 5 D0712 20:27:47.328645 46712 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:27:47.328696 46712 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.328711 46712 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000d4d5f0 6 D0712 20:27:47.328716 46712 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:27:47.329317 46712 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.329352 46712 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000d4d5f0 7 D0712 20:27:47.329367 46712 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:27:47.329583 46712 usertrap_amd64.go:212] [ 786: 787] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.329611 46712 usertrap_amd64.go:122] [ 786: 787] Allocate a new trap: 0xc000d4d5f0 8 D0712 20:27:47.329621 46712 usertrap_amd64.go:225] [ 786: 787] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:27:47.330035 46712 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.330060 46712 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000d4d5f0 9 D0712 20:27:47.330067 46712 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:27:47.330101 46712 usertrap_amd64.go:212] [ 786: 787] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.330119 46712 usertrap_amd64.go:122] [ 786: 787] Allocate a new trap: 0xc000d4d5f0 10 D0712 20:27:47.330133 46712 usertrap_amd64.go:225] [ 786: 787] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:27:47.330219 46712 usertrap_amd64.go:212] [ 786: 787] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.330252 46712 usertrap_amd64.go:122] [ 786: 787] Allocate a new trap: 0xc000d4d5f0 11 D0712 20:27:47.330262 46712 usertrap_amd64.go:225] [ 786: 787] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:27:47.330414 46712 usertrap_amd64.go:212] [ 786: 787] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.330453 46712 usertrap_amd64.go:122] [ 786: 787] Allocate a new trap: 0xc000d4d5f0 12 D0712 20:27:47.330466 46712 usertrap_amd64.go:225] [ 786: 787] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:27:47.330537 46712 task_signals.go:470] [ 786: 789] Notified of signal 23 D0712 20:27:47.330572 46712 task_signals.go:179] [ 786: 789] Restarting syscall 202: interrupted by signal 23 D0712 20:27:47.330610 46712 task_signals.go:220] [ 786: 789] Signal 23: delivering to handler D0712 20:27:47.338110 46712 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.338146 46712 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000d4d5f0 13 D0712 20:27:47.338159 46712 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:27:47.341027 46712 task_signals.go:470] [ 786: 786] Notified of signal 23 D0712 20:27:47.341155 46712 task_signals.go:220] [ 786: 786] Signal 23: delivering to handler D0712 20:27:47.350879 46712 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.350953 46712 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000d4d5f0 14 D0712 20:27:47.350973 46712 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:27:47.351056 46712 task_exit.go:204] [ 786: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.351100 46712 task_exit.go:204] [ 786: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.351123 46712 task_signals.go:204] [ 786: 790] Signal 786, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.351152 46712 task_signals.go:204] [ 786: 788] Signal 786, PID: 788, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.351157 46712 task_exit.go:204] [ 786: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.351139 46712 task_signals.go:204] [ 786: 787] Signal 786, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.351166 46712 task_exit.go:204] [ 786: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.351210 46712 task_exit.go:204] [ 786: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.351228 46712 task_exit.go:204] [ 786: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.351158 46712 task_signals.go:204] [ 786: 789] Signal 786, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.351258 46712 task_exit.go:204] [ 786: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.351295 46712 task_exit.go:204] [ 786: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.351303 46712 task_exit.go:204] [ 786: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.351353 46712 task_exit.go:204] [ 786: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.351471 46712 task_exit.go:204] [ 786: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.351499 46712 task_exit.go:204] [ 786: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.353041 46712 task_exit.go:204] [ 786: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.353079 46712 task_exit.go:204] [ 786: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.353097 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.353156 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.353188 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.353390 46712 task_exit.go:204] [ 786: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.354806 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.356253 46712 syscalls.go:262] [ 791: 791] Allocating stack with size of 8388608 bytes D0712 20:27:47.356524 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.358383 46712 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.358427 46712 usertrap_amd64.go:106] [ 791: 791] Map a usertrap vma at 63000 D0712 20:27:47.358562 46712 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc001afee40 1 D0712 20:27:47.358598 46712 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:47.359050 46712 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.359077 46712 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc001afee40 2 D0712 20:27:47.359088 46712 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:47.359775 46712 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.359807 46712 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc001afee40 3 D0712 20:27:47.359823 46712 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:47.367723 46712 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.367762 46712 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc001afee40 4 D0712 20:27:47.367778 46712 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:47.368927 46712 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.369020 46712 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc001afee40 5 D0712 20:27:47.369045 46712 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:47.369103 46712 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.369113 46712 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc001afee40 6 D0712 20:27:47.369122 46712 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:47.369500 46712 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.369534 46712 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc001afee40 7 D0712 20:27:47.369545 46712 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:47.369756 46712 usertrap_amd64.go:212] [ 791: 792] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.369810 46712 usertrap_amd64.go:122] [ 791: 792] Allocate a new trap: 0xc001afee40 8 D0712 20:27:47.369821 46712 usertrap_amd64.go:225] [ 791: 792] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:47.370031 46712 usertrap_amd64.go:212] [ 791: 792] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.370086 46712 usertrap_amd64.go:122] [ 791: 792] Allocate a new trap: 0xc001afee40 9 D0712 20:27:47.370100 46712 usertrap_amd64.go:225] [ 791: 792] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:47.370161 46712 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.370191 46712 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc001afee40 10 D0712 20:27:47.370205 46712 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:47.370345 46712 usertrap_amd64.go:212] [ 791: 794] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:47.370373 46712 usertrap_amd64.go:122] [ 791: 794] Allocate a new trap: 0xc001afee40 11 D0712 20:27:47.370451 46712 usertrap_amd64.go:225] [ 791: 794] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:47.379124 46712 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.379160 46712 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc001afee40 12 D0712 20:27:47.379173 46712 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:47.382213 46712 usertrap_amd64.go:212] [ 791: 792] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.382258 46712 usertrap_amd64.go:122] [ 791: 792] Allocate a new trap: 0xc001afee40 13 D0712 20:27:47.382298 46712 usertrap_amd64.go:225] [ 791: 792] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:47.382329 46712 usertrap_amd64.go:212] [ 791: 792] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.382347 46712 usertrap_amd64.go:122] [ 791: 792] Allocate a new trap: 0xc001afee40 14 D0712 20:27:47.382361 46712 usertrap_amd64.go:225] [ 791: 792] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:47.382457 46712 task_signals.go:470] [ 791: 791] Notified of signal 23 D0712 20:27:47.382534 46712 task_signals.go:220] [ 791: 791] Signal 23: delivering to handler D0712 20:27:47.391115 46712 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.391147 46712 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc001afee40 15 D0712 20:27:47.391158 46712 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 20:27:47.391327 46712 task_exit.go:204] [ 791: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.391424 46712 task_exit.go:204] [ 791: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.391462 46712 task_signals.go:204] [ 791: 793] Signal 791, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.391490 46712 task_exit.go:204] [ 791: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.391496 46712 task_exit.go:204] [ 791: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.391500 46712 task_exit.go:204] [ 791: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.391514 46712 task_signals.go:204] [ 791: 792] Signal 791, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.391521 46712 task_exit.go:204] [ 791: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.391526 46712 task_exit.go:204] [ 791: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.391531 46712 task_exit.go:204] [ 791: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.391540 46712 task_signals.go:204] [ 791: 794] Signal 791, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.391563 46712 task_exit.go:204] [ 791: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.391569 46712 task_exit.go:204] [ 791: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.391572 46712 task_exit.go:204] [ 791: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.391584 46712 task_signals.go:204] [ 791: 795] Signal 791, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.391591 46712 task_exit.go:204] [ 791: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.391596 46712 task_exit.go:204] [ 791: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.391600 46712 task_exit.go:204] [ 791: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.391609 46712 task_signals.go:204] [ 791: 796] Signal 791, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.391616 46712 task_exit.go:204] [ 791: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.393154 46712 task_exit.go:204] [ 791: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.393472 46712 task_exit.go:204] [ 791: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.393512 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.393589 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.393602 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.394068 46712 task_exit.go:204] [ 791: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.395412 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.397762 46712 syscalls.go:262] [ 797: 797] Allocating stack with size of 8388608 bytes D0712 20:27:47.397912 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.399446 46712 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.399495 46712 usertrap_amd64.go:106] [ 797: 797] Map a usertrap vma at 68000 D0712 20:27:47.399593 46712 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc001bf5ef0 1 D0712 20:27:47.399631 46712 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:27:47.399967 46712 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.399985 46712 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc001bf5ef0 2 D0712 20:27:47.399994 46712 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:27:47.401073 46712 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.401101 46712 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc001bf5ef0 3 D0712 20:27:47.401110 46712 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:27:47.408100 46712 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.408186 46712 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc001bf5ef0 4 D0712 20:27:47.408318 46712 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) executing program D0712 20:27:47.409737 46712 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.409754 46712 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc001bf5ef0 5 D0712 20:27:47.409786 46712 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:27:47.409908 46712 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.409942 46712 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc001bf5ef0 6 D0712 20:27:47.409954 46712 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:27:47.410351 46712 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.410367 46712 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc001bf5ef0 7 D0712 20:27:47.410377 46712 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:27:47.410656 46712 usertrap_amd64.go:212] [ 797: 798] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.410689 46712 usertrap_amd64.go:122] [ 797: 798] Allocate a new trap: 0xc001bf5ef0 8 D0712 20:27:47.410700 46712 usertrap_amd64.go:225] [ 797: 798] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:27:47.411305 46712 usertrap_amd64.go:212] [ 797: 798] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.411344 46712 usertrap_amd64.go:122] [ 797: 798] Allocate a new trap: 0xc001bf5ef0 9 D0712 20:27:47.411355 46712 usertrap_amd64.go:225] [ 797: 798] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:27:47.411384 46712 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.411393 46712 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc001bf5ef0 10 D0712 20:27:47.411406 46712 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:27:47.420813 46712 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.420851 46712 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc001bf5ef0 11 D0712 20:27:47.420863 46712 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:27:47.421848 46712 usertrap_amd64.go:212] [ 797: 798] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.421925 46712 usertrap_amd64.go:122] [ 797: 798] Allocate a new trap: 0xc001bf5ef0 12 D0712 20:27:47.421953 46712 usertrap_amd64.go:225] [ 797: 798] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:27:47.421986 46712 usertrap_amd64.go:212] [ 797: 798] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.421997 46712 usertrap_amd64.go:122] [ 797: 798] Allocate a new trap: 0xc001bf5ef0 13 D0712 20:27:47.422008 46712 usertrap_amd64.go:225] [ 797: 798] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:27:47.422034 46712 task_signals.go:470] [ 797: 797] Notified of signal 23 D0712 20:27:47.422154 46712 task_signals.go:220] [ 797: 797] Signal 23: delivering to handler D0712 20:27:47.433191 46712 usertrap_amd64.go:212] [ 797: 797] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.433251 46712 usertrap_amd64.go:122] [ 797: 797] Allocate a new trap: 0xc001bf5ef0 14 D0712 20:27:47.433268 46712 usertrap_amd64.go:225] [ 797: 797] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:27:47.433331 46712 task_exit.go:204] [ 797: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.433354 46712 task_exit.go:204] [ 797: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.433386 46712 task_signals.go:204] [ 797: 798] Signal 797, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.433408 46712 task_exit.go:204] [ 797: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.433416 46712 task_exit.go:204] [ 797: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.433428 46712 task_exit.go:204] [ 797: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.433433 46712 task_signals.go:204] [ 797: 800] Signal 797, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.433497 46712 task_exit.go:204] [ 797: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.433539 46712 task_exit.go:204] [ 797: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.433565 46712 task_exit.go:204] [ 797: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.433412 46712 task_signals.go:204] [ 797: 799] Signal 797, PID: 799, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.433455 46712 task_signals.go:204] [ 797: 801] Signal 797, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.433586 46712 task_exit.go:204] [ 797: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.433637 46712 task_exit.go:204] [ 797: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.433650 46712 task_exit.go:204] [ 797: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.433665 46712 task_exit.go:204] [ 797: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.435223 46712 task_exit.go:204] [ 797: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.435270 46712 task_exit.go:204] [ 797: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.435296 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.435327 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.435345 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.435371 46712 task_exit.go:204] [ 797: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.435619 46712 task_signals.go:470] [ 6: 19] Notified of signal 23 D0712 20:27:47.435658 46712 task_signals.go:220] [ 6: 19] Signal 23: delivering to handler D0712 20:27:47.436927 46712 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.438410 46712 syscalls.go:262] [ 802: 802] Allocating stack with size of 8388608 bytes D0712 20:27:47.438745 46712 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.440372 46712 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.440409 46712 usertrap_amd64.go:106] [ 802: 802] Map a usertrap vma at 66000 D0712 20:27:47.440504 46712 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001d093b0 1 D0712 20:27:47.440530 46712 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:47.441022 46712 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.441044 46712 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001d093b0 2 D0712 20:27:47.441055 46712 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:47.442212 46712 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.442267 46712 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001d093b0 3 D0712 20:27:47.442279 46712 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:47.448044 46712 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.448100 46712 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001d093b0 4 D0712 20:27:47.448118 46712 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:47.449713 46712 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.449774 46712 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001d093b0 5 D0712 20:27:47.449797 46712 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:47.450038 46712 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.450072 46712 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001d093b0 6 D0712 20:27:47.450086 46712 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:47.450817 46712 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.450841 46712 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001d093b0 7 D0712 20:27:47.450849 46712 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:47.451041 46712 usertrap_amd64.go:212] [ 802: 803] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.451079 46712 usertrap_amd64.go:122] [ 802: 803] Allocate a new trap: 0xc001d093b0 8 D0712 20:27:47.451096 46712 usertrap_amd64.go:225] [ 802: 803] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:47.451241 46712 usertrap_amd64.go:212] [ 802: 803] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.451269 46712 usertrap_amd64.go:122] [ 802: 803] Allocate a new trap: 0xc001d093b0 9 D0712 20:27:47.451281 46712 usertrap_amd64.go:225] [ 802: 803] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:47.451675 46712 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.451708 46712 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001d093b0 10 D0712 20:27:47.451724 46712 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:47.461002 46712 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.461052 46712 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001d093b0 11 D0712 20:27:47.461068 46712 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:47.463779 46712 usertrap_amd64.go:212] [ 802: 803] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.463820 46712 usertrap_amd64.go:122] [ 802: 803] Allocate a new trap: 0xc001d093b0 12 D0712 20:27:47.463835 46712 usertrap_amd64.go:225] [ 802: 803] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:47.463876 46712 usertrap_amd64.go:212] [ 802: 803] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.463885 46712 usertrap_amd64.go:122] [ 802: 803] Allocate a new trap: 0xc001d093b0 13 D0712 20:27:47.463892 46712 usertrap_amd64.go:225] [ 802: 803] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:47.463911 46712 task_signals.go:470] [ 802: 802] Notified of signal 23 D0712 20:27:47.463987 46712 task_signals.go:220] [ 802: 802] Signal 23: delivering to handler I0712 20:27:47.473920 46712 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0712 20:27:47.474074 46712 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.474090 46712 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001d093b0 14 D0712 20:27:47.474104 46712 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:47.474193 46712 task_exit.go:204] [ 802: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.474241 46712 task_exit.go:204] [ 802: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.474242 46712 task_signals.go:204] [ 802: 803] Signal 802, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.474262 46712 task_exit.go:204] [ 802: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.474291 46712 task_signals.go:204] [ 802: 805] Signal 802, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.474331 46712 task_signals.go:204] [ 802: 806] Signal 802, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.474349 46712 task_exit.go:204] [ 802: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.474357 46712 task_exit.go:204] [ 802: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.474347 46712 task_signals.go:204] [ 802: 804] Signal 802, PID: 804, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.474391 46712 task_signals.go:204] [ 802: 807] Signal 802, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.474406 46712 task_exit.go:204] [ 802: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.474512 46712 task_exit.go:204] [ 802: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.474524 46712 task_exit.go:204] [ 802: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.474555 46712 task_exit.go:204] [ 802: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.474577 46712 task_exit.go:204] [ 802: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.474584 46712 task_exit.go:204] [ 802: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.474593 46712 task_exit.go:204] [ 802: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.474631 46712 task_exit.go:204] [ 802: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.474648 46712 task_exit.go:204] [ 802: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.474662 46712 task_exit.go:204] [ 802: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.476293 46712 task_exit.go:204] [ 802: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.476324 46712 task_exit.go:204] [ 802: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.476366 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.476407 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.476461 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.476601 46712 task_exit.go:204] [ 802: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.477706 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.479439 46712 syscalls.go:262] [ 808: 808] Allocating stack with size of 8388608 bytes D0712 20:27:47.479720 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.480892 46712 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.480931 46712 usertrap_amd64.go:106] [ 808: 808] Map a usertrap vma at 66000 D0712 20:27:47.481044 46712 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001cd4d50 1 D0712 20:27:47.481071 46712 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:47.481560 46712 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.481585 46712 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001cd4d50 2 D0712 20:27:47.481596 46712 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:47.482434 46712 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.482465 46712 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001cd4d50 3 D0712 20:27:47.482480 46712 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:47.488846 46712 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.488891 46712 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001cd4d50 4 D0712 20:27:47.488907 46712 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:47.490138 46712 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.490168 46712 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001cd4d50 5 D0712 20:27:47.490176 46712 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:47.490219 46712 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.490223 46712 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001cd4d50 6 D0712 20:27:47.490228 46712 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:47.490610 46712 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.490640 46712 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001cd4d50 7 D0712 20:27:47.490649 46712 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:47.490867 46712 usertrap_amd64.go:212] [ 808: 809] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.490904 46712 usertrap_amd64.go:122] [ 808: 809] Allocate a new trap: 0xc001cd4d50 8 D0712 20:27:47.490917 46712 usertrap_amd64.go:225] [ 808: 809] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:47.490982 46712 usertrap_amd64.go:212] [ 808: 809] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.490987 46712 usertrap_amd64.go:122] [ 808: 809] Allocate a new trap: 0xc001cd4d50 9 D0712 20:27:47.491019 46712 usertrap_amd64.go:225] [ 808: 809] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:47.491255 46712 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.491295 46712 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001cd4d50 10 D0712 20:27:47.491304 46712 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:47.499451 46712 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.499481 46712 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001cd4d50 11 D0712 20:27:47.499520 46712 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:47.502205 46712 usertrap_amd64.go:212] [ 808: 809] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.502233 46712 usertrap_amd64.go:122] [ 808: 809] Allocate a new trap: 0xc001cd4d50 12 D0712 20:27:47.502243 46712 usertrap_amd64.go:225] [ 808: 809] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:47.502322 46712 usertrap_amd64.go:212] [ 808: 809] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.502357 46712 usertrap_amd64.go:122] [ 808: 809] Allocate a new trap: 0xc001cd4d50 13 D0712 20:27:47.502374 46712 usertrap_amd64.go:225] [ 808: 809] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:47.502482 46712 task_signals.go:470] [ 808: 808] Notified of signal 23 D0712 20:27:47.502595 46712 task_signals.go:220] [ 808: 808] Signal 23: delivering to handler I0712 20:27:47.510655 46712 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0712 20:27:47.510739 46712 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.510750 46712 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001cd4d50 14 D0712 20:27:47.510772 46712 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:47.510818 46712 task_exit.go:204] [ 808: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.510895 46712 task_signals.go:204] [ 808: 810] Signal 808, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.510930 46712 task_signals.go:204] [ 808: 812] Signal 808, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.510943 46712 task_exit.go:204] [ 808: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.510957 46712 task_signals.go:204] [ 808: 809] Signal 808, PID: 809, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.510964 46712 task_signals.go:204] [ 808: 811] Signal 808, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.510973 46712 task_exit.go:204] [ 808: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.510986 46712 task_exit.go:204] [ 808: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.510992 46712 task_exit.go:204] [ 808: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.511005 46712 task_exit.go:204] [ 808: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.511043 46712 task_exit.go:204] [ 808: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.511057 46712 task_exit.go:204] [ 808: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.511068 46712 task_exit.go:204] [ 808: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.511084 46712 task_exit.go:204] [ 808: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.511090 46712 task_exit.go:204] [ 808: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.511098 46712 task_exit.go:204] [ 808: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.512604 46712 task_exit.go:204] [ 808: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.512639 46712 task_exit.go:204] [ 808: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.512654 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.512706 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.512737 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.512851 46712 task_exit.go:204] [ 808: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.513708 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.515203 46712 syscalls.go:262] [ 813: 813] Allocating stack with size of 8388608 bytes D0712 20:27:47.515632 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.517321 46712 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.517362 46712 usertrap_amd64.go:106] [ 813: 813] Map a usertrap vma at 66000 D0712 20:27:47.517438 46712 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc001aff3b0 1 D0712 20:27:47.517476 46712 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:47.520352 46712 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.520410 46712 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc001aff3b0 2 D0712 20:27:47.520431 46712 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:47.521906 46712 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.521937 46712 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc001aff3b0 3 D0712 20:27:47.521955 46712 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:47.528452 46712 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.528507 46712 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc001aff3b0 4 D0712 20:27:47.528525 46712 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:47.529848 46712 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.529890 46712 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc001aff3b0 5 D0712 20:27:47.529904 46712 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:47.529936 46712 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.529943 46712 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc001aff3b0 6 D0712 20:27:47.529951 46712 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:47.530272 46712 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.530294 46712 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc001aff3b0 7 D0712 20:27:47.530301 46712 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:47.530506 46712 usertrap_amd64.go:212] [ 813: 814] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.530529 46712 usertrap_amd64.go:122] [ 813: 814] Allocate a new trap: 0xc001aff3b0 8 D0712 20:27:47.530538 46712 usertrap_amd64.go:225] [ 813: 814] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:47.530774 46712 usertrap_amd64.go:212] [ 813: 814] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.530862 46712 usertrap_amd64.go:122] [ 813: 814] Allocate a new trap: 0xc001aff3b0 9 D0712 20:27:47.530904 46712 usertrap_amd64.go:225] [ 813: 814] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:47.530933 46712 usertrap_amd64.go:212] [ 813: 816] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.530939 46712 usertrap_amd64.go:122] [ 813: 816] Allocate a new trap: 0xc001aff3b0 10 D0712 20:27:47.530946 46712 usertrap_amd64.go:225] [ 813: 816] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:47.531417 46712 usertrap_amd64.go:212] [ 813: 814] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.531715 46712 usertrap_amd64.go:122] [ 813: 814] Allocate a new trap: 0xc001aff3b0 11 D0712 20:27:47.531768 46712 usertrap_amd64.go:225] [ 813: 814] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:47.533835 46712 usertrap_amd64.go:212] [ 813: 814] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.533869 46712 usertrap_amd64.go:122] [ 813: 814] Allocate a new trap: 0xc001aff3b0 12 D0712 20:27:47.533880 46712 usertrap_amd64.go:225] [ 813: 814] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:47.534017 46712 task_signals.go:470] [ 813: 813] Notified of signal 23 D0712 20:27:47.534134 46712 task_signals.go:220] [ 813: 813] Signal 23: delivering to handler D0712 20:27:47.539328 46712 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.539359 46712 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc001aff3b0 13 D0712 20:27:47.539368 46712 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:47.544278 46712 task_signals.go:470] [ 813: 813] Notified of signal 23 D0712 20:27:47.544354 46712 task_signals.go:220] [ 813: 813] Signal 23: delivering to handler I0712 20:27:47.554089 46712 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0712 20:27:47.554216 46712 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.554236 46712 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc001aff3b0 14 D0712 20:27:47.554253 46712 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:47.554399 46712 task_exit.go:204] [ 813: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.554434 46712 task_exit.go:204] [ 813: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.554438 46712 task_signals.go:204] [ 813: 818] Signal 813, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.554455 46712 task_signals.go:204] [ 813: 815] Signal 813, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.554463 46712 task_exit.go:204] [ 813: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.554498 46712 task_exit.go:204] [ 813: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.554505 46712 task_exit.go:204] [ 813: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.554520 46712 task_exit.go:204] [ 813: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.554527 46712 task_exit.go:204] [ 813: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.554532 46712 task_exit.go:204] [ 813: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.554544 46712 task_signals.go:204] [ 813: 816] Signal 813, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.554554 46712 task_exit.go:204] [ 813: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.554560 46712 task_exit.go:204] [ 813: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.554565 46712 task_exit.go:204] [ 813: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.554577 46712 task_signals.go:204] [ 813: 817] Signal 813, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.554586 46712 task_exit.go:204] [ 813: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.554592 46712 task_exit.go:204] [ 813: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.554597 46712 task_exit.go:204] [ 813: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.554608 46712 task_signals.go:204] [ 813: 814] Signal 813, PID: 814, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.554618 46712 task_exit.go:204] [ 813: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.556370 46712 task_exit.go:204] [ 813: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.556433 46712 task_exit.go:204] [ 813: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.556459 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.556529 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.556561 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.556625 46712 task_exit.go:204] [ 813: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.557603 46712 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.559379 46712 syscalls.go:262] [ 819: 819] Allocating stack with size of 8388608 bytes D0712 20:27:47.559534 46712 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.561227 46712 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.561316 46712 usertrap_amd64.go:106] [ 819: 819] Map a usertrap vma at 65000 D0712 20:27:47.561465 46712 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001d09890 1 D0712 20:27:47.561503 46712 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:27:47.562345 46712 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.562395 46712 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001d09890 2 D0712 20:27:47.562411 46712 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:27:47.563289 46712 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.563320 46712 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001d09890 3 D0712 20:27:47.563335 46712 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:27:47.571833 46712 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.571883 46712 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001d09890 4 D0712 20:27:47.571899 46712 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:27:47.573424 46712 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.573462 46712 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001d09890 5 D0712 20:27:47.573477 46712 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:27:47.573531 46712 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.573539 46712 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001d09890 6 D0712 20:27:47.573547 46712 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:27:47.574130 46712 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.574236 46712 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001d09890 7 D0712 20:27:47.574309 46712 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:27:47.574564 46712 usertrap_amd64.go:212] [ 819: 820] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.574587 46712 usertrap_amd64.go:122] [ 819: 820] Allocate a new trap: 0xc001d09890 8 D0712 20:27:47.574597 46712 usertrap_amd64.go:225] [ 819: 820] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:27:47.574792 46712 usertrap_amd64.go:212] [ 819: 820] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.574847 46712 usertrap_amd64.go:122] [ 819: 820] Allocate a new trap: 0xc001d09890 9 D0712 20:27:47.574865 46712 usertrap_amd64.go:225] [ 819: 820] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:27:47.574917 46712 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.574928 46712 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001d09890 10 D0712 20:27:47.574936 46712 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:27:47.575708 46712 usertrap_amd64.go:212] [ 819: 820] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.575725 46712 usertrap_amd64.go:122] [ 819: 820] Allocate a new trap: 0xc001d09890 11 D0712 20:27:47.575737 46712 usertrap_amd64.go:225] [ 819: 820] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:27:47.575814 46712 usertrap_amd64.go:212] [ 819: 820] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.575838 46712 usertrap_amd64.go:122] [ 819: 820] Allocate a new trap: 0xc001d09890 12 D0712 20:27:47.575861 46712 usertrap_amd64.go:225] [ 819: 820] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:27:47.575895 46712 task_signals.go:470] [ 819: 819] Notified of signal 23 D0712 20:27:47.575964 46712 task_signals.go:220] [ 819: 819] Signal 23: delivering to handler D0712 20:27:47.583564 46712 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.583608 46712 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001d09890 13 D0712 20:27:47.583620 46712 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:27:47.587390 46712 task_signals.go:470] [ 819: 819] Notified of signal 23 D0712 20:27:47.587448 46712 task_signals.go:220] [ 819: 819] Signal 23: delivering to handler D0712 20:27:47.596266 46712 usertrap_amd64.go:212] [ 819: 819] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.596320 46712 usertrap_amd64.go:122] [ 819: 819] Allocate a new trap: 0xc001d09890 14 D0712 20:27:47.596336 46712 usertrap_amd64.go:225] [ 819: 819] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:27:47.596416 46712 task_exit.go:204] [ 819: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.596451 46712 task_exit.go:204] [ 819: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.596480 46712 task_signals.go:204] [ 819: 821] Signal 819, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.596490 46712 task_signals.go:204] [ 819: 822] Signal 819, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.596474 46712 task_signals.go:204] [ 819: 820] Signal 819, PID: 820, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.596504 46712 task_exit.go:204] [ 819: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.596474 46712 task_signals.go:204] [ 819: 823] Signal 819, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.596512 46712 task_exit.go:204] [ 819: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.596520 46712 task_exit.go:204] [ 819: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.596529 46712 task_exit.go:204] [ 819: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.596534 46712 task_exit.go:204] [ 819: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.596548 46712 task_exit.go:204] [ 819: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.596593 46712 task_exit.go:204] [ 819: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.596632 46712 task_exit.go:204] [ 819: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.596647 46712 task_exit.go:204] [ 819: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.596653 46712 task_exit.go:204] [ 819: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.598229 46712 task_exit.go:204] [ 819: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.598291 46712 task_exit.go:204] [ 819: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.598314 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.598356 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.598370 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.598729 46712 task_exit.go:204] [ 819: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.598832 46712 task_signals.go:470] [ 6: 19] Notified of signal 23 D0712 20:27:47.598886 46712 task_signals.go:220] [ 6: 19] Signal 23: delivering to handler D0712 20:27:47.599732 46712 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.601723 46712 syscalls.go:262] [ 824: 824] Allocating stack with size of 8388608 bytes D0712 20:27:47.601983 46712 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.603269 46712 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.603329 46712 usertrap_amd64.go:106] [ 824: 824] Map a usertrap vma at 61000 D0712 20:27:47.603466 46712 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0020fa540 1 D0712 20:27:47.603500 46712 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:27:47.604065 46712 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.604096 46712 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0020fa540 2 D0712 20:27:47.604108 46712 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:27:47.604760 46712 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.604814 46712 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0020fa540 3 D0712 20:27:47.604830 46712 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:27:47.612143 46712 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.612186 46712 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0020fa540 4 D0712 20:27:47.612201 46712 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:27:47.613547 46712 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.613591 46712 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0020fa540 5 D0712 20:27:47.613608 46712 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:27:47.613721 46712 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.613748 46712 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0020fa540 6 D0712 20:27:47.613759 46712 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:27:47.614254 46712 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.614280 46712 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0020fa540 7 D0712 20:27:47.614290 46712 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:27:47.614592 46712 usertrap_amd64.go:212] [ 824: 825] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.614618 46712 usertrap_amd64.go:122] [ 824: 825] Allocate a new trap: 0xc0020fa540 8 D0712 20:27:47.614629 46712 usertrap_amd64.go:225] [ 824: 825] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:27:47.615190 46712 usertrap_amd64.go:212] [ 824: 827] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.615219 46712 usertrap_amd64.go:122] [ 824: 827] Allocate a new trap: 0xc0020fa540 9 D0712 20:27:47.615233 46712 usertrap_amd64.go:225] [ 824: 827] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:27:47.615336 46712 usertrap_amd64.go:212] [ 824: 827] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:47.615349 46712 usertrap_amd64.go:122] [ 824: 827] Allocate a new trap: 0xc0020fa540 10 D0712 20:27:47.615400 46712 usertrap_amd64.go:225] [ 824: 827] Apply the binary patch addr 46b6e0 trap addr 61320 ([184 24 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:27:47.615426 46712 usertrap_amd64.go:212] [ 824: 825] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.615444 46712 usertrap_amd64.go:122] [ 824: 825] Allocate a new trap: 0xc0020fa540 11 D0712 20:27:47.615453 46712 usertrap_amd64.go:225] [ 824: 825] Apply the binary patch addr 46af76 trap addr 61370 ([184 35 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:27:47.616265 46712 sampler.go:191] Time: Adjusting syscall overhead down to 515 D0712 20:27:47.627630 46712 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.627665 46712 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0020fa540 12 D0712 20:27:47.627679 46712 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:27:47.634790 46712 usertrap_amd64.go:212] [ 824: 825] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.634854 46712 usertrap_amd64.go:122] [ 824: 825] Allocate a new trap: 0xc0020fa540 13 D0712 20:27:47.634873 46712 usertrap_amd64.go:225] [ 824: 825] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:27:47.634925 46712 usertrap_amd64.go:212] [ 824: 825] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.634954 46712 usertrap_amd64.go:122] [ 824: 825] Allocate a new trap: 0xc0020fa540 14 D0712 20:27:47.634973 46712 usertrap_amd64.go:225] [ 824: 825] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:27:47.635049 46712 task_signals.go:470] [ 824: 824] Notified of signal 23 D0712 20:27:47.635129 46712 task_signals.go:220] [ 824: 824] Signal 23: delivering to handler I0712 20:27:47.638785 46712 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0712 20:27:47.638885 46712 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.638900 46712 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc0020fa540 15 D0712 20:27:47.638915 46712 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0712 20:27:47.639004 46712 task_exit.go:204] [ 824: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.639034 46712 task_exit.go:204] [ 824: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.639058 46712 task_signals.go:204] [ 824: 826] Signal 824, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.639076 46712 task_exit.go:204] [ 824: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.639085 46712 task_signals.go:204] [ 824: 825] Signal 824, PID: 825, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.639122 46712 task_signals.go:204] [ 824: 829] Signal 824, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.639146 46712 task_signals.go:204] [ 824: 827] Signal 824, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.639162 46712 task_signals.go:204] [ 824: 828] Signal 824, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.639174 46712 task_exit.go:204] [ 824: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.639193 46712 task_exit.go:204] [ 824: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.639209 46712 task_exit.go:204] [ 824: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.639232 46712 task_exit.go:204] [ 824: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.639238 46712 task_exit.go:204] [ 824: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.639265 46712 task_exit.go:204] [ 824: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.639285 46712 task_exit.go:204] [ 824: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.639290 46712 task_exit.go:204] [ 824: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.639298 46712 task_exit.go:204] [ 824: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.639312 46712 task_exit.go:204] [ 824: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.639315 46712 task_exit.go:204] [ 824: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.639321 46712 task_exit.go:204] [ 824: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.641560 46712 task_exit.go:204] [ 824: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.641752 46712 task_exit.go:204] [ 824: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.641851 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.643097 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.643138 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.643225 46712 task_exit.go:204] [ 824: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.646262 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.648094 46712 syscalls.go:262] [ 830: 830] Allocating stack with size of 8388608 bytes D0712 20:27:47.648213 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.649368 46712 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.649429 46712 usertrap_amd64.go:106] [ 830: 830] Map a usertrap vma at 60000 D0712 20:27:47.649541 46712 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc002224060 1 D0712 20:27:47.649584 46712 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:27:47.650047 46712 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.650071 46712 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc002224060 2 D0712 20:27:47.650079 46712 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:27:47.650894 46712 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.650925 46712 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc002224060 3 D0712 20:27:47.650936 46712 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:27:47.658044 46712 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.658090 46712 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc002224060 4 D0712 20:27:47.658108 46712 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:27:47.659480 46712 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.659517 46712 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc002224060 5 D0712 20:27:47.659533 46712 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:27:47.659585 46712 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.659596 46712 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc002224060 6 D0712 20:27:47.659604 46712 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:27:47.660012 46712 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.660048 46712 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc002224060 7 D0712 20:27:47.660066 46712 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:27:47.660316 46712 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.660346 46712 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc002224060 8 D0712 20:27:47.660357 46712 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:27:47.660561 46712 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.660637 46712 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc002224060 9 D0712 20:27:47.660661 46712 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:27:47.660802 46712 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.660833 46712 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc002224060 10 D0712 20:27:47.660845 46712 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:27:47.661352 46712 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.661404 46712 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc002224060 11 D0712 20:27:47.661420 46712 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:27:47.661581 46712 usertrap_amd64.go:212] [ 830: 831] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.661609 46712 usertrap_amd64.go:122] [ 830: 831] Allocate a new trap: 0xc002224060 12 D0712 20:27:47.661620 46712 usertrap_amd64.go:225] [ 830: 831] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:27:47.661716 46712 task_signals.go:470] [ 830: 830] Notified of signal 23 D0712 20:27:47.661752 46712 task_signals.go:220] [ 830: 830] Signal 23: delivering to handler D0712 20:27:47.669013 46712 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.669057 46712 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc002224060 13 D0712 20:27:47.669072 46712 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:27:47.671935 46712 task_signals.go:470] [ 830: 830] Notified of signal 23 D0712 20:27:47.671993 46712 task_signals.go:220] [ 830: 830] Signal 23: delivering to handler I0712 20:27:47.680209 46712 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0712 20:27:47.680372 46712 usertrap_amd64.go:212] [ 830: 830] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.680404 46712 usertrap_amd64.go:122] [ 830: 830] Allocate a new trap: 0xc002224060 14 D0712 20:27:47.680419 46712 usertrap_amd64.go:225] [ 830: 830] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:27:47.680484 46712 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.680511 46712 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.680540 46712 task_signals.go:204] [ 830: 833] Signal 830, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.680564 46712 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.680574 46712 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.680571 46712 task_signals.go:204] [ 830: 831] Signal 830, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.680580 46712 task_exit.go:204] [ 830: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.680572 46712 task_signals.go:204] [ 830: 832] Signal 830, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.680611 46712 task_signals.go:204] [ 830: 834] Signal 830, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.680629 46712 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.680671 46712 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.680679 46712 task_exit.go:204] [ 830: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.680692 46712 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.680727 46712 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.680744 46712 task_exit.go:204] [ 830: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.680758 46712 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.682229 46712 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.682259 46712 task_exit.go:204] [ 830: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.682272 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.682648 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.682681 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.682841 46712 task_exit.go:204] [ 830: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.683777 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.685650 46712 syscalls.go:262] [ 835: 835] Allocating stack with size of 8388608 bytes D0712 20:27:47.686002 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.687064 46712 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.687113 46712 usertrap_amd64.go:106] [ 835: 835] Map a usertrap vma at 69000 D0712 20:27:47.687267 46712 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d083f0 1 D0712 20:27:47.687303 46712 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:27:47.687695 46712 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.687716 46712 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d083f0 2 D0712 20:27:47.687724 46712 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:27:47.688262 46712 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.688282 46712 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d083f0 3 D0712 20:27:47.688290 46712 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:27:47.694793 46712 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.694816 46712 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d083f0 4 D0712 20:27:47.694828 46712 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:27:47.696096 46712 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.696123 46712 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d083f0 5 D0712 20:27:47.696133 46712 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:27:47.696202 46712 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.696231 46712 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d083f0 6 D0712 20:27:47.696243 46712 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:27:47.696518 46712 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.696541 46712 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d083f0 7 D0712 20:27:47.696549 46712 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:27:47.696714 46712 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.696733 46712 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001d083f0 8 D0712 20:27:47.696742 46712 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:27:47.697009 46712 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.697058 46712 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001d083f0 9 D0712 20:27:47.697076 46712 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:27:47.697123 46712 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.697140 46712 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d083f0 10 D0712 20:27:47.697149 46712 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:27:47.704818 46712 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.704856 46712 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d083f0 11 D0712 20:27:47.704869 46712 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:27:47.707570 46712 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.707598 46712 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001d083f0 12 D0712 20:27:47.707611 46712 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:27:47.707676 46712 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.707704 46712 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc001d083f0 13 D0712 20:27:47.707717 46712 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:27:47.707825 46712 task_signals.go:470] [ 835: 835] Notified of signal 23 D0712 20:27:47.707918 46712 task_signals.go:220] [ 835: 835] Signal 23: delivering to handler D0712 20:27:47.715925 46712 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.715971 46712 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc001d083f0 14 D0712 20:27:47.715985 46712 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:27:47.716033 46712 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.716060 46712 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.716082 46712 task_signals.go:204] [ 835: 838] Signal 835, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.716083 46712 task_signals.go:204] [ 835: 837] Signal 835, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.716101 46712 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.716110 46712 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.716116 46712 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.716135 46712 task_signals.go:204] [ 835: 836] Signal 835, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.716145 46712 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.716154 46712 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.716159 46712 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.716177 46712 task_signals.go:204] [ 835: 839] Signal 835, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.716228 46712 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.716256 46712 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.716265 46712 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.716320 46712 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.717819 46712 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.717864 46712 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.717883 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.717917 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.717927 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.718088 46712 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.718827 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.720496 46712 syscalls.go:262] [ 840: 840] Allocating stack with size of 8388608 bytes D0712 20:27:47.720598 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.721435 46712 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.721471 46712 usertrap_amd64.go:106] [ 840: 840] Map a usertrap vma at 6a000 D0712 20:27:47.721533 46712 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000d4c120 1 D0712 20:27:47.721566 46712 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:27:47.722055 46712 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.722090 46712 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000d4c120 2 D0712 20:27:47.722111 46712 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:27:47.722880 46712 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.722907 46712 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000d4c120 3 D0712 20:27:47.722919 46712 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:27:47.729710 46712 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.729818 46712 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000d4c120 4 D0712 20:27:47.729875 46712 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:27:47.731078 46712 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.731107 46712 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000d4c120 5 D0712 20:27:47.731122 46712 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:27:47.731192 46712 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.731204 46712 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000d4c120 6 D0712 20:27:47.731212 46712 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:27:47.731585 46712 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.731605 46712 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000d4c120 7 D0712 20:27:47.731612 46712 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:27:47.731781 46712 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.731800 46712 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc000d4c120 8 D0712 20:27:47.731807 46712 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:27:47.731991 46712 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.732014 46712 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000d4c120 9 D0712 20:27:47.732039 46712 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:27:47.732070 46712 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.732077 46712 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc000d4c120 10 D0712 20:27:47.732085 46712 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:27:47.739864 46712 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.739893 46712 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000d4c120 11 D0712 20:27:47.739906 46712 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:27:47.742373 46712 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.742404 46712 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc000d4c120 12 D0712 20:27:47.742416 46712 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:27:47.742496 46712 usertrap_amd64.go:212] [ 840: 841] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.742513 46712 usertrap_amd64.go:122] [ 840: 841] Allocate a new trap: 0xc000d4c120 13 D0712 20:27:47.742521 46712 usertrap_amd64.go:225] [ 840: 841] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:27:47.742560 46712 task_signals.go:470] [ 840: 840] Notified of signal 23 D0712 20:27:47.742614 46712 task_signals.go:220] [ 840: 840] Signal 23: delivering to handler I0712 20:27:47.750103 46712 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0712 20:27:47.750267 46712 usertrap_amd64.go:212] [ 840: 840] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.750310 46712 usertrap_amd64.go:122] [ 840: 840] Allocate a new trap: 0xc000d4c120 14 D0712 20:27:47.750320 46712 usertrap_amd64.go:225] [ 840: 840] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:27:47.750403 46712 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.750420 46712 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.750448 46712 task_signals.go:204] [ 840: 843] Signal 840, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.750458 46712 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.750464 46712 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.750478 46712 task_exit.go:204] [ 840: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.750488 46712 task_signals.go:204] [ 840: 842] Signal 840, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.750494 46712 task_signals.go:204] [ 840: 844] Signal 840, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.750511 46712 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.750570 46712 task_signals.go:204] [ 840: 841] Signal 840, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.750595 46712 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.750616 46712 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.750631 46712 task_exit.go:204] [ 840: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.750649 46712 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.750653 46712 task_exit.go:204] [ 840: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.750665 46712 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.752079 46712 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.752110 46712 task_exit.go:204] [ 840: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.752126 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.752170 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.752193 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.752530 46712 task_exit.go:204] [ 840: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.753271 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.754684 46712 syscalls.go:262] [ 845: 845] Allocating stack with size of 8388608 bytes D0712 20:27:47.754798 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.757418 46712 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.757470 46712 usertrap_amd64.go:106] [ 845: 845] Map a usertrap vma at 66000 D0712 20:27:47.757548 46712 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001afe480 1 D0712 20:27:47.757580 46712 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:47.758043 46712 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.758065 46712 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001afe480 2 D0712 20:27:47.758077 46712 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:47.758764 46712 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.758792 46712 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001afe480 3 D0712 20:27:47.758803 46712 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:47.769817 46712 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.769850 46712 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001afe480 4 D0712 20:27:47.769861 46712 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:47.770810 46712 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.770837 46712 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001afe480 5 D0712 20:27:47.770845 46712 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:47.770957 46712 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.770966 46712 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001afe480 6 D0712 20:27:47.770974 46712 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:47.771169 46712 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.771195 46712 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001afe480 7 D0712 20:27:47.771204 46712 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:47.771408 46712 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.771445 46712 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001afe480 8 D0712 20:27:47.771461 46712 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:47.771764 46712 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.771795 46712 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001afe480 9 D0712 20:27:47.771810 46712 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:47.771887 46712 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.771976 46712 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001afe480 10 D0712 20:27:47.772009 46712 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:47.779801 46712 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.779838 46712 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001afe480 11 D0712 20:27:47.779852 46712 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:47.783623 46712 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.783648 46712 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001afe480 12 D0712 20:27:47.783659 46712 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:47.783729 46712 usertrap_amd64.go:212] [ 845: 846] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.783747 46712 usertrap_amd64.go:122] [ 845: 846] Allocate a new trap: 0xc001afe480 13 D0712 20:27:47.783786 46712 usertrap_amd64.go:225] [ 845: 846] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:47.783863 46712 task_signals.go:470] [ 845: 845] Notified of signal 23 D0712 20:27:47.783968 46712 task_signals.go:220] [ 845: 845] Signal 23: delivering to handler I0712 20:27:47.791001 46712 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0712 20:27:47.791060 46712 usertrap_amd64.go:212] [ 845: 845] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.791071 46712 usertrap_amd64.go:122] [ 845: 845] Allocate a new trap: 0xc001afe480 14 D0712 20:27:47.791105 46712 usertrap_amd64.go:225] [ 845: 845] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:47.791145 46712 task_exit.go:204] [ 845: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.791166 46712 task_exit.go:204] [ 845: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.791171 46712 task_signals.go:204] [ 845: 846] Signal 845, PID: 846, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.791191 46712 task_signals.go:204] [ 845: 848] Signal 845, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.791204 46712 task_exit.go:204] [ 845: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.791247 46712 task_exit.go:204] [ 845: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.791253 46712 task_exit.go:204] [ 845: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.791269 46712 task_exit.go:204] [ 845: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.791284 46712 task_exit.go:204] [ 845: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.791288 46712 task_exit.go:204] [ 845: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.791322 46712 task_signals.go:204] [ 845: 849] Signal 845, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.791332 46712 task_exit.go:204] [ 845: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.791338 46712 task_exit.go:204] [ 845: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.791342 46712 task_exit.go:204] [ 845: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.791352 46712 task_signals.go:204] [ 845: 847] Signal 845, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.791368 46712 task_exit.go:204] [ 845: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.792837 46712 task_exit.go:204] [ 845: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.792864 46712 task_exit.go:204] [ 845: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.792888 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.792924 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.792972 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.793086 46712 task_exit.go:204] [ 845: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.793610 46712 task_signals.go:470] [ 6: 8] Notified of signal 23 D0712 20:27:47.793666 46712 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0712 20:27:47.794094 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.795728 46712 syscalls.go:262] [ 850: 850] Allocating stack with size of 8388608 bytes D0712 20:27:47.795867 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.799391 46712 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.799436 46712 usertrap_amd64.go:106] [ 850: 850] Map a usertrap vma at 68000 D0712 20:27:47.799582 46712 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d4c210 1 D0712 20:27:47.799629 46712 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:27:47.800156 46712 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.800190 46712 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d4c210 2 D0712 20:27:47.800206 46712 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:27:47.800988 46712 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.801017 46712 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d4c210 3 D0712 20:27:47.801026 46712 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:27:47.807004 46712 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.807029 46712 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d4c210 4 D0712 20:27:47.807043 46712 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:27:47.808093 46712 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.808132 46712 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d4c210 5 D0712 20:27:47.808142 46712 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:27:47.808195 46712 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.808200 46712 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d4c210 6 D0712 20:27:47.808205 46712 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:27:47.808571 46712 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.808586 46712 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d4c210 7 D0712 20:27:47.808591 46712 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:27:47.808754 46712 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.808773 46712 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc000d4c210 8 D0712 20:27:47.808784 46712 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:27:47.809061 46712 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.809077 46712 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc000d4c210 9 D0712 20:27:47.809089 46712 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:27:47.809104 46712 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.809124 46712 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d4c210 10 D0712 20:27:47.809134 46712 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:27:47.816590 46712 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.816622 46712 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d4c210 11 D0712 20:27:47.816635 46712 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:27:47.819348 46712 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.819380 46712 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc000d4c210 12 D0712 20:27:47.819397 46712 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:27:47.819458 46712 usertrap_amd64.go:212] [ 850: 851] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.819477 46712 usertrap_amd64.go:122] [ 850: 851] Allocate a new trap: 0xc000d4c210 13 D0712 20:27:47.819491 46712 usertrap_amd64.go:225] [ 850: 851] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:27:47.819568 46712 task_signals.go:470] [ 850: 850] Notified of signal 23 D0712 20:27:47.819665 46712 task_signals.go:220] [ 850: 850] Signal 23: delivering to handler D0712 20:27:47.826732 46712 usertrap_amd64.go:212] [ 850: 850] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.826787 46712 usertrap_amd64.go:122] [ 850: 850] Allocate a new trap: 0xc000d4c210 14 D0712 20:27:47.826803 46712 usertrap_amd64.go:225] [ 850: 850] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:27:47.826878 46712 task_exit.go:204] [ 850: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.826905 46712 task_exit.go:204] [ 850: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.826930 46712 task_signals.go:204] [ 850: 853] Signal 850, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.826943 46712 task_exit.go:204] [ 850: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.826948 46712 task_exit.go:204] [ 850: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.826966 46712 task_exit.go:204] [ 850: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.826929 46712 task_signals.go:204] [ 850: 852] Signal 850, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.826985 46712 task_signals.go:204] [ 850: 851] Signal 850, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.826984 46712 task_signals.go:204] [ 850: 854] Signal 850, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.826991 46712 task_exit.go:204] [ 850: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.827014 46712 task_exit.go:204] [ 850: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.827022 46712 task_exit.go:204] [ 850: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.827034 46712 task_exit.go:204] [ 850: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.827051 46712 task_exit.go:204] [ 850: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.827059 46712 task_exit.go:204] [ 850: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.827067 46712 task_exit.go:204] [ 850: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.828391 46712 task_exit.go:204] [ 850: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.828425 46712 task_exit.go:204] [ 850: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.828445 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.828468 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.828476 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.828544 46712 task_exit.go:204] [ 850: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.829197 46712 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.830420 46712 syscalls.go:262] [ 855: 855] Allocating stack with size of 8388608 bytes D0712 20:27:47.830627 46712 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.831903 46712 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.831957 46712 usertrap_amd64.go:106] [ 855: 855] Map a usertrap vma at 66000 D0712 20:27:47.832047 46712 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001d08db0 1 D0712 20:27:47.832082 46712 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:47.832560 46712 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.832588 46712 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001d08db0 2 D0712 20:27:47.832601 46712 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:47.833224 46712 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.833252 46712 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001d08db0 3 D0712 20:27:47.833263 46712 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:47.838235 46712 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.838266 46712 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001d08db0 4 D0712 20:27:47.838279 46712 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:47.839394 46712 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.839418 46712 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001d08db0 5 D0712 20:27:47.839429 46712 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:47.839488 46712 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.839498 46712 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001d08db0 6 D0712 20:27:47.839505 46712 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:47.839933 46712 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.839967 46712 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001d08db0 7 D0712 20:27:47.839977 46712 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:47.840096 46712 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.840127 46712 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc001d08db0 8 D0712 20:27:47.840138 46712 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:47.840306 46712 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.840356 46712 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc001d08db0 9 D0712 20:27:47.840368 46712 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:47.840381 46712 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.840388 46712 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001d08db0 10 D0712 20:27:47.840396 46712 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:47.840793 46712 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.840816 46712 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc001d08db0 11 D0712 20:27:47.840828 46712 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:47.840875 46712 usertrap_amd64.go:212] [ 855: 856] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.840890 46712 usertrap_amd64.go:122] [ 855: 856] Allocate a new trap: 0xc001d08db0 12 D0712 20:27:47.840901 46712 usertrap_amd64.go:225] [ 855: 856] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:47.840970 46712 task_signals.go:470] [ 855: 855] Notified of signal 23 D0712 20:27:47.841159 46712 task_signals.go:220] [ 855: 855] Signal 23: delivering to handler D0712 20:27:47.847639 46712 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.847667 46712 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001d08db0 13 D0712 20:27:47.847678 46712 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:47.851763 46712 task_signals.go:470] [ 855: 855] Notified of signal 23 D0712 20:27:47.851812 46712 task_signals.go:220] [ 855: 855] Signal 23: delivering to handler D0712 20:27:47.857755 46712 usertrap_amd64.go:212] [ 855: 855] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.857793 46712 usertrap_amd64.go:122] [ 855: 855] Allocate a new trap: 0xc001d08db0 14 D0712 20:27:47.857808 46712 usertrap_amd64.go:225] [ 855: 855] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:47.857877 46712 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.857907 46712 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.857947 46712 task_signals.go:204] [ 855: 859] Signal 855, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.857969 46712 task_signals.go:204] [ 855: 858] Signal 855, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.857967 46712 task_signals.go:204] [ 855: 856] Signal 855, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.857984 46712 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.858022 46712 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.857937 46712 task_signals.go:204] [ 855: 857] Signal 855, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.858040 46712 task_exit.go:204] [ 855: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.858054 46712 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.858084 46712 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.858092 46712 task_exit.go:204] [ 855: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.858107 46712 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.858123 46712 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.858128 46712 task_exit.go:204] [ 855: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.858142 46712 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.859468 46712 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.859507 46712 task_exit.go:204] [ 855: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.859522 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.859573 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.859607 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.859776 46712 task_exit.go:204] [ 855: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.860336 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.861846 46712 syscalls.go:262] [ 860: 860] Allocating stack with size of 8388608 bytes D0712 20:27:47.861949 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.863320 46712 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.863356 46712 usertrap_amd64.go:106] [ 860: 860] Map a usertrap vma at 63000 D0712 20:27:47.863444 46712 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000d32ff0 1 D0712 20:27:47.863472 46712 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:47.863899 46712 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.863962 46712 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000d32ff0 2 D0712 20:27:47.863975 46712 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:47.864615 46712 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.864638 46712 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000d32ff0 3 D0712 20:27:47.864646 46712 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:47.871241 46712 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.871273 46712 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000d32ff0 4 D0712 20:27:47.871286 46712 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:47.872500 46712 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.872528 46712 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000d32ff0 5 D0712 20:27:47.872540 46712 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:47.872611 46712 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.872624 46712 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000d32ff0 6 D0712 20:27:47.872630 46712 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:47.872815 46712 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.872830 46712 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000d32ff0 7 D0712 20:27:47.872836 46712 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:47.873070 46712 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.873106 46712 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc000d32ff0 8 D0712 20:27:47.873119 46712 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:47.873263 46712 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.873277 46712 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc000d32ff0 9 D0712 20:27:47.873292 46712 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:47.873304 46712 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.873311 46712 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000d32ff0 10 D0712 20:27:47.873321 46712 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:47.881204 46712 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.881237 46712 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000d32ff0 11 D0712 20:27:47.881248 46712 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:47.883939 46712 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.883988 46712 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc000d32ff0 12 D0712 20:27:47.884008 46712 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:47.884088 46712 usertrap_amd64.go:212] [ 860: 861] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.884111 46712 usertrap_amd64.go:122] [ 860: 861] Allocate a new trap: 0xc000d32ff0 13 D0712 20:27:47.884120 46712 usertrap_amd64.go:225] [ 860: 861] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:47.884276 46712 task_signals.go:470] [ 860: 860] Notified of signal 23 D0712 20:27:47.884366 46712 task_signals.go:220] [ 860: 860] Signal 23: delivering to handler D0712 20:27:47.892963 46712 usertrap_amd64.go:212] [ 860: 860] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.892988 46712 usertrap_amd64.go:122] [ 860: 860] Allocate a new trap: 0xc000d32ff0 14 D0712 20:27:47.893002 46712 usertrap_amd64.go:225] [ 860: 860] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:47.893058 46712 task_exit.go:204] [ 860: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.893094 46712 task_exit.go:204] [ 860: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.893138 46712 task_signals.go:204] [ 860: 861] Signal 860, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.893170 46712 task_exit.go:204] [ 860: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.893163 46712 task_signals.go:204] [ 860: 863] Signal 860, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.893182 46712 task_exit.go:204] [ 860: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.893193 46712 task_exit.go:204] [ 860: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.893205 46712 task_signals.go:204] [ 860: 864] Signal 860, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.893243 46712 task_signals.go:204] [ 860: 862] Signal 860, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.893254 46712 task_exit.go:204] [ 860: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.893378 46712 task_exit.go:204] [ 860: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.893405 46712 task_exit.go:204] [ 860: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.893428 46712 task_exit.go:204] [ 860: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.893436 46712 task_exit.go:204] [ 860: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.893442 46712 task_exit.go:204] [ 860: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.893453 46712 task_exit.go:204] [ 860: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.894815 46712 task_exit.go:204] [ 860: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.894875 46712 task_exit.go:204] [ 860: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.894895 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.894932 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.894954 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.895146 46712 task_exit.go:204] [ 860: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.895679 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.895827 46712 task_signals.go:481] [ 6: 8] No task notified of signal 23 D0712 20:27:47.897598 46712 syscalls.go:262] [ 865: 865] Allocating stack with size of 8388608 bytes D0712 20:27:47.897879 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.897978 46712 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0712 20:27:47.898041 46712 task_signals.go:481] [ 6: 8] No task notified of signal 23 D0712 20:27:47.898154 46712 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0712 20:27:47.899360 46712 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.899398 46712 usertrap_amd64.go:106] [ 865: 865] Map a usertrap vma at 61000 D0712 20:27:47.899542 46712 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001d08ea0 1 D0712 20:27:47.899577 46712 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:27:47.900056 46712 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.900081 46712 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001d08ea0 2 D0712 20:27:47.900091 46712 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:27:47.900924 46712 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.900987 46712 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001d08ea0 3 D0712 20:27:47.901000 46712 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:27:47.908218 46712 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.908249 46712 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001d08ea0 4 D0712 20:27:47.908268 46712 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:27:47.909739 46712 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.909828 46712 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001d08ea0 5 D0712 20:27:47.909852 46712 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:27:47.909911 46712 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.909925 46712 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001d08ea0 6 D0712 20:27:47.909931 46712 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:27:47.910092 46712 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.910109 46712 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001d08ea0 7 D0712 20:27:47.910117 46712 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:27:47.910231 46712 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.910242 46712 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc001d08ea0 8 D0712 20:27:47.910252 46712 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:27:47.910368 46712 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.910400 46712 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc001d08ea0 9 D0712 20:27:47.910412 46712 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:27:47.910521 46712 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.910532 46712 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001d08ea0 10 D0712 20:27:47.910542 46712 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:27:47.918560 46712 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.918591 46712 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001d08ea0 11 D0712 20:27:47.918605 46712 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:27:47.921433 46712 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.921459 46712 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc001d08ea0 12 D0712 20:27:47.921475 46712 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:27:47.921524 46712 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.921569 46712 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc001d08ea0 13 D0712 20:27:47.921585 46712 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:27:47.921641 46712 task_signals.go:470] [ 865: 865] Notified of signal 23 D0712 20:27:47.921724 46712 task_signals.go:220] [ 865: 865] Signal 23: delivering to handler D0712 20:27:47.930392 46712 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.930444 46712 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc001d08ea0 14 D0712 20:27:47.930465 46712 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:27:47.930530 46712 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.930560 46712 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.930595 46712 task_signals.go:204] [ 865: 866] Signal 865, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.930624 46712 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.930634 46712 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.930622 46712 task_signals.go:204] [ 865: 868] Signal 865, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.930642 46712 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.930702 46712 task_signals.go:204] [ 865: 867] Signal 865, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.930751 46712 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.930885 46712 task_signals.go:204] [ 865: 869] Signal 865, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.930907 46712 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.930927 46712 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.930949 46712 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.930959 46712 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.930973 46712 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.930987 46712 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.932333 46712 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.932365 46712 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.932380 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.932478 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.932494 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.932724 46712 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.933356 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.935160 46712 syscalls.go:262] [ 870: 870] Allocating stack with size of 8388608 bytes D0712 20:27:47.935297 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.936506 46712 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.936546 46712 usertrap_amd64.go:106] [ 870: 870] Map a usertrap vma at 62000 D0712 20:27:47.936639 46712 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc000d338c0 1 D0712 20:27:47.936706 46712 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:27:47.938431 46712 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.938458 46712 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc000d338c0 2 D0712 20:27:47.938469 46712 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:27:47.939089 46712 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.939116 46712 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc000d338c0 3 D0712 20:27:47.939135 46712 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:27:47.945954 46712 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.945995 46712 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc000d338c0 4 D0712 20:27:47.946013 46712 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:27:47.947114 46712 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.947147 46712 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc000d338c0 5 D0712 20:27:47.947157 46712 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:27:47.947194 46712 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.947200 46712 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc000d338c0 6 D0712 20:27:47.947206 46712 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:27:47.947389 46712 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.947420 46712 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc000d338c0 7 D0712 20:27:47.947428 46712 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:27:47.947577 46712 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.947601 46712 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc000d338c0 8 D0712 20:27:47.947611 46712 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:27:47.947841 46712 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.947863 46712 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc000d338c0 9 D0712 20:27:47.947870 46712 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:27:47.948081 46712 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.948091 46712 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc000d338c0 10 D0712 20:27:47.948098 46712 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:27:47.948602 46712 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.948649 46712 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc000d338c0 11 D0712 20:27:47.948663 46712 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:27:47.948712 46712 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.948722 46712 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc000d338c0 12 D0712 20:27:47.948731 46712 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:27:47.948753 46712 task_signals.go:470] [ 870: 870] Notified of signal 23 D0712 20:27:47.948800 46712 task_signals.go:220] [ 870: 870] Signal 23: delivering to handler D0712 20:27:47.957901 46712 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.957948 46712 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc000d338c0 13 D0712 20:27:47.957971 46712 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:27:47.959456 46712 task_signals.go:470] [ 870: 870] Notified of signal 23 D0712 20:27:47.960738 46712 task_signals.go:220] [ 870: 870] Signal 23: delivering to handler D0712 20:27:47.960884 46712 task_signals.go:481] [ 870: 870] No task notified of signal 23 D0712 20:27:47.960991 46712 task_signals.go:220] [ 870: 870] Signal 23: delivering to handler D0712 20:27:47.968708 46712 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:47.968739 46712 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc000d338c0 14 D0712 20:27:47.968754 46712 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:27:47.968815 46712 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.968849 46712 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.968875 46712 task_signals.go:204] [ 870: 873] Signal 870, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.968868 46712 task_signals.go:204] [ 870: 872] Signal 870, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.968891 46712 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.968967 46712 task_signals.go:204] [ 870: 871] Signal 870, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.968986 46712 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.969008 46712 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.969025 46712 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.969042 46712 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.969077 46712 task_signals.go:204] [ 870: 874] Signal 870, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:47.969096 46712 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.969103 46712 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.969121 46712 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.969142 46712 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.969153 46712 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:47.970450 46712 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:47.970491 46712 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.970508 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:47.970545 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:47.970562 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:47.970659 46712 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:47.971316 46712 task_signals.go:481] [ 6: 8] No task notified of signal 23 D0712 20:27:47.971395 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.972927 46712 syscalls.go:262] [ 875: 875] Allocating stack with size of 8388608 bytes D0712 20:27:47.973092 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:47.973228 46712 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0712 20:27:47.974174 46712 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:47.974200 46712 usertrap_amd64.go:106] [ 875: 875] Map a usertrap vma at 64000 D0712 20:27:47.974295 46712 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0020fb410 1 D0712 20:27:47.974327 46712 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:27:47.974728 46712 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:47.974741 46712 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0020fb410 2 D0712 20:27:47.974751 46712 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:27:47.975455 46712 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:47.975479 46712 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0020fb410 3 D0712 20:27:47.975495 46712 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:27:47.981916 46712 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:47.981954 46712 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0020fb410 4 D0712 20:27:47.981970 46712 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:27:47.983295 46712 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:47.983321 46712 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0020fb410 5 D0712 20:27:47.983331 46712 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:27:47.983387 46712 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b214:sysno 13 D0712 20:27:47.983397 46712 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0020fb410 6 D0712 20:27:47.983404 46712 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:27:47.983650 46712 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:47.983680 46712 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0020fb410 7 D0712 20:27:47.983688 46712 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:27:47.983886 46712 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:47.983911 46712 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0020fb410 8 D0712 20:27:47.983920 46712 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:27:47.984057 46712 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:47.984085 46712 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0020fb410 9 D0712 20:27:47.984097 46712 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:27:47.984128 46712 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46af76:sysno 35 D0712 20:27:47.984136 46712 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0020fb410 10 D0712 20:27:47.984145 46712 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:27:47.991625 46712 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46af29:sysno 293 D0712 20:27:47.991660 46712 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0020fb410 11 D0712 20:27:47.991676 46712 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:27:47.994406 46712 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b020:sysno 39 D0712 20:27:47.994437 46712 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0020fb410 12 D0712 20:27:47.994466 46712 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:27:47.994561 46712 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:47.994579 46712 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc0020fb410 13 D0712 20:27:47.994588 46712 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:27:47.994651 46712 task_signals.go:470] [ 875: 875] Notified of signal 23 D0712 20:27:47.994742 46712 task_signals.go:220] [ 875: 875] Signal 23: delivering to handler D0712 20:27:48.002002 46712 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.002039 46712 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc0020fb410 14 D0712 20:27:48.002055 46712 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:27:48.002155 46712 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.002189 46712 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.002204 46712 task_signals.go:204] [ 875: 877] Signal 875, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.002221 46712 task_signals.go:204] [ 875: 878] Signal 875, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.002217 46712 task_signals.go:204] [ 875: 876] Signal 875, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.002236 46712 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.002270 46712 task_signals.go:204] [ 875: 879] Signal 875, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.002301 46712 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.002323 46712 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.002352 46712 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.002362 46712 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.002368 46712 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.002380 46712 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.002389 46712 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.002395 46712 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.002406 46712 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.003988 46712 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.004019 46712 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.004034 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.004094 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.004129 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.004174 46712 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.005076 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.006582 46712 syscalls.go:262] [ 880: 880] Allocating stack with size of 8388608 bytes D0712 20:27:48.006755 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.009560 46712 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.009601 46712 usertrap_amd64.go:106] [ 880: 880] Map a usertrap vma at 6a000 D0712 20:27:48.009730 46712 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002225470 1 D0712 20:27:48.009765 46712 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:27:48.010205 46712 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.010265 46712 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002225470 2 D0712 20:27:48.010301 46712 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:27:48.011273 46712 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.011309 46712 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002225470 3 D0712 20:27:48.011322 46712 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:27:48.018675 46712 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.018721 46712 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002225470 4 D0712 20:27:48.018737 46712 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:27:48.019908 46712 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.019955 46712 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002225470 5 D0712 20:27:48.019971 46712 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:27:48.020026 46712 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.020044 46712 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002225470 6 D0712 20:27:48.020051 46712 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:27:48.020504 46712 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.020526 46712 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002225470 7 D0712 20:27:48.020536 46712 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:27:48.020748 46712 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.020826 46712 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc002225470 8 D0712 20:27:48.020859 46712 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:27:48.021176 46712 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.021217 46712 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc002225470 9 D0712 20:27:48.021237 46712 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:27:48.021304 46712 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.021316 46712 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002225470 10 D0712 20:27:48.021326 46712 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:27:48.022106 46712 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.022134 46712 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc002225470 11 D0712 20:27:48.022148 46712 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:27:48.022214 46712 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.022239 46712 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc002225470 12 D0712 20:27:48.022253 46712 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:27:48.022360 46712 task_signals.go:470] [ 880: 880] Notified of signal 23 D0712 20:27:48.022395 46712 task_signals.go:220] [ 880: 880] Signal 23: delivering to handler D0712 20:27:48.029897 46712 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.029944 46712 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002225470 13 D0712 20:27:48.029959 46712 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:27:48.032571 46712 task_signals.go:470] [ 880: 880] Notified of signal 23 D0712 20:27:48.032649 46712 task_signals.go:220] [ 880: 880] Signal 23: delivering to handler D0712 20:27:48.040746 46712 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.040798 46712 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc002225470 14 D0712 20:27:48.040815 46712 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:27:48.040907 46712 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.040985 46712 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.041028 46712 task_signals.go:204] [ 880: 883] Signal 880, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.041028 46712 task_signals.go:204] [ 880: 884] Signal 880, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.041055 46712 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.041067 46712 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.041111 46712 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.041119 46712 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.041143 46712 task_signals.go:204] [ 880: 882] Signal 880, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.041169 46712 task_signals.go:204] [ 880: 881] Signal 880, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.041180 46712 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.041186 46712 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.041207 46712 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.041241 46712 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.041255 46712 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.041276 46712 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.042698 46712 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.042735 46712 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.042759 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.042799 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.042828 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.042950 46712 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.043578 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.045283 46712 syscalls.go:262] [ 885: 885] Allocating stack with size of 8388608 bytes D0712 20:27:48.045404 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.047268 46712 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.047301 46712 usertrap_amd64.go:106] [ 885: 885] Map a usertrap vma at 65000 D0712 20:27:48.047422 46712 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001aff3e0 1 D0712 20:27:48.047453 46712 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:27:48.047874 46712 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.047895 46712 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001aff3e0 2 D0712 20:27:48.047903 46712 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:27:48.048636 46712 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.048649 46712 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001aff3e0 3 D0712 20:27:48.048658 46712 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:27:48.061053 46712 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.061100 46712 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001aff3e0 4 D0712 20:27:48.061114 46712 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:27:48.062338 46712 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.062369 46712 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001aff3e0 5 D0712 20:27:48.062377 46712 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:27:48.062421 46712 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.062427 46712 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001aff3e0 6 D0712 20:27:48.062432 46712 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:27:48.062775 46712 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.062792 46712 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001aff3e0 7 D0712 20:27:48.062801 46712 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:27:48.063020 46712 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.063067 46712 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc001aff3e0 8 D0712 20:27:48.063086 46712 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:27:48.063376 46712 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:48.063404 46712 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc001aff3e0 9 D0712 20:27:48.063418 46712 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b6e0 trap addr 652d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:27:48.063455 46712 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.063474 46712 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001aff3e0 10 D0712 20:27:48.063487 46712 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:27:48.063558 46712 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.063576 46712 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc001aff3e0 11 D0712 20:27:48.063587 46712 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46af76 trap addr 65370 ([184 35 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:27:48.071194 46712 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.071227 46712 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001aff3e0 12 D0712 20:27:48.071237 46712 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:27:48.074026 46712 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.074058 46712 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc001aff3e0 13 D0712 20:27:48.074072 46712 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:27:48.074224 46712 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.074274 46712 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc001aff3e0 14 D0712 20:27:48.074292 46712 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:27:48.074357 46712 task_signals.go:470] [ 885: 885] Notified of signal 23 D0712 20:27:48.074458 46712 task_signals.go:220] [ 885: 885] Signal 23: delivering to handler D0712 20:27:48.081755 46712 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.081785 46712 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc001aff3e0 15 D0712 20:27:48.081796 46712 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0712 20:27:48.081888 46712 task_exit.go:204] [ 885: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.081925 46712 task_exit.go:204] [ 885: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.081967 46712 task_signals.go:204] [ 885: 888] Signal 885, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.081995 46712 task_exit.go:204] [ 885: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.081991 46712 task_signals.go:204] [ 885: 889] Signal 885, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.082004 46712 task_exit.go:204] [ 885: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.081955 46712 task_signals.go:204] [ 885: 887] Signal 885, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.082011 46712 task_exit.go:204] [ 885: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.081996 46712 task_signals.go:204] [ 885: 886] Signal 885, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.082033 46712 task_exit.go:204] [ 885: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.082044 46712 task_exit.go:204] [ 885: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.082050 46712 task_exit.go:204] [ 885: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.082088 46712 task_exit.go:204] [ 885: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.082099 46712 task_exit.go:204] [ 885: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.082106 46712 task_exit.go:204] [ 885: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.082128 46712 task_exit.go:204] [ 885: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.083588 46712 task_exit.go:204] [ 885: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.083625 46712 task_exit.go:204] [ 885: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.083647 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.083683 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.083695 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.083941 46712 task_exit.go:204] [ 885: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.084737 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.086498 46712 syscalls.go:262] [ 890: 890] Allocating stack with size of 8388608 bytes D0712 20:27:48.086778 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.087904 46712 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.087938 46712 usertrap_amd64.go:106] [ 890: 890] Map a usertrap vma at 68000 D0712 20:27:48.088000 46712 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001d092c0 1 D0712 20:27:48.088022 46712 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:27:48.088388 46712 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.088410 46712 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001d092c0 2 D0712 20:27:48.088419 46712 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:27:48.089044 46712 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.089077 46712 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001d092c0 3 D0712 20:27:48.089089 46712 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:27:48.094892 46712 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.094934 46712 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001d092c0 4 D0712 20:27:48.094955 46712 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:27:48.095912 46712 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.095927 46712 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001d092c0 5 D0712 20:27:48.095933 46712 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:27:48.095955 46712 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.095965 46712 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001d092c0 6 D0712 20:27:48.095974 46712 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:27:48.096323 46712 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.096363 46712 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001d092c0 7 D0712 20:27:48.096374 46712 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:27:48.096582 46712 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.096608 46712 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc001d092c0 8 D0712 20:27:48.096619 46712 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:27:48.096839 46712 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.096872 46712 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc001d092c0 9 D0712 20:27:48.096881 46712 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:27:48.096894 46712 usertrap_amd64.go:212] [ 890: 893] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.096910 46712 usertrap_amd64.go:122] [ 890: 893] Allocate a new trap: 0xc001d092c0 10 D0712 20:27:48.096931 46712 usertrap_amd64.go:225] [ 890: 893] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:27:48.104477 46712 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.104524 46712 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001d092c0 11 D0712 20:27:48.104536 46712 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:27:48.107334 46712 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.107376 46712 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc001d092c0 12 D0712 20:27:48.107387 46712 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:27:48.107578 46712 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.107598 46712 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc001d092c0 13 D0712 20:27:48.107606 46712 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:27:48.107642 46712 task_signals.go:470] [ 890: 890] Notified of signal 23 D0712 20:27:48.107712 46712 task_signals.go:220] [ 890: 890] Signal 23: delivering to handler D0712 20:27:48.115234 46712 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.115273 46712 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc001d092c0 14 D0712 20:27:48.115287 46712 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:27:48.115365 46712 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.115395 46712 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.115424 46712 task_signals.go:204] [ 890: 893] Signal 890, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.115470 46712 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.115410 46712 task_signals.go:204] [ 890: 892] Signal 890, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.115464 46712 task_signals.go:204] [ 890: 894] Signal 890, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.115480 46712 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.115505 46712 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.115540 46712 task_signals.go:204] [ 890: 895] Signal 890, PID: 895, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.115537 46712 task_signals.go:204] [ 890: 891] Signal 890, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.115553 46712 task_exit.go:204] [ 890: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.115580 46712 task_exit.go:204] [ 890: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.115602 46712 task_exit.go:204] [ 890: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.115618 46712 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.115628 46712 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.115633 46712 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.115645 46712 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.115653 46712 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.115672 46712 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.115685 46712 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.117181 46712 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.117216 46712 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.117231 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.117263 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.117289 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.117414 46712 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.118064 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.119758 46712 syscalls.go:262] [ 896: 896] Allocating stack with size of 8388608 bytes D0712 20:27:48.119907 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.121092 46712 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.121143 46712 usertrap_amd64.go:106] [ 896: 896] Map a usertrap vma at 64000 D0712 20:27:48.121306 46712 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001cd4240 1 D0712 20:27:48.121362 46712 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:27:48.121774 46712 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.121796 46712 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001cd4240 2 D0712 20:27:48.121808 46712 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:27:48.122692 46712 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.122740 46712 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001cd4240 3 D0712 20:27:48.122758 46712 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:27:48.129522 46712 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.129572 46712 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001cd4240 4 D0712 20:27:48.129588 46712 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:27:48.131314 46712 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.131347 46712 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001cd4240 5 D0712 20:27:48.131360 46712 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:27:48.131466 46712 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.131477 46712 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001cd4240 6 D0712 20:27:48.131485 46712 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:27:48.131914 46712 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.132000 46712 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001cd4240 7 D0712 20:27:48.132023 46712 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:27:48.132252 46712 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.132280 46712 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc001cd4240 8 D0712 20:27:48.132292 46712 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:27:48.132445 46712 usertrap_amd64.go:212] [ 896: 898] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.132469 46712 usertrap_amd64.go:122] [ 896: 898] Allocate a new trap: 0xc001cd4240 9 D0712 20:27:48.132478 46712 usertrap_amd64.go:225] [ 896: 898] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:27:48.132526 46712 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.132546 46712 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001cd4240 10 D0712 20:27:48.132557 46712 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:27:48.140575 46712 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.140703 46712 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001cd4240 11 D0712 20:27:48.140726 46712 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:27:48.143461 46712 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.143519 46712 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc001cd4240 12 D0712 20:27:48.143541 46712 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:27:48.143569 46712 usertrap_amd64.go:212] [ 896: 897] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.143577 46712 usertrap_amd64.go:122] [ 896: 897] Allocate a new trap: 0xc001cd4240 13 D0712 20:27:48.143668 46712 usertrap_amd64.go:225] [ 896: 897] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:27:48.143797 46712 task_signals.go:470] [ 896: 896] Notified of signal 23 D0712 20:27:48.143910 46712 task_signals.go:220] [ 896: 896] Signal 23: delivering to handler D0712 20:27:48.152826 46712 usertrap_amd64.go:212] [ 896: 896] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.152867 46712 usertrap_amd64.go:122] [ 896: 896] Allocate a new trap: 0xc001cd4240 14 D0712 20:27:48.152883 46712 usertrap_amd64.go:225] [ 896: 896] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:27:48.152977 46712 task_exit.go:204] [ 896: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.153023 46712 task_exit.go:204] [ 896: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.153066 46712 task_signals.go:204] [ 896: 899] Signal 896, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.153042 46712 task_signals.go:204] [ 896: 897] Signal 896, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.153088 46712 task_exit.go:204] [ 896: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.153121 46712 task_signals.go:204] [ 896: 898] Signal 896, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.153145 46712 task_signals.go:204] [ 896: 900] Signal 896, PID: 900, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.153184 46712 task_exit.go:204] [ 896: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.153201 46712 task_exit.go:204] [ 896: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.153221 46712 task_exit.go:204] [ 896: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.153229 46712 task_exit.go:204] [ 896: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.153235 46712 task_exit.go:204] [ 896: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.153245 46712 task_exit.go:204] [ 896: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.153254 46712 task_exit.go:204] [ 896: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.153259 46712 task_exit.go:204] [ 896: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.153267 46712 task_exit.go:204] [ 896: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.154759 46712 task_exit.go:204] [ 896: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.154783 46712 task_exit.go:204] [ 896: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.154811 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.154854 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.154863 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.155021 46712 task_exit.go:204] [ 896: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.155190 46712 task_signals.go:470] [ 6: 8] Notified of signal 23 D0712 20:27:48.155315 46712 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0712 20:27:48.155732 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.157280 46712 syscalls.go:262] [ 901: 901] Allocating stack with size of 8388608 bytes D0712 20:27:48.157393 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.161671 46712 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.161720 46712 usertrap_amd64.go:106] [ 901: 901] Map a usertrap vma at 60000 D0712 20:27:48.161811 46712 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0020fbd10 1 D0712 20:27:48.161854 46712 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:27:48.162323 46712 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.162384 46712 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0020fbd10 2 D0712 20:27:48.162434 46712 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:27:48.163118 46712 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.163133 46712 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0020fbd10 3 D0712 20:27:48.163170 46712 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:27:48.170713 46712 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.170744 46712 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0020fbd10 4 D0712 20:27:48.170755 46712 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:27:48.171730 46712 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.171758 46712 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0020fbd10 5 D0712 20:27:48.171774 46712 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:27:48.171827 46712 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.171832 46712 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0020fbd10 6 D0712 20:27:48.171837 46712 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:27:48.172035 46712 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.172056 46712 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0020fbd10 7 D0712 20:27:48.172064 46712 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:27:48.172243 46712 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.172265 46712 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc0020fbd10 8 D0712 20:27:48.172274 46712 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:27:48.172417 46712 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.172448 46712 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc0020fbd10 9 D0712 20:27:48.172458 46712 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:27:48.172619 46712 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.172638 46712 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0020fbd10 10 D0712 20:27:48.172650 46712 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:27:48.179411 46712 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.179443 46712 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0020fbd10 11 D0712 20:27:48.179459 46712 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:27:48.184148 46712 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.184183 46712 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc0020fbd10 12 D0712 20:27:48.184197 46712 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:27:48.184250 46712 usertrap_amd64.go:212] [ 901: 902] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.184259 46712 usertrap_amd64.go:122] [ 901: 902] Allocate a new trap: 0xc0020fbd10 13 D0712 20:27:48.184266 46712 usertrap_amd64.go:225] [ 901: 902] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:27:48.184447 46712 task_signals.go:470] [ 901: 901] Notified of signal 23 D0712 20:27:48.185112 46712 task_signals.go:220] [ 901: 901] Signal 23: delivering to handler D0712 20:27:48.185617 46712 task_signals.go:481] [ 901: 901] No task notified of signal 23 D0712 20:27:48.185744 46712 task_signals.go:220] [ 901: 901] Signal 23: delivering to handler D0712 20:27:48.191827 46712 usertrap_amd64.go:212] [ 901: 901] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.191862 46712 usertrap_amd64.go:122] [ 901: 901] Allocate a new trap: 0xc0020fbd10 14 D0712 20:27:48.191874 46712 usertrap_amd64.go:225] [ 901: 901] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:27:48.191937 46712 task_exit.go:204] [ 901: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.191977 46712 task_exit.go:204] [ 901: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.191979 46712 task_signals.go:204] [ 901: 903] Signal 901, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.192001 46712 task_signals.go:204] [ 901: 904] Signal 901, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.192004 46712 task_exit.go:204] [ 901: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.192005 46712 task_signals.go:204] [ 901: 902] Signal 901, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.192021 46712 task_exit.go:204] [ 901: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.192035 46712 task_exit.go:204] [ 901: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.192083 46712 task_signals.go:204] [ 901: 905] Signal 901, PID: 905, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.192097 46712 task_exit.go:204] [ 901: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.192121 46712 task_signals.go:204] [ 901: 906] Signal 901, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.192149 46712 task_exit.go:204] [ 901: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.192157 46712 task_exit.go:204] [ 901: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.192168 46712 task_exit.go:204] [ 901: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.192175 46712 task_exit.go:204] [ 901: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.192179 46712 task_exit.go:204] [ 901: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.192187 46712 task_exit.go:204] [ 901: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.192194 46712 task_exit.go:204] [ 901: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.192198 46712 task_exit.go:204] [ 901: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.192233 46712 task_exit.go:204] [ 901: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.193762 46712 task_exit.go:204] [ 901: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.193793 46712 task_exit.go:204] [ 901: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.193807 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.193906 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.193943 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.194038 46712 task_exit.go:204] [ 901: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.194544 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.196046 46712 syscalls.go:262] [ 907: 907] Allocating stack with size of 8388608 bytes D0712 20:27:48.196235 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.197896 46712 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.197999 46712 usertrap_amd64.go:106] [ 907: 907] Map a usertrap vma at 64000 D0712 20:27:48.198093 46712 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc001d099b0 1 D0712 20:27:48.198121 46712 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:27:48.198430 46712 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.198454 46712 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc001d099b0 2 D0712 20:27:48.198463 46712 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:27:48.199207 46712 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.199233 46712 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc001d099b0 3 D0712 20:27:48.199242 46712 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:27:48.206117 46712 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.206189 46712 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc001d099b0 4 D0712 20:27:48.206209 46712 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:27:48.207471 46712 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.207504 46712 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc001d099b0 5 D0712 20:27:48.207514 46712 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:27:48.207568 46712 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.207577 46712 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc001d099b0 6 D0712 20:27:48.207584 46712 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:27:48.207875 46712 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.207961 46712 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc001d099b0 7 D0712 20:27:48.207983 46712 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:27:48.208193 46712 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.208218 46712 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc001d099b0 8 D0712 20:27:48.208232 46712 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:27:48.208417 46712 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.208462 46712 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc001d099b0 9 D0712 20:27:48.208479 46712 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:27:48.208690 46712 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.208715 46712 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc001d099b0 10 D0712 20:27:48.208727 46712 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:27:48.216142 46712 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.216180 46712 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc001d099b0 11 D0712 20:27:48.216196 46712 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:27:48.220180 46712 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.220205 46712 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc001d099b0 12 D0712 20:27:48.220219 46712 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:27:48.220251 46712 usertrap_amd64.go:212] [ 907: 908] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.220259 46712 usertrap_amd64.go:122] [ 907: 908] Allocate a new trap: 0xc001d099b0 13 D0712 20:27:48.220267 46712 usertrap_amd64.go:225] [ 907: 908] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:27:48.220291 46712 task_signals.go:470] [ 907: 907] Notified of signal 23 D0712 20:27:48.220348 46712 task_signals.go:220] [ 907: 907] Signal 23: delivering to handler D0712 20:27:48.225513 46712 usertrap_amd64.go:212] [ 907: 907] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.225547 46712 usertrap_amd64.go:122] [ 907: 907] Allocate a new trap: 0xc001d099b0 14 D0712 20:27:48.225561 46712 usertrap_amd64.go:225] [ 907: 907] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:27:48.225602 46712 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.225624 46712 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.225660 46712 task_signals.go:204] [ 907: 910] Signal 907, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.225678 46712 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.225678 46712 task_signals.go:204] [ 907: 908] Signal 907, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.225686 46712 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.225717 46712 task_exit.go:204] [ 907: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.225745 46712 task_signals.go:204] [ 907: 911] Signal 907, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.225744 46712 task_signals.go:204] [ 907: 909] Signal 907, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.225765 46712 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.225788 46712 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.225796 46712 task_exit.go:204] [ 907: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.225809 46712 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.225817 46712 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.225821 46712 task_exit.go:204] [ 907: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.225831 46712 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.227247 46712 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.227280 46712 task_exit.go:204] [ 907: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.227303 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.227330 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.227354 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.227471 46712 task_exit.go:204] [ 907: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.227952 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.229404 46712 syscalls.go:262] [ 912: 912] Allocating stack with size of 8388608 bytes D0712 20:27:48.229567 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.230889 46712 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.230987 46712 usertrap_amd64.go:106] [ 912: 912] Map a usertrap vma at 63000 D0712 20:27:48.231089 46712 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001cd49f0 1 D0712 20:27:48.231116 46712 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:48.231594 46712 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.231619 46712 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001cd49f0 2 D0712 20:27:48.231631 46712 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:48.232483 46712 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.232516 46712 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001cd49f0 3 D0712 20:27:48.232527 46712 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:48.239059 46712 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.239102 46712 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001cd49f0 4 D0712 20:27:48.239117 46712 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:48.240110 46712 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.240141 46712 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001cd49f0 5 D0712 20:27:48.240158 46712 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:48.240233 46712 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.240248 46712 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001cd49f0 6 D0712 20:27:48.240254 46712 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:48.240647 46712 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.240667 46712 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001cd49f0 7 D0712 20:27:48.240672 46712 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:48.240808 46712 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.240832 46712 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc001cd49f0 8 D0712 20:27:48.240841 46712 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:48.241233 46712 usertrap_amd64.go:212] [ 912: 914] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.241269 46712 usertrap_amd64.go:122] [ 912: 914] Allocate a new trap: 0xc001cd49f0 9 D0712 20:27:48.241281 46712 usertrap_amd64.go:225] [ 912: 914] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:48.241505 46712 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.241593 46712 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001cd49f0 10 D0712 20:27:48.241627 46712 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:48.242160 46712 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.242227 46712 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc001cd49f0 11 D0712 20:27:48.242256 46712 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:48.242353 46712 usertrap_amd64.go:212] [ 912: 913] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.242381 46712 usertrap_amd64.go:122] [ 912: 913] Allocate a new trap: 0xc001cd49f0 12 D0712 20:27:48.242393 46712 usertrap_amd64.go:225] [ 912: 913] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:48.242434 46712 task_signals.go:470] [ 912: 912] Notified of signal 23 D0712 20:27:48.242505 46712 task_signals.go:220] [ 912: 912] Signal 23: delivering to handler D0712 20:27:48.249560 46712 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.249581 46712 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001cd49f0 13 D0712 20:27:48.249600 46712 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:48.253958 46712 task_signals.go:470] [ 912: 912] Notified of signal 23 D0712 20:27:48.254067 46712 task_signals.go:220] [ 912: 912] Signal 23: delivering to handler D0712 20:27:48.260781 46712 usertrap_amd64.go:212] [ 912: 912] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.260813 46712 usertrap_amd64.go:122] [ 912: 912] Allocate a new trap: 0xc001cd49f0 14 D0712 20:27:48.260828 46712 usertrap_amd64.go:225] [ 912: 912] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:48.260910 46712 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.260971 46712 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.261018 46712 task_signals.go:204] [ 912: 916] Signal 912, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.261013 46712 task_signals.go:204] [ 912: 915] Signal 912, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.261050 46712 task_signals.go:204] [ 912: 913] Signal 912, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.261050 46712 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.261077 46712 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.261096 46712 task_exit.go:204] [ 912: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.261116 46712 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.261135 46712 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.261141 46712 task_exit.go:204] [ 912: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.261006 46712 task_signals.go:204] [ 912: 914] Signal 912, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.261158 46712 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.261167 46712 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.261182 46712 task_exit.go:204] [ 912: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.261196 46712 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.262648 46712 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.262693 46712 task_exit.go:204] [ 912: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.262709 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.262751 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.262764 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.262874 46712 task_exit.go:204] [ 912: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.263723 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.265448 46712 syscalls.go:262] [ 917: 917] Allocating stack with size of 8388608 bytes D0712 20:27:48.265577 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.267079 46712 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.267123 46712 usertrap_amd64.go:106] [ 917: 917] Map a usertrap vma at 67000 D0712 20:27:48.267211 46712 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000de8810 1 D0712 20:27:48.267232 46712 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:27:48.267830 46712 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.267853 46712 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000de8810 2 D0712 20:27:48.267863 46712 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:27:48.268633 46712 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.268659 46712 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000de8810 3 D0712 20:27:48.268668 46712 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:27:48.275426 46712 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.275452 46712 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000de8810 4 D0712 20:27:48.275463 46712 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:27:48.276631 46712 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.276658 46712 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000de8810 5 D0712 20:27:48.276667 46712 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:27:48.276750 46712 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.276761 46712 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000de8810 6 D0712 20:27:48.276770 46712 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:27:48.277280 46712 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.277306 46712 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000de8810 7 D0712 20:27:48.277315 46712 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:27:48.277548 46712 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.277591 46712 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc000de8810 8 D0712 20:27:48.277608 46712 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:27:48.277873 46712 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.277898 46712 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000de8810 9 D0712 20:27:48.277910 46712 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:27:48.277982 46712 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.277997 46712 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc000de8810 10 D0712 20:27:48.278006 46712 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:27:48.285446 46712 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.285502 46712 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000de8810 11 D0712 20:27:48.285519 46712 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:27:48.289315 46712 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.289358 46712 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc000de8810 12 D0712 20:27:48.289377 46712 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:27:48.289432 46712 usertrap_amd64.go:212] [ 917: 918] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.289503 46712 usertrap_amd64.go:122] [ 917: 918] Allocate a new trap: 0xc000de8810 13 D0712 20:27:48.289522 46712 usertrap_amd64.go:225] [ 917: 918] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:27:48.289579 46712 task_signals.go:470] [ 917: 917] Notified of signal 23 D0712 20:27:48.289674 46712 task_signals.go:220] [ 917: 917] Signal 23: delivering to handler D0712 20:27:48.296392 46712 usertrap_amd64.go:212] [ 917: 917] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.296437 46712 usertrap_amd64.go:122] [ 917: 917] Allocate a new trap: 0xc000de8810 14 D0712 20:27:48.296461 46712 usertrap_amd64.go:225] [ 917: 917] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:27:48.296525 46712 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.296557 46712 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.296576 46712 task_signals.go:204] [ 917: 921] Signal 917, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.296588 46712 task_signals.go:204] [ 917: 920] Signal 917, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.296603 46712 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.296619 46712 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.296643 46712 task_exit.go:204] [ 917: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.296618 46712 task_signals.go:204] [ 917: 922] Signal 917, PID: 922, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.296661 46712 task_exit.go:204] [ 917: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.296670 46712 task_exit.go:204] [ 917: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.296675 46712 task_exit.go:204] [ 917: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.296584 46712 task_signals.go:204] [ 917: 918] Signal 917, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.296688 46712 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.296698 46712 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.296764 46712 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.296773 46712 task_exit.go:204] [ 917: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.296809 46712 task_signals.go:204] [ 917: 919] Signal 917, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.296852 46712 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.296867 46712 task_exit.go:204] [ 917: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.296909 46712 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.298220 46712 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.298261 46712 task_exit.go:204] [ 917: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.298275 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.298339 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.298358 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.298509 46712 task_exit.go:204] [ 917: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.299214 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.300804 46712 syscalls.go:262] [ 923: 923] Allocating stack with size of 8388608 bytes D0712 20:27:48.300923 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.302785 46712 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.302827 46712 usertrap_amd64.go:106] [ 923: 923] Map a usertrap vma at 63000 D0712 20:27:48.302903 46712 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000d4db60 1 D0712 20:27:48.302944 46712 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:48.303577 46712 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.303616 46712 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000d4db60 2 D0712 20:27:48.303635 46712 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:48.304339 46712 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.304369 46712 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000d4db60 3 D0712 20:27:48.304386 46712 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:48.311820 46712 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.311874 46712 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000d4db60 4 D0712 20:27:48.311890 46712 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:48.313315 46712 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.313345 46712 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000d4db60 5 D0712 20:27:48.313355 46712 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:48.313506 46712 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.313523 46712 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000d4db60 6 D0712 20:27:48.313536 46712 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:48.313926 46712 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.313959 46712 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000d4db60 7 D0712 20:27:48.313969 46712 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:48.314338 46712 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.314355 46712 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc000d4db60 8 D0712 20:27:48.314367 46712 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:48.314631 46712 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.314725 46712 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000d4db60 9 D0712 20:27:48.314764 46712 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:48.314792 46712 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.314800 46712 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc000d4db60 10 D0712 20:27:48.314813 46712 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:48.323953 46712 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.323986 46712 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000d4db60 11 D0712 20:27:48.324000 46712 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:48.326745 46712 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.326823 46712 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc000d4db60 12 D0712 20:27:48.326849 46712 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:48.326875 46712 usertrap_amd64.go:212] [ 923: 924] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.326884 46712 usertrap_amd64.go:122] [ 923: 924] Allocate a new trap: 0xc000d4db60 13 D0712 20:27:48.326894 46712 usertrap_amd64.go:225] [ 923: 924] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:48.326933 46712 task_signals.go:470] [ 923: 923] Notified of signal 23 D0712 20:27:48.326981 46712 task_signals.go:220] [ 923: 923] Signal 23: delivering to handler D0712 20:27:48.335381 46712 usertrap_amd64.go:212] [ 923: 923] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.335426 46712 usertrap_amd64.go:122] [ 923: 923] Allocate a new trap: 0xc000d4db60 14 D0712 20:27:48.335450 46712 usertrap_amd64.go:225] [ 923: 923] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:48.335481 46712 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.335521 46712 task_signals.go:204] [ 923: 924] Signal 923, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.335546 46712 task_signals.go:204] [ 923: 927] Signal 923, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.335561 46712 task_signals.go:204] [ 923: 926] Signal 923, PID: 926, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.335588 46712 task_signals.go:204] [ 923: 925] Signal 923, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.335599 46712 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.335615 46712 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.335624 46712 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.335630 46712 task_exit.go:204] [ 923: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.335641 46712 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.335659 46712 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.335665 46712 task_exit.go:204] [ 923: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.335676 46712 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.335684 46712 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.335689 46712 task_exit.go:204] [ 923: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.335698 46712 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.337189 46712 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.337227 46712 task_exit.go:204] [ 923: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.337252 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.337298 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.337319 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.337379 46712 task_exit.go:204] [ 923: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.337945 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.339803 46712 syscalls.go:262] [ 928: 928] Allocating stack with size of 8388608 bytes D0712 20:27:48.339925 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.341421 46712 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.341464 46712 usertrap_amd64.go:106] [ 928: 928] Map a usertrap vma at 66000 D0712 20:27:48.342153 46712 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000de8e70 1 D0712 20:27:48.342197 46712 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:48.342630 46712 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.342646 46712 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000de8e70 2 D0712 20:27:48.342655 46712 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:48.343404 46712 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.343430 46712 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000de8e70 3 D0712 20:27:48.343441 46712 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:48.349348 46712 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.349380 46712 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000de8e70 4 D0712 20:27:48.349391 46712 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:48.350526 46712 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.350549 46712 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000de8e70 5 D0712 20:27:48.350557 46712 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:48.350677 46712 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.350691 46712 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000de8e70 6 D0712 20:27:48.350697 46712 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:48.351144 46712 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.351166 46712 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000de8e70 7 D0712 20:27:48.351175 46712 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:48.351462 46712 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.351488 46712 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc000de8e70 8 D0712 20:27:48.351497 46712 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:48.351680 46712 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.351702 46712 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc000de8e70 9 D0712 20:27:48.351712 46712 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:48.351774 46712 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.351789 46712 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000de8e70 10 D0712 20:27:48.351797 46712 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:48.352044 46712 usertrap_amd64.go:212] [ 928: 931] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:48.352060 46712 usertrap_amd64.go:122] [ 928: 931] Allocate a new trap: 0xc000de8e70 11 D0712 20:27:48.352071 46712 usertrap_amd64.go:225] [ 928: 931] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:48.360332 46712 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.360375 46712 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000de8e70 12 D0712 20:27:48.360393 46712 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:48.363198 46712 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.363440 46712 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc000de8e70 13 D0712 20:27:48.363476 46712 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:48.363590 46712 usertrap_amd64.go:212] [ 928: 929] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.363609 46712 usertrap_amd64.go:122] [ 928: 929] Allocate a new trap: 0xc000de8e70 14 D0712 20:27:48.363622 46712 usertrap_amd64.go:225] [ 928: 929] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:48.363702 46712 task_signals.go:470] [ 928: 928] Notified of signal 23 D0712 20:27:48.363821 46712 task_signals.go:220] [ 928: 928] Signal 23: delivering to handler I0712 20:27:48.373416 46712 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0712 20:27:48.373521 46712 usertrap_amd64.go:212] [ 928: 928] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.373536 46712 usertrap_amd64.go:122] [ 928: 928] Allocate a new trap: 0xc000de8e70 15 D0712 20:27:48.373552 46712 usertrap_amd64.go:225] [ 928: 928] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0712 20:27:48.373630 46712 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.373841 46712 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.373887 46712 task_signals.go:204] [ 928: 930] Signal 928, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.373908 46712 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.373918 46712 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.373924 46712 task_exit.go:204] [ 928: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.373947 46712 task_signals.go:204] [ 928: 929] Signal 928, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.374024 46712 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.374094 46712 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.374105 46712 task_exit.go:204] [ 928: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.374124 46712 task_signals.go:204] [ 928: 931] Signal 928, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.374137 46712 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.374144 46712 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.374150 46712 task_exit.go:204] [ 928: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.374164 46712 task_signals.go:204] [ 928: 932] Signal 928, PID: 932, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.374191 46712 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.374200 46712 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.374204 46712 task_exit.go:204] [ 928: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.374217 46712 task_signals.go:204] [ 928: 933] Signal 928, PID: 933, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.374227 46712 task_exit.go:204] [ 928: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.375704 46712 task_exit.go:204] [ 928: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.375743 46712 task_exit.go:204] [ 928: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.375760 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.375842 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.375864 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.376044 46712 task_exit.go:204] [ 928: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.376820 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.378366 46712 syscalls.go:262] [ 934: 934] Allocating stack with size of 8388608 bytes D0712 20:27:48.378520 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.379965 46712 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.380036 46712 usertrap_amd64.go:106] [ 934: 934] Map a usertrap vma at 69000 D0712 20:27:48.380130 46712 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc000d4dfb0 1 D0712 20:27:48.380163 46712 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:27:48.380599 46712 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.380622 46712 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc000d4dfb0 2 D0712 20:27:48.380650 46712 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:27:48.381616 46712 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.381649 46712 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc000d4dfb0 3 D0712 20:27:48.381662 46712 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:27:48.389165 46712 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.389206 46712 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc000d4dfb0 4 D0712 20:27:48.389224 46712 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:27:48.390589 46712 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.390640 46712 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc000d4dfb0 5 D0712 20:27:48.390661 46712 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:27:48.390833 46712 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.390859 46712 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc000d4dfb0 6 D0712 20:27:48.390871 46712 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:27:48.391365 46712 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.391392 46712 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc000d4dfb0 7 D0712 20:27:48.391402 46712 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:27:48.391611 46712 usertrap_amd64.go:212] [ 934: 935] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.391635 46712 usertrap_amd64.go:122] [ 934: 935] Allocate a new trap: 0xc000d4dfb0 8 D0712 20:27:48.391649 46712 usertrap_amd64.go:225] [ 934: 935] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:27:48.391902 46712 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.391923 46712 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc000d4dfb0 9 D0712 20:27:48.391934 46712 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:27:48.392004 46712 usertrap_amd64.go:212] [ 934: 935] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.392034 46712 usertrap_amd64.go:122] [ 934: 935] Allocate a new trap: 0xc000d4dfb0 10 D0712 20:27:48.392045 46712 usertrap_amd64.go:225] [ 934: 935] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:27:48.401376 46712 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.401412 46712 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc000d4dfb0 11 D0712 20:27:48.401426 46712 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:27:48.403972 46712 usertrap_amd64.go:212] [ 934: 935] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.404005 46712 usertrap_amd64.go:122] [ 934: 935] Allocate a new trap: 0xc000d4dfb0 12 D0712 20:27:48.404030 46712 usertrap_amd64.go:225] [ 934: 935] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:27:48.404080 46712 usertrap_amd64.go:212] [ 934: 935] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.404095 46712 usertrap_amd64.go:122] [ 934: 935] Allocate a new trap: 0xc000d4dfb0 13 D0712 20:27:48.404104 46712 usertrap_amd64.go:225] [ 934: 935] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:27:48.404182 46712 task_signals.go:470] [ 934: 934] Notified of signal 23 D0712 20:27:48.404275 46712 task_signals.go:220] [ 934: 934] Signal 23: delivering to handler D0712 20:27:48.412130 46712 usertrap_amd64.go:212] [ 934: 934] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.412157 46712 usertrap_amd64.go:122] [ 934: 934] Allocate a new trap: 0xc000d4dfb0 14 D0712 20:27:48.412167 46712 usertrap_amd64.go:225] [ 934: 934] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:27:48.412292 46712 task_exit.go:204] [ 934: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.412307 46712 task_exit.go:204] [ 934: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.412327 46712 task_signals.go:204] [ 934: 937] Signal 934, PID: 937, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.412349 46712 task_signals.go:204] [ 934: 938] Signal 934, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.412355 46712 task_exit.go:204] [ 934: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.412360 46712 task_exit.go:204] [ 934: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.412367 46712 task_exit.go:204] [ 934: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.412356 46712 task_signals.go:204] [ 934: 936] Signal 934, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.412380 46712 task_signals.go:204] [ 934: 935] Signal 934, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.412392 46712 task_exit.go:204] [ 934: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.412434 46712 task_exit.go:204] [ 934: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.412456 46712 task_exit.go:204] [ 934: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.412476 46712 task_exit.go:204] [ 934: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.412493 46712 task_exit.go:204] [ 934: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.412498 46712 task_exit.go:204] [ 934: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.412509 46712 task_exit.go:204] [ 934: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.413981 46712 task_exit.go:204] [ 934: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.414008 46712 task_exit.go:204] [ 934: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.414021 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.414051 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.414058 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.414237 46712 task_exit.go:204] [ 934: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.421234 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.422499 46712 syscalls.go:262] [ 939: 939] Allocating stack with size of 8388608 bytes D0712 20:27:48.422608 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.423955 46712 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.424003 46712 usertrap_amd64.go:106] [ 939: 939] Map a usertrap vma at 66000 D0712 20:27:48.424127 46712 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001cd5920 1 D0712 20:27:48.424161 46712 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:48.424587 46712 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.424612 46712 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001cd5920 2 D0712 20:27:48.424623 46712 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:48.425486 46712 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.425514 46712 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001cd5920 3 D0712 20:27:48.425521 46712 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:48.432262 46712 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.432297 46712 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001cd5920 4 D0712 20:27:48.432321 46712 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:48.433411 46712 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.433442 46712 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001cd5920 5 D0712 20:27:48.433452 46712 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:48.433484 46712 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.433489 46712 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001cd5920 6 D0712 20:27:48.433495 46712 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:48.433640 46712 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.433656 46712 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001cd5920 7 D0712 20:27:48.433662 46712 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:48.433781 46712 usertrap_amd64.go:212] [ 939: 940] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.433793 46712 usertrap_amd64.go:122] [ 939: 940] Allocate a new trap: 0xc001cd5920 8 D0712 20:27:48.433802 46712 usertrap_amd64.go:225] [ 939: 940] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:48.434057 46712 usertrap_amd64.go:212] [ 939: 940] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.434084 46712 usertrap_amd64.go:122] [ 939: 940] Allocate a new trap: 0xc001cd5920 9 D0712 20:27:48.434095 46712 usertrap_amd64.go:225] [ 939: 940] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:48.434129 46712 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.434153 46712 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001cd5920 10 D0712 20:27:48.434164 46712 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:48.441997 46712 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.442016 46712 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001cd5920 11 D0712 20:27:48.442028 46712 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:48.444763 46712 usertrap_amd64.go:212] [ 939: 940] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.444795 46712 usertrap_amd64.go:122] [ 939: 940] Allocate a new trap: 0xc001cd5920 12 D0712 20:27:48.444806 46712 usertrap_amd64.go:225] [ 939: 940] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:48.444826 46712 usertrap_amd64.go:212] [ 939: 940] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.444831 46712 usertrap_amd64.go:122] [ 939: 940] Allocate a new trap: 0xc001cd5920 13 D0712 20:27:48.444835 46712 usertrap_amd64.go:225] [ 939: 940] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:48.444870 46712 task_signals.go:470] [ 939: 939] Notified of signal 23 D0712 20:27:48.445023 46712 task_signals.go:220] [ 939: 939] Signal 23: delivering to handler I0712 20:27:48.452869 46712 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0712 20:27:48.453026 46712 usertrap_amd64.go:212] [ 939: 939] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.453050 46712 usertrap_amd64.go:122] [ 939: 939] Allocate a new trap: 0xc001cd5920 14 D0712 20:27:48.453063 46712 usertrap_amd64.go:225] [ 939: 939] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:48.453539 46712 task_exit.go:204] [ 939: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.453576 46712 task_exit.go:204] [ 939: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.453582 46712 task_signals.go:204] [ 939: 940] Signal 939, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.453600 46712 task_signals.go:204] [ 939: 943] Signal 939, PID: 943, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.453602 46712 task_signals.go:204] [ 939: 941] Signal 939, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.453618 46712 task_exit.go:204] [ 939: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.453639 46712 task_signals.go:204] [ 939: 942] Signal 939, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.453653 46712 task_exit.go:204] [ 939: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.453701 46712 task_exit.go:204] [ 939: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.453729 46712 task_exit.go:204] [ 939: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.453747 46712 task_exit.go:204] [ 939: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.453758 46712 task_exit.go:204] [ 939: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.453763 46712 task_exit.go:204] [ 939: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.453773 46712 task_exit.go:204] [ 939: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.453879 46712 task_exit.go:204] [ 939: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.453902 46712 task_exit.go:204] [ 939: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.455196 46712 task_exit.go:204] [ 939: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.455225 46712 task_exit.go:204] [ 939: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.455238 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.455265 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.455272 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.455433 46712 task_exit.go:204] [ 939: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.455511 46712 task_signals.go:470] [ 6: 14] Notified of signal 23 D0712 20:27:48.455535 46712 task_signals.go:220] [ 6: 14] Signal 23: delivering to handler D0712 20:27:48.456105 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.457701 46712 syscalls.go:262] [ 944: 944] Allocating stack with size of 8388608 bytes D0712 20:27:48.457835 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.459301 46712 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.459344 46712 usertrap_amd64.go:106] [ 944: 944] Map a usertrap vma at 68000 D0712 20:27:48.459461 46712 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc0009e8870 1 D0712 20:27:48.459494 46712 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:27:48.460010 46712 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.460042 46712 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc0009e8870 2 D0712 20:27:48.460056 46712 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:27:48.460810 46712 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.460843 46712 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc0009e8870 3 D0712 20:27:48.460859 46712 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:27:48.466212 46712 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.466245 46712 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc0009e8870 4 D0712 20:27:48.466261 46712 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:27:48.467237 46712 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.467268 46712 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc0009e8870 5 D0712 20:27:48.467284 46712 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:27:48.467334 46712 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.467344 46712 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc0009e8870 6 D0712 20:27:48.467357 46712 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:27:48.467819 46712 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.467848 46712 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc0009e8870 7 D0712 20:27:48.467859 46712 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:27:48.468055 46712 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.468081 46712 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc0009e8870 8 D0712 20:27:48.468090 46712 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:27:48.468219 46712 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.468234 46712 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc0009e8870 9 D0712 20:27:48.468241 46712 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:27:48.468248 46712 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.468252 46712 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc0009e8870 10 D0712 20:27:48.468256 46712 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:27:48.469283 46712 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.469307 46712 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc0009e8870 11 D0712 20:27:48.469318 46712 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:27:48.469332 46712 usertrap_amd64.go:212] [ 944: 945] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.469339 46712 usertrap_amd64.go:122] [ 944: 945] Allocate a new trap: 0xc0009e8870 12 D0712 20:27:48.469348 46712 usertrap_amd64.go:225] [ 944: 945] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:27:48.469456 46712 task_signals.go:470] [ 944: 944] Notified of signal 23 D0712 20:27:48.469514 46712 task_signals.go:220] [ 944: 944] Signal 23: delivering to handler D0712 20:27:48.475877 46712 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.475899 46712 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc0009e8870 13 D0712 20:27:48.475908 46712 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:27:48.479661 46712 task_signals.go:470] [ 944: 944] Notified of signal 23 D0712 20:27:48.479708 46712 task_signals.go:220] [ 944: 944] Signal 23: delivering to handler I0712 20:27:48.485953 46712 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0712 20:27:48.486059 46712 usertrap_amd64.go:212] [ 944: 944] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.486096 46712 usertrap_amd64.go:122] [ 944: 944] Allocate a new trap: 0xc0009e8870 14 D0712 20:27:48.486109 46712 usertrap_amd64.go:225] [ 944: 944] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:27:48.486165 46712 task_exit.go:204] [ 944: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.486206 46712 task_exit.go:204] [ 944: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.486227 46712 task_signals.go:204] [ 944: 946] Signal 944, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.486238 46712 task_exit.go:204] [ 944: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.486244 46712 task_exit.go:204] [ 944: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.486247 46712 task_exit.go:204] [ 944: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.486242 46712 task_signals.go:204] [ 944: 948] Signal 944, PID: 948, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.486276 46712 task_exit.go:204] [ 944: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.486283 46712 task_exit.go:204] [ 944: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.486289 46712 task_exit.go:204] [ 944: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.486301 46712 task_signals.go:204] [ 944: 945] Signal 944, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.486317 46712 task_exit.go:204] [ 944: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.486344 46712 task_signals.go:204] [ 944: 947] Signal 944, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.486371 46712 task_exit.go:204] [ 944: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.486378 46712 task_exit.go:204] [ 944: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.486390 46712 task_exit.go:204] [ 944: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.487725 46712 task_exit.go:204] [ 944: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.487754 46712 task_exit.go:204] [ 944: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.487770 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.487807 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.487817 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.487991 46712 task_exit.go:204] [ 944: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.488477 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.489788 46712 syscalls.go:262] [ 949: 949] Allocating stack with size of 8388608 bytes D0712 20:27:48.489910 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.491250 46712 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.491285 46712 usertrap_amd64.go:106] [ 949: 949] Map a usertrap vma at 68000 D0712 20:27:48.491361 46712 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0009e8d20 1 D0712 20:27:48.491396 46712 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:27:48.491884 46712 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.491904 46712 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0009e8d20 2 D0712 20:27:48.491912 46712 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:27:48.492597 46712 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.492616 46712 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0009e8d20 3 D0712 20:27:48.492622 46712 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:27:48.498508 46712 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.498561 46712 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0009e8d20 4 D0712 20:27:48.498577 46712 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:27:48.499686 46712 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.499719 46712 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0009e8d20 5 D0712 20:27:48.499734 46712 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:27:48.499786 46712 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.499791 46712 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0009e8d20 6 D0712 20:27:48.499800 46712 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:27:48.500141 46712 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.500155 46712 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0009e8d20 7 D0712 20:27:48.500161 46712 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:27:48.500267 46712 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.500280 46712 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc0009e8d20 8 D0712 20:27:48.500286 46712 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:27:48.500478 46712 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.500506 46712 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc0009e8d20 9 D0712 20:27:48.500559 46712 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:27:48.500576 46712 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.500584 46712 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0009e8d20 10 D0712 20:27:48.500592 46712 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:27:48.507987 46712 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.508014 46712 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0009e8d20 11 D0712 20:27:48.508025 46712 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:27:48.511920 46712 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.511955 46712 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc0009e8d20 12 D0712 20:27:48.511965 46712 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:27:48.512037 46712 usertrap_amd64.go:212] [ 949: 950] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.512052 46712 usertrap_amd64.go:122] [ 949: 950] Allocate a new trap: 0xc0009e8d20 13 D0712 20:27:48.512057 46712 usertrap_amd64.go:225] [ 949: 950] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:27:48.512077 46712 task_signals.go:470] [ 949: 949] Notified of signal 23 D0712 20:27:48.512142 46712 task_signals.go:220] [ 949: 949] Signal 23: delivering to handler I0712 20:27:48.517827 46712 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0712 20:27:48.517876 46712 usertrap_amd64.go:212] [ 949: 949] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.517886 46712 usertrap_amd64.go:122] [ 949: 949] Allocate a new trap: 0xc0009e8d20 14 D0712 20:27:48.517902 46712 usertrap_amd64.go:225] [ 949: 949] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:27:48.517955 46712 task_exit.go:204] [ 949: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.517991 46712 task_signals.go:204] [ 949: 951] Signal 949, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.517997 46712 task_signals.go:204] [ 949: 952] Signal 949, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.518074 46712 task_signals.go:204] [ 949: 950] Signal 949, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.518087 46712 task_signals.go:204] [ 949: 954] Signal 949, PID: 954, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.518100 46712 task_exit.go:204] [ 949: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.518117 46712 task_signals.go:204] [ 949: 953] Signal 949, PID: 953, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.518122 46712 task_exit.go:204] [ 949: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.518158 46712 task_exit.go:204] [ 949: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.518167 46712 task_exit.go:204] [ 949: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.518186 46712 task_exit.go:204] [ 949: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.518209 46712 task_exit.go:204] [ 949: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.518215 46712 task_exit.go:204] [ 949: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.518226 46712 task_exit.go:204] [ 949: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.518234 46712 task_exit.go:204] [ 949: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.518249 46712 task_exit.go:204] [ 949: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.518276 46712 task_exit.go:204] [ 949: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.518303 46712 task_exit.go:204] [ 949: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.518334 46712 task_exit.go:204] [ 949: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.518367 46712 task_exit.go:204] [ 949: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.519674 46712 task_exit.go:204] [ 949: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.519704 46712 task_exit.go:204] [ 949: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.519719 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.519740 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.519757 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.519813 46712 task_exit.go:204] [ 949: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.520481 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.522030 46712 syscalls.go:262] [ 955: 955] Allocating stack with size of 8388608 bytes D0712 20:27:48.522121 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.523771 46712 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.523805 46712 usertrap_amd64.go:106] [ 955: 955] Map a usertrap vma at 63000 D0712 20:27:48.523894 46712 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc000540f90 1 D0712 20:27:48.523921 46712 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:48.524529 46712 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.524557 46712 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc000540f90 2 D0712 20:27:48.524569 46712 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:48.525617 46712 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.525645 46712 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc000540f90 3 D0712 20:27:48.525654 46712 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:48.531917 46712 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.531945 46712 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc000540f90 4 D0712 20:27:48.531964 46712 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:48.533028 46712 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.533063 46712 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc000540f90 5 D0712 20:27:48.533078 46712 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:48.533132 46712 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.533144 46712 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc000540f90 6 D0712 20:27:48.533152 46712 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:48.533694 46712 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.533722 46712 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc000540f90 7 D0712 20:27:48.533732 46712 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:48.533907 46712 usertrap_amd64.go:212] [ 955: 956] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.533926 46712 usertrap_amd64.go:122] [ 955: 956] Allocate a new trap: 0xc000540f90 8 D0712 20:27:48.533935 46712 usertrap_amd64.go:225] [ 955: 956] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:48.534084 46712 usertrap_amd64.go:212] [ 955: 956] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.534109 46712 usertrap_amd64.go:122] [ 955: 956] Allocate a new trap: 0xc000540f90 9 D0712 20:27:48.534125 46712 usertrap_amd64.go:225] [ 955: 956] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:48.534229 46712 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.534258 46712 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc000540f90 10 D0712 20:27:48.534271 46712 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:48.542132 46712 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.542161 46712 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc000540f90 11 D0712 20:27:48.542171 46712 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:48.545102 46712 usertrap_amd64.go:212] [ 955: 956] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.545130 46712 usertrap_amd64.go:122] [ 955: 956] Allocate a new trap: 0xc000540f90 12 D0712 20:27:48.545141 46712 usertrap_amd64.go:225] [ 955: 956] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:48.545202 46712 usertrap_amd64.go:212] [ 955: 956] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.545218 46712 usertrap_amd64.go:122] [ 955: 956] Allocate a new trap: 0xc000540f90 13 D0712 20:27:48.545226 46712 usertrap_amd64.go:225] [ 955: 956] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:48.545242 46712 task_signals.go:470] [ 955: 955] Notified of signal 23 D0712 20:27:48.545330 46712 task_signals.go:220] [ 955: 955] Signal 23: delivering to handler I0712 20:27:48.552384 46712 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0712 20:27:48.552474 46712 usertrap_amd64.go:212] [ 955: 955] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.552491 46712 usertrap_amd64.go:122] [ 955: 955] Allocate a new trap: 0xc000540f90 14 D0712 20:27:48.552499 46712 usertrap_amd64.go:225] [ 955: 955] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:48.552561 46712 task_exit.go:204] [ 955: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.552584 46712 task_exit.go:204] [ 955: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.552605 46712 task_signals.go:204] [ 955: 958] Signal 955, PID: 958, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.552619 46712 task_exit.go:204] [ 955: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.552628 46712 task_exit.go:204] [ 955: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.552643 46712 task_exit.go:204] [ 955: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.552621 46712 task_signals.go:204] [ 955: 957] Signal 955, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.552674 46712 task_exit.go:204] [ 955: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.552684 46712 task_signals.go:204] [ 955: 959] Signal 955, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.552696 46712 task_signals.go:204] [ 955: 956] Signal 955, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.552705 46712 task_exit.go:204] [ 955: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.552710 46712 task_exit.go:204] [ 955: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.552721 46712 task_exit.go:204] [ 955: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.552731 46712 task_exit.go:204] [ 955: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.552747 46712 task_exit.go:204] [ 955: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.552759 46712 task_exit.go:204] [ 955: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.554109 46712 task_exit.go:204] [ 955: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.554151 46712 task_exit.go:204] [ 955: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.554165 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.554235 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.554274 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.554294 46712 task_exit.go:204] [ 955: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.554917 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.556526 46712 syscalls.go:262] [ 960: 960] Allocating stack with size of 8388608 bytes D0712 20:27:48.556637 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.558006 46712 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.558042 46712 usertrap_amd64.go:106] [ 960: 960] Map a usertrap vma at 60000 D0712 20:27:48.558168 46712 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0005e2d50 1 D0712 20:27:48.558194 46712 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:27:48.558647 46712 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.558674 46712 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0005e2d50 2 D0712 20:27:48.558689 46712 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:27:48.559691 46712 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.559720 46712 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0005e2d50 3 D0712 20:27:48.559728 46712 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:27:48.566690 46712 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.566725 46712 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0005e2d50 4 D0712 20:27:48.566739 46712 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:27:48.567751 46712 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.567780 46712 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0005e2d50 5 D0712 20:27:48.567792 46712 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:27:48.567856 46712 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.567872 46712 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0005e2d50 6 D0712 20:27:48.567886 46712 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:27:48.568394 46712 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.568415 46712 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0005e2d50 7 D0712 20:27:48.568421 46712 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:27:48.568578 46712 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.568611 46712 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc0005e2d50 8 D0712 20:27:48.568628 46712 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:27:48.568801 46712 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.568832 46712 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0005e2d50 9 D0712 20:27:48.568843 46712 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:27:48.568929 46712 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.568975 46712 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc0005e2d50 10 D0712 20:27:48.568985 46712 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:27:48.569582 46712 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.569610 46712 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc0005e2d50 11 D0712 20:27:48.569620 46712 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:27:48.569674 46712 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.569694 46712 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc0005e2d50 12 D0712 20:27:48.569708 46712 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:27:48.569791 46712 task_signals.go:470] [ 960: 960] Notified of signal 23 D0712 20:27:48.569824 46712 task_signals.go:220] [ 960: 960] Signal 23: delivering to handler D0712 20:27:48.576528 46712 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.576546 46712 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0005e2d50 13 D0712 20:27:48.576558 46712 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:27:48.580580 46712 task_signals.go:470] [ 960: 960] Notified of signal 23 D0712 20:27:48.581038 46712 task_signals.go:220] [ 960: 960] Signal 23: delivering to handler I0712 20:27:48.587701 46712 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0712 20:27:48.587802 46712 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.587829 46712 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0005e2d50 14 D0712 20:27:48.587842 46712 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:27:48.587912 46712 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.587932 46712 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.587958 46712 task_signals.go:204] [ 960: 961] Signal 960, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.587984 46712 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.587996 46712 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.588016 46712 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.588037 46712 task_signals.go:204] [ 960: 962] Signal 960, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.588048 46712 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.588057 46712 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.588062 46712 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.588077 46712 task_signals.go:204] [ 960: 963] Signal 960, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.588096 46712 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.588104 46712 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.588109 46712 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.588126 46712 task_signals.go:204] [ 960: 964] Signal 960, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.588147 46712 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.589644 46712 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.589685 46712 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.589700 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.589734 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.589747 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.589826 46712 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.590517 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.592149 46712 syscalls.go:262] [ 965: 965] Allocating stack with size of 8388608 bytes D0712 20:27:48.592289 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.593179 46712 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.593219 46712 usertrap_amd64.go:106] [ 965: 965] Map a usertrap vma at 68000 D0712 20:27:48.593723 46712 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0009e9350 1 D0712 20:27:48.593768 46712 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:27:48.594175 46712 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.594203 46712 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0009e9350 2 D0712 20:27:48.594214 46712 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:27:48.594736 46712 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.594752 46712 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0009e9350 3 D0712 20:27:48.594761 46712 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:27:48.600619 46712 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.600644 46712 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0009e9350 4 D0712 20:27:48.600655 46712 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:27:48.601630 46712 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.601653 46712 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0009e9350 5 D0712 20:27:48.601663 46712 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:27:48.601733 46712 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.601750 46712 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0009e9350 6 D0712 20:27:48.601759 46712 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:27:48.602255 46712 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.602296 46712 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0009e9350 7 D0712 20:27:48.602312 46712 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:27:48.602482 46712 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.602503 46712 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc0009e9350 8 D0712 20:27:48.602515 46712 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:27:48.602769 46712 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.602827 46712 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc0009e9350 9 D0712 20:27:48.602841 46712 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:27:48.602899 46712 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.602908 46712 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0009e9350 10 D0712 20:27:48.602920 46712 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:27:48.611569 46712 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.611594 46712 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0009e9350 11 D0712 20:27:48.611607 46712 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:27:48.615231 46712 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.615263 46712 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc0009e9350 12 D0712 20:27:48.615278 46712 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:27:48.615368 46712 usertrap_amd64.go:212] [ 965: 966] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.615403 46712 usertrap_amd64.go:122] [ 965: 966] Allocate a new trap: 0xc0009e9350 13 D0712 20:27:48.615419 46712 usertrap_amd64.go:225] [ 965: 966] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:27:48.615497 46712 task_signals.go:470] [ 965: 965] Notified of signal 23 D0712 20:27:48.615617 46712 task_signals.go:220] [ 965: 965] Signal 23: delivering to handler I0712 20:27:48.623523 46712 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0712 20:27:48.623632 46712 usertrap_amd64.go:212] [ 965: 965] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.623657 46712 usertrap_amd64.go:122] [ 965: 965] Allocate a new trap: 0xc0009e9350 14 D0712 20:27:48.623671 46712 usertrap_amd64.go:225] [ 965: 965] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:27:48.623782 46712 task_exit.go:204] [ 965: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.623818 46712 task_exit.go:204] [ 965: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.623851 46712 task_signals.go:204] [ 965: 969] Signal 965, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.623879 46712 task_exit.go:204] [ 965: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.623875 46712 task_signals.go:204] [ 965: 966] Signal 965, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.623891 46712 task_exit.go:204] [ 965: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.623851 46712 task_signals.go:204] [ 965: 968] Signal 965, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.623870 46712 task_signals.go:204] [ 965: 967] Signal 965, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.623898 46712 task_exit.go:204] [ 965: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.623925 46712 task_exit.go:204] [ 965: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.623950 46712 task_exit.go:204] [ 965: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.623978 46712 task_exit.go:204] [ 965: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.623990 46712 task_exit.go:204] [ 965: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.624000 46712 task_exit.go:204] [ 965: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.624006 46712 task_exit.go:204] [ 965: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.624016 46712 task_exit.go:204] [ 965: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.625424 46712 task_exit.go:204] [ 965: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.625468 46712 task_exit.go:204] [ 965: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.625488 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.625531 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.625541 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.625706 46712 task_exit.go:204] [ 965: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.626326 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.627862 46712 syscalls.go:262] [ 970: 970] Allocating stack with size of 8388608 bytes D0712 20:27:48.627959 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.629063 46712 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.629105 46712 usertrap_amd64.go:106] [ 970: 970] Map a usertrap vma at 63000 D0712 20:27:48.629217 46712 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000de9950 1 D0712 20:27:48.629251 46712 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:48.629657 46712 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.629721 46712 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000de9950 2 D0712 20:27:48.629733 46712 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:48.630507 46712 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.630541 46712 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000de9950 3 D0712 20:27:48.630553 46712 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:48.637195 46712 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.637233 46712 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000de9950 4 D0712 20:27:48.637247 46712 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:48.638298 46712 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.638334 46712 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000de9950 5 D0712 20:27:48.638346 46712 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:48.638382 46712 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.638388 46712 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000de9950 6 D0712 20:27:48.638393 46712 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:48.638574 46712 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.638605 46712 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000de9950 7 D0712 20:27:48.638615 46712 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:48.638775 46712 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.638800 46712 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc000de9950 8 D0712 20:27:48.638807 46712 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:48.638955 46712 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.638994 46712 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000de9950 9 D0712 20:27:48.639001 46712 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:48.639008 46712 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.639012 46712 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc000de9950 10 D0712 20:27:48.639017 46712 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:48.645428 46712 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.645444 46712 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000de9950 11 D0712 20:27:48.645457 46712 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:48.649373 46712 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.649453 46712 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc000de9950 12 D0712 20:27:48.649470 46712 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:48.649593 46712 usertrap_amd64.go:212] [ 970: 971] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.649620 46712 usertrap_amd64.go:122] [ 970: 971] Allocate a new trap: 0xc000de9950 13 D0712 20:27:48.649629 46712 usertrap_amd64.go:225] [ 970: 971] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:48.649759 46712 task_signals.go:470] [ 970: 970] Notified of signal 23 D0712 20:27:48.649791 46712 task_signals.go:220] [ 970: 970] Signal 23: delivering to handler D0712 20:27:48.655237 46712 usertrap_amd64.go:212] [ 970: 970] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.655263 46712 usertrap_amd64.go:122] [ 970: 970] Allocate a new trap: 0xc000de9950 14 D0712 20:27:48.655278 46712 usertrap_amd64.go:225] [ 970: 970] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:48.655324 46712 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.655360 46712 task_signals.go:204] [ 970: 971] Signal 970, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.655380 46712 task_signals.go:204] [ 970: 972] Signal 970, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.655401 46712 task_signals.go:204] [ 970: 973] Signal 970, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.655388 46712 task_signals.go:204] [ 970: 974] Signal 970, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.655414 46712 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.655452 46712 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.655475 46712 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.655479 46712 task_exit.go:204] [ 970: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.655488 46712 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.655493 46712 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.655496 46712 task_exit.go:204] [ 970: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.655502 46712 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.655506 46712 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.655509 46712 task_exit.go:204] [ 970: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.655514 46712 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.656818 46712 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.656848 46712 task_exit.go:204] [ 970: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.656863 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.656895 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.656926 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.657047 46712 task_exit.go:204] [ 970: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.657863 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.659386 46712 syscalls.go:262] [ 975: 975] Allocating stack with size of 8388608 bytes D0712 20:27:48.659501 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.660311 46712 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.660344 46712 usertrap_amd64.go:106] [ 975: 975] Map a usertrap vma at 65000 D0712 20:27:48.660464 46712 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc000de9cb0 1 D0712 20:27:48.660506 46712 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:27:48.660814 46712 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.660856 46712 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc000de9cb0 2 D0712 20:27:48.660867 46712 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:27:48.661350 46712 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.661368 46712 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc000de9cb0 3 D0712 20:27:48.661376 46712 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:27:48.667623 46712 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.667660 46712 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc000de9cb0 4 D0712 20:27:48.667672 46712 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:27:48.668712 46712 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.668739 46712 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc000de9cb0 5 D0712 20:27:48.668747 46712 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:27:48.668781 46712 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.668790 46712 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc000de9cb0 6 D0712 20:27:48.668798 46712 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:27:48.669187 46712 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.669205 46712 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc000de9cb0 7 D0712 20:27:48.669211 46712 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:27:48.669347 46712 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.669363 46712 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc000de9cb0 8 D0712 20:27:48.669369 46712 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:27:48.669636 46712 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.669665 46712 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc000de9cb0 9 D0712 20:27:48.669679 46712 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:27:48.669774 46712 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.669787 46712 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc000de9cb0 10 D0712 20:27:48.669796 46712 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:27:48.669813 46712 usertrap_amd64.go:212] [ 975: 978] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:48.669820 46712 usertrap_amd64.go:122] [ 975: 978] Allocate a new trap: 0xc000de9cb0 11 D0712 20:27:48.669827 46712 usertrap_amd64.go:225] [ 975: 978] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:27:48.677253 46712 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.677281 46712 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc000de9cb0 12 D0712 20:27:48.677295 46712 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:27:48.680549 46712 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.680581 46712 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc000de9cb0 13 D0712 20:27:48.680594 46712 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:27:48.680656 46712 usertrap_amd64.go:212] [ 975: 976] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.680715 46712 usertrap_amd64.go:122] [ 975: 976] Allocate a new trap: 0xc000de9cb0 14 D0712 20:27:48.680736 46712 usertrap_amd64.go:225] [ 975: 976] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:27:48.680808 46712 task_signals.go:470] [ 975: 975] Notified of signal 23 D0712 20:27:48.680870 46712 task_signals.go:220] [ 975: 975] Signal 23: delivering to handler D0712 20:27:48.687021 46712 usertrap_amd64.go:212] [ 975: 975] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.687058 46712 usertrap_amd64.go:122] [ 975: 975] Allocate a new trap: 0xc000de9cb0 15 D0712 20:27:48.687072 46712 usertrap_amd64.go:225] [ 975: 975] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0712 20:27:48.687184 46712 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.687216 46712 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.687260 46712 task_signals.go:204] [ 975: 978] Signal 975, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.687279 46712 task_signals.go:204] [ 975: 977] Signal 975, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.687283 46712 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.687290 46712 task_signals.go:204] [ 975: 976] Signal 975, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.687298 46712 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.687309 46712 task_exit.go:204] [ 975: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.687266 46712 task_signals.go:204] [ 975: 979] Signal 975, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.687336 46712 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.687345 46712 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.687349 46712 task_exit.go:204] [ 975: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.687359 46712 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.687367 46712 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.687379 46712 task_exit.go:204] [ 975: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.687388 46712 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.688620 46712 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.688656 46712 task_exit.go:204] [ 975: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.688698 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.688731 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.688743 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.688836 46712 task_exit.go:204] [ 975: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.688956 46712 task_signals.go:470] [ 6: 8] Notified of signal 23 D0712 20:27:48.689051 46712 task_signals.go:220] [ 6: 8] Signal 23: delivering to handler D0712 20:27:48.689436 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.690831 46712 syscalls.go:262] [ 980: 980] Allocating stack with size of 8388608 bytes D0712 20:27:48.690934 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.692395 46712 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.692445 46712 usertrap_amd64.go:106] [ 980: 980] Map a usertrap vma at 61000 D0712 20:27:48.692606 46712 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000de9e30 1 D0712 20:27:48.692659 46712 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:27:48.693038 46712 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.693062 46712 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000de9e30 2 D0712 20:27:48.693078 46712 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:27:48.694055 46712 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.694079 46712 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000de9e30 3 D0712 20:27:48.694090 46712 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:27:48.699928 46712 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.699962 46712 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000de9e30 4 D0712 20:27:48.699975 46712 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:27:48.701020 46712 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.701053 46712 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000de9e30 5 D0712 20:27:48.701068 46712 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:27:48.701120 46712 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.701128 46712 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000de9e30 6 D0712 20:27:48.701136 46712 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:27:48.701343 46712 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.701360 46712 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000de9e30 7 D0712 20:27:48.701369 46712 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:27:48.701550 46712 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.701561 46712 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc000de9e30 8 D0712 20:27:48.701569 46712 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:27:48.701725 46712 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.701753 46712 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc000de9e30 9 D0712 20:27:48.701766 46712 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:27:48.702045 46712 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.702068 46712 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000de9e30 10 D0712 20:27:48.702077 46712 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:27:48.709822 46712 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.709863 46712 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000de9e30 11 D0712 20:27:48.709876 46712 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:27:48.712432 46712 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.712453 46712 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc000de9e30 12 D0712 20:27:48.712461 46712 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:27:48.712516 46712 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.712534 46712 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc000de9e30 13 D0712 20:27:48.712545 46712 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:27:48.712610 46712 task_signals.go:470] [ 980: 980] Notified of signal 23 D0712 20:27:48.712695 46712 task_signals.go:220] [ 980: 980] Signal 23: delivering to handler D0712 20:27:48.720051 46712 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.720076 46712 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc000de9e30 14 D0712 20:27:48.720086 46712 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:27:48.720145 46712 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.720176 46712 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.720202 46712 task_signals.go:204] [ 980: 983] Signal 980, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.720234 46712 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.720244 46712 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.720204 46712 task_signals.go:204] [ 980: 981] Signal 980, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.720239 46712 task_signals.go:204] [ 980: 984] Signal 980, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.720251 46712 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.720234 46712 task_signals.go:204] [ 980: 982] Signal 980, PID: 982, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.720282 46712 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.720294 46712 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.720299 46712 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.720309 46712 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.720316 46712 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.720321 46712 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.720343 46712 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.721652 46712 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.721682 46712 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.721696 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.721722 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.721728 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.721943 46712 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitZombie to TaskExitDead I0712 20:27:48.722103 46712 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0712 20:27:48.722700 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.723978 46712 syscalls.go:262] [ 985: 985] Allocating stack with size of 8388608 bytes D0712 20:27:48.724159 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.725416 46712 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.725468 46712 usertrap_amd64.go:106] [ 985: 985] Map a usertrap vma at 6a000 D0712 20:27:48.725572 46712 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0008b01e0 1 D0712 20:27:48.725617 46712 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:27:48.726001 46712 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.726025 46712 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0008b01e0 2 D0712 20:27:48.726035 46712 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:27:48.726397 46712 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.726411 46712 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0008b01e0 3 D0712 20:27:48.726417 46712 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:27:48.732136 46712 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.732165 46712 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0008b01e0 4 D0712 20:27:48.732177 46712 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:27:48.733253 46712 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.733278 46712 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0008b01e0 5 D0712 20:27:48.733290 46712 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:27:48.733321 46712 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.733326 46712 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0008b01e0 6 D0712 20:27:48.733331 46712 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:27:48.733690 46712 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.733769 46712 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0008b01e0 7 D0712 20:27:48.733785 46712 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:27:48.733930 46712 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.733956 46712 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc0008b01e0 8 D0712 20:27:48.733968 46712 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:27:48.734261 46712 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.734283 46712 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc0008b01e0 9 D0712 20:27:48.734300 46712 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:27:48.734350 46712 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.734368 46712 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0008b01e0 10 D0712 20:27:48.734377 46712 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:27:48.734815 46712 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.734838 46712 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc0008b01e0 11 D0712 20:27:48.734848 46712 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:27:48.734874 46712 usertrap_amd64.go:212] [ 985: 986] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.734890 46712 usertrap_amd64.go:122] [ 985: 986] Allocate a new trap: 0xc0008b01e0 12 D0712 20:27:48.734902 46712 usertrap_amd64.go:225] [ 985: 986] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:27:48.734949 46712 task_signals.go:470] [ 985: 985] Notified of signal 23 D0712 20:27:48.734990 46712 task_signals.go:220] [ 985: 985] Signal 23: delivering to handler D0712 20:27:48.741559 46712 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.741585 46712 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0008b01e0 13 D0712 20:27:48.741595 46712 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:27:48.745136 46712 task_signals.go:470] [ 985: 985] Notified of signal 23 D0712 20:27:48.745182 46712 task_signals.go:220] [ 985: 985] Signal 23: delivering to handler I0712 20:27:48.752217 46712 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0712 20:27:48.752385 46712 usertrap_amd64.go:212] [ 985: 985] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.752421 46712 usertrap_amd64.go:122] [ 985: 985] Allocate a new trap: 0xc0008b01e0 14 D0712 20:27:48.752436 46712 usertrap_amd64.go:225] [ 985: 985] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:27:48.752555 46712 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.752596 46712 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.752628 46712 task_signals.go:204] [ 985: 988] Signal 985, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.752624 46712 task_signals.go:204] [ 985: 987] Signal 985, PID: 987, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.752653 46712 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.752684 46712 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.752712 46712 task_exit.go:204] [ 985: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.752744 46712 task_signals.go:204] [ 985: 989] Signal 985, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.752758 46712 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.752769 46712 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.752790 46712 task_exit.go:204] [ 985: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.752808 46712 task_signals.go:204] [ 985: 986] Signal 985, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.752823 46712 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.752833 46712 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.752840 46712 task_exit.go:204] [ 985: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.752853 46712 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.754435 46712 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.754475 46712 task_exit.go:204] [ 985: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.754497 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.754532 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.754551 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.754631 46712 task_exit.go:204] [ 985: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.755212 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.756918 46712 syscalls.go:262] [ 990: 990] Allocating stack with size of 8388608 bytes D0712 20:27:48.757088 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.758389 46712 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.758427 46712 usertrap_amd64.go:106] [ 990: 990] Map a usertrap vma at 63000 D0712 20:27:48.758551 46712 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000a9e180 1 D0712 20:27:48.758583 46712 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:48.759055 46712 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.759078 46712 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000a9e180 2 D0712 20:27:48.759091 46712 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:48.759718 46712 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.759747 46712 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000a9e180 3 D0712 20:27:48.759760 46712 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:48.766071 46712 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.766102 46712 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000a9e180 4 D0712 20:27:48.766115 46712 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:48.767825 46712 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.767855 46712 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000a9e180 5 D0712 20:27:48.767867 46712 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:48.767905 46712 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.767918 46712 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000a9e180 6 D0712 20:27:48.767923 46712 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:48.768100 46712 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.768112 46712 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000a9e180 7 D0712 20:27:48.768117 46712 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:48.768259 46712 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.768289 46712 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc000a9e180 8 D0712 20:27:48.768297 46712 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:48.768560 46712 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.768591 46712 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc000a9e180 9 D0712 20:27:48.768604 46712 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:48.768706 46712 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.768718 46712 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000a9e180 10 D0712 20:27:48.768731 46712 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:48.769855 46712 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.769886 46712 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc000a9e180 11 D0712 20:27:48.769898 46712 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:48.769957 46712 usertrap_amd64.go:212] [ 990: 991] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.769992 46712 usertrap_amd64.go:122] [ 990: 991] Allocate a new trap: 0xc000a9e180 12 D0712 20:27:48.770003 46712 usertrap_amd64.go:225] [ 990: 991] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:48.770026 46712 task_signals.go:470] [ 990: 990] Notified of signal 23 D0712 20:27:48.770053 46712 task_signals.go:220] [ 990: 990] Signal 23: delivering to handler D0712 20:27:48.776853 46712 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.776880 46712 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000a9e180 13 D0712 20:27:48.776889 46712 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:48.780731 46712 task_signals.go:470] [ 990: 990] Notified of signal 23 D0712 20:27:48.780789 46712 task_signals.go:179] [ 990: 990] Restarting syscall 202: interrupted by signal 23 D0712 20:27:48.780797 46712 task_signals.go:220] [ 990: 990] Signal 23: delivering to handler I0712 20:27:48.786657 46712 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0712 20:27:48.786753 46712 usertrap_amd64.go:212] [ 990: 990] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.786771 46712 usertrap_amd64.go:122] [ 990: 990] Allocate a new trap: 0xc000a9e180 14 D0712 20:27:48.786783 46712 usertrap_amd64.go:225] [ 990: 990] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:48.786874 46712 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.786913 46712 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.786914 46712 task_signals.go:204] [ 990: 994] Signal 990, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.786933 46712 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.786948 46712 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.786951 46712 task_exit.go:204] [ 990: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.786965 46712 task_signals.go:204] [ 990: 992] Signal 990, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.786988 46712 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.786994 46712 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.787000 46712 task_exit.go:204] [ 990: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.787008 46712 task_signals.go:204] [ 990: 991] Signal 990, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.787015 46712 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.787020 46712 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.787023 46712 task_exit.go:204] [ 990: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.787031 46712 task_signals.go:204] [ 990: 993] Signal 990, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.787065 46712 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.788526 46712 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.788544 46712 task_exit.go:204] [ 990: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.788563 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.788595 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.788605 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.788734 46712 task_exit.go:204] [ 990: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.788902 46712 task_signals.go:470] [ 6: 21] Notified of signal 23 D0712 20:27:48.788984 46712 task_signals.go:179] [ 6: 21] Restarting syscall 202: interrupted by signal 23 D0712 20:27:48.789005 46712 task_signals.go:220] [ 6: 21] Signal 23: delivering to handler D0712 20:27:48.789680 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.790900 46712 syscalls.go:262] [ 995: 995] Allocating stack with size of 8388608 bytes D0712 20:27:48.790993 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.792280 46712 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.792314 46712 usertrap_amd64.go:106] [ 995: 995] Map a usertrap vma at 64000 D0712 20:27:48.792427 46712 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0007f1260 1 D0712 20:27:48.792457 46712 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:27:48.792795 46712 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.792817 46712 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0007f1260 2 D0712 20:27:48.792827 46712 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:27:48.793332 46712 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.793368 46712 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0007f1260 3 D0712 20:27:48.793378 46712 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:27:48.799788 46712 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.799812 46712 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0007f1260 4 D0712 20:27:48.799821 46712 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:27:48.800974 46712 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.801006 46712 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0007f1260 5 D0712 20:27:48.801020 46712 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:27:48.801079 46712 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.801095 46712 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0007f1260 6 D0712 20:27:48.801104 46712 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:27:48.801319 46712 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.801335 46712 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0007f1260 7 D0712 20:27:48.801341 46712 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:27:48.801451 46712 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.801462 46712 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc0007f1260 8 D0712 20:27:48.801471 46712 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:27:48.801629 46712 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.801656 46712 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc0007f1260 9 D0712 20:27:48.801665 46712 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:27:48.801774 46712 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.801801 46712 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0007f1260 10 D0712 20:27:48.801813 46712 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:27:48.808553 46712 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.808577 46712 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0007f1260 11 D0712 20:27:48.808589 46712 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:27:48.812562 46712 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.812588 46712 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc0007f1260 12 D0712 20:27:48.812599 46712 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:27:48.812633 46712 usertrap_amd64.go:212] [ 995: 996] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.812640 46712 usertrap_amd64.go:122] [ 995: 996] Allocate a new trap: 0xc0007f1260 13 D0712 20:27:48.812649 46712 usertrap_amd64.go:225] [ 995: 996] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:27:48.812847 46712 task_signals.go:470] [ 995: 995] Notified of signal 23 D0712 20:27:48.812905 46712 task_signals.go:220] [ 995: 995] Signal 23: delivering to handler D0712 20:27:48.818960 46712 usertrap_amd64.go:212] [ 995: 995] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.819015 46712 usertrap_amd64.go:122] [ 995: 995] Allocate a new trap: 0xc0007f1260 14 D0712 20:27:48.819028 46712 usertrap_amd64.go:225] [ 995: 995] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:27:48.819080 46712 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.819099 46712 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.819130 46712 task_signals.go:204] [ 995: 996] Signal 995, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.819136 46712 task_signals.go:204] [ 995: 998] Signal 995, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.819149 46712 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.819158 46712 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.819170 46712 task_signals.go:204] [ 995: 997] Signal 995, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.819187 46712 task_signals.go:204] [ 995: 999] Signal 995, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.819204 46712 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.819208 46712 task_exit.go:204] [ 995: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.819219 46712 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.819234 46712 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.819237 46712 task_exit.go:204] [ 995: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.819246 46712 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.819258 46712 task_exit.go:204] [ 995: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.819265 46712 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.820676 46712 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.820703 46712 task_exit.go:204] [ 995: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.820715 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.820768 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.820823 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.821066 46712 task_signals.go:470] [ 6: 15] Notified of signal 23 D0712 20:27:48.821114 46712 task_exit.go:204] [ 995: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.821162 46712 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0712 20:27:48.822108 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.823556 46712 syscalls.go:262] [ 1000: 1000] Allocating stack with size of 8388608 bytes D0712 20:27:48.823769 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.825616 46712 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.825663 46712 usertrap_amd64.go:106] [ 1000: 1000] Map a usertrap vma at 60000 D0712 20:27:48.825756 46712 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc001830330 1 D0712 20:27:48.825780 46712 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:27:48.826283 46712 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.826300 46712 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc001830330 2 D0712 20:27:48.826313 46712 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:27:48.827243 46712 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.827267 46712 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc001830330 3 D0712 20:27:48.827277 46712 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:27:48.835629 46712 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.835664 46712 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc001830330 4 D0712 20:27:48.835679 46712 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:27:48.836851 46712 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.836917 46712 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc001830330 5 D0712 20:27:48.836970 46712 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:27:48.837038 46712 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.837059 46712 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc001830330 6 D0712 20:27:48.837068 46712 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:27:48.837510 46712 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.837541 46712 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc001830330 7 D0712 20:27:48.837551 46712 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:27:48.837759 46712 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.837798 46712 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc001830330 8 D0712 20:27:48.837810 46712 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:27:48.838020 46712 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.838039 46712 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc001830330 9 D0712 20:27:48.838052 46712 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:27:48.838198 46712 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.838215 46712 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc001830330 10 D0712 20:27:48.838226 46712 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:27:48.838406 46712 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.838418 46712 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc001830330 11 D0712 20:27:48.838427 46712 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:27:48.838556 46712 usertrap_amd64.go:212] [ 1000: 1001] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.838586 46712 usertrap_amd64.go:122] [ 1000: 1001] Allocate a new trap: 0xc001830330 12 D0712 20:27:48.838599 46712 usertrap_amd64.go:225] [ 1000: 1001] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:27:48.838671 46712 task_signals.go:470] [ 1000: 1003] Notified of signal 23 D0712 20:27:48.838720 46712 task_signals.go:179] [ 1000: 1003] Restarting syscall 202: interrupted by signal 23 D0712 20:27:48.838740 46712 task_signals.go:220] [ 1000: 1003] Signal 23: delivering to handler D0712 20:27:48.846742 46712 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.846834 46712 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc001830330 13 D0712 20:27:48.846862 46712 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:27:48.849581 46712 task_signals.go:470] [ 1000: 1000] Notified of signal 23 D0712 20:27:48.849656 46712 task_signals.go:220] [ 1000: 1000] Signal 23: delivering to handler D0712 20:27:48.859130 46712 usertrap_amd64.go:212] [ 1000: 1000] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.859151 46712 usertrap_amd64.go:122] [ 1000: 1000] Allocate a new trap: 0xc001830330 14 D0712 20:27:48.859163 46712 usertrap_amd64.go:225] [ 1000: 1000] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:27:48.859237 46712 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.859274 46712 task_signals.go:204] [ 1000: 1002] Signal 1000, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.859285 46712 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.859307 46712 task_signals.go:204] [ 1000: 1004] Signal 1000, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.859318 46712 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.859324 46712 task_signals.go:204] [ 1000: 1001] Signal 1000, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.859332 46712 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.859335 46712 task_exit.go:204] [ 1000: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.859321 46712 task_signals.go:204] [ 1000: 1003] Signal 1000, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.859345 46712 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.859352 46712 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.859378 46712 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.859383 46712 task_exit.go:204] [ 1000: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.859398 46712 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.859405 46712 task_exit.go:204] [ 1000: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.859416 46712 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.861098 46712 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.861186 46712 task_exit.go:204] [ 1000: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.861207 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.861257 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.861282 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.861307 46712 task_exit.go:204] [ 1000: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.863254 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.864742 46712 syscalls.go:262] [ 1005: 1005] Allocating stack with size of 8388608 bytes D0712 20:27:48.864849 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.866913 46712 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.866960 46712 usertrap_amd64.go:106] [ 1005: 1005] Map a usertrap vma at 6a000 D0712 20:27:48.867107 46712 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc00086b1a0 1 D0712 20:27:48.867147 46712 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:27:48.868029 46712 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.868073 46712 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc00086b1a0 2 D0712 20:27:48.868094 46712 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:27:48.868919 46712 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.868975 46712 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc00086b1a0 3 D0712 20:27:48.868989 46712 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:27:48.875747 46712 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.875776 46712 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc00086b1a0 4 D0712 20:27:48.875790 46712 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:27:48.877074 46712 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.877121 46712 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc00086b1a0 5 D0712 20:27:48.877143 46712 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:27:48.877236 46712 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.877265 46712 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc00086b1a0 6 D0712 20:27:48.877277 46712 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:27:48.878016 46712 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.878052 46712 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc00086b1a0 7 D0712 20:27:48.878064 46712 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:27:48.878332 46712 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.878422 46712 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc00086b1a0 8 D0712 20:27:48.878480 46712 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:27:48.878672 46712 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.878703 46712 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc00086b1a0 9 D0712 20:27:48.878735 46712 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:27:48.878769 46712 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.878783 46712 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc00086b1a0 10 D0712 20:27:48.878795 46712 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:27:48.879045 46712 usertrap_amd64.go:212] [ 1005: 1008] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:48.879105 46712 usertrap_amd64.go:122] [ 1005: 1008] Allocate a new trap: 0xc00086b1a0 11 D0712 20:27:48.879124 46712 usertrap_amd64.go:225] [ 1005: 1008] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:27:48.888616 46712 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.888656 46712 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc00086b1a0 12 D0712 20:27:48.888670 46712 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:27:48.890015 46712 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.890042 46712 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc00086b1a0 13 D0712 20:27:48.890057 46712 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:27:48.891774 46712 usertrap_amd64.go:212] [ 1005: 1006] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.891807 46712 usertrap_amd64.go:122] [ 1005: 1006] Allocate a new trap: 0xc00086b1a0 14 D0712 20:27:48.891821 46712 usertrap_amd64.go:225] [ 1005: 1006] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:27:48.891992 46712 task_signals.go:470] [ 1005: 1005] Notified of signal 23 D0712 20:27:48.892114 46712 task_signals.go:220] [ 1005: 1005] Signal 23: delivering to handler D0712 20:27:48.902027 46712 usertrap_amd64.go:212] [ 1005: 1005] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.902070 46712 usertrap_amd64.go:122] [ 1005: 1005] Allocate a new trap: 0xc00086b1a0 15 D0712 20:27:48.902087 46712 usertrap_amd64.go:225] [ 1005: 1005] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0712 20:27:48.902175 46712 task_exit.go:204] [ 1005: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.902209 46712 task_exit.go:204] [ 1005: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.902234 46712 task_signals.go:204] [ 1005: 1007] Signal 1005, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.902236 46712 task_signals.go:204] [ 1005: 1009] Signal 1005, PID: 1009, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.902250 46712 task_signals.go:204] [ 1005: 1008] Signal 1005, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.902322 46712 task_exit.go:204] [ 1005: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.902386 46712 task_signals.go:204] [ 1005: 1006] Signal 1005, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.902453 46712 task_exit.go:204] [ 1005: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.902497 46712 task_exit.go:204] [ 1005: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.902531 46712 task_exit.go:204] [ 1005: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.902554 46712 task_exit.go:204] [ 1005: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.902561 46712 task_exit.go:204] [ 1005: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.902575 46712 task_exit.go:204] [ 1005: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.902585 46712 task_exit.go:204] [ 1005: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.902592 46712 task_exit.go:204] [ 1005: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.902611 46712 task_exit.go:204] [ 1005: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.904033 46712 task_exit.go:204] [ 1005: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.904066 46712 task_exit.go:204] [ 1005: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.904083 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.905119 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.905156 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.905352 46712 task_exit.go:204] [ 1005: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.906361 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.908088 46712 syscalls.go:262] [ 1010: 1010] Allocating stack with size of 8388608 bytes D0712 20:27:48.908194 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.909659 46712 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.909714 46712 usertrap_amd64.go:106] [ 1010: 1010] Map a usertrap vma at 64000 D0712 20:27:48.909848 46712 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc00086b2c0 1 D0712 20:27:48.909895 46712 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:27:48.910331 46712 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.910362 46712 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc00086b2c0 2 D0712 20:27:48.910375 46712 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:27:48.911543 46712 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.911574 46712 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc00086b2c0 3 D0712 20:27:48.911588 46712 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:27:48.918402 46712 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.918440 46712 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc00086b2c0 4 D0712 20:27:48.918458 46712 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:27:48.919790 46712 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.919818 46712 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc00086b2c0 5 D0712 20:27:48.919835 46712 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:27:48.919892 46712 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.919901 46712 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc00086b2c0 6 D0712 20:27:48.919907 46712 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:27:48.920330 46712 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.920366 46712 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc00086b2c0 7 D0712 20:27:48.920381 46712 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:27:48.920637 46712 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.920660 46712 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc00086b2c0 8 D0712 20:27:48.920677 46712 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:27:48.920936 46712 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.920992 46712 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc00086b2c0 9 D0712 20:27:48.921005 46712 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:27:48.921019 46712 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.921026 46712 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc00086b2c0 10 D0712 20:27:48.921034 46712 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:27:48.921071 46712 usertrap_amd64.go:212] [ 1010: 1013] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:48.921088 46712 usertrap_amd64.go:122] [ 1010: 1013] Allocate a new trap: 0xc00086b2c0 11 D0712 20:27:48.921099 46712 usertrap_amd64.go:225] [ 1010: 1013] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:27:48.930085 46712 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.930113 46712 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc00086b2c0 12 D0712 20:27:48.930122 46712 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:27:48.933117 46712 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.933208 46712 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc00086b2c0 13 D0712 20:27:48.933235 46712 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:27:48.933291 46712 usertrap_amd64.go:212] [ 1010: 1011] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.933321 46712 usertrap_amd64.go:122] [ 1010: 1011] Allocate a new trap: 0xc00086b2c0 14 D0712 20:27:48.933336 46712 usertrap_amd64.go:225] [ 1010: 1011] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:27:48.933404 46712 task_signals.go:470] [ 1010: 1010] Notified of signal 23 D0712 20:27:48.933512 46712 task_signals.go:220] [ 1010: 1010] Signal 23: delivering to handler D0712 20:27:48.942038 46712 usertrap_amd64.go:212] [ 1010: 1010] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.942072 46712 usertrap_amd64.go:122] [ 1010: 1010] Allocate a new trap: 0xc00086b2c0 15 D0712 20:27:48.942086 46712 usertrap_amd64.go:225] [ 1010: 1010] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0712 20:27:48.942144 46712 task_exit.go:204] [ 1010: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.942170 46712 task_exit.go:204] [ 1010: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.942193 46712 task_signals.go:204] [ 1010: 1012] Signal 1010, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.942224 46712 task_signals.go:204] [ 1010: 1015] Signal 1010, PID: 1015, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.942208 46712 task_signals.go:204] [ 1010: 1013] Signal 1010, PID: 1013, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.942205 46712 task_signals.go:204] [ 1010: 1014] Signal 1010, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.942246 46712 task_signals.go:204] [ 1010: 1011] Signal 1010, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.942240 46712 task_exit.go:204] [ 1010: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.942290 46712 task_exit.go:204] [ 1010: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.942310 46712 task_exit.go:204] [ 1010: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.942328 46712 task_exit.go:204] [ 1010: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.942351 46712 task_exit.go:204] [ 1010: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.942358 46712 task_exit.go:204] [ 1010: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.942371 46712 task_exit.go:204] [ 1010: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.942393 46712 task_exit.go:204] [ 1010: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.942430 46712 task_exit.go:204] [ 1010: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.942446 46712 task_exit.go:204] [ 1010: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.942456 46712 task_exit.go:204] [ 1010: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.942477 46712 task_exit.go:204] [ 1010: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.942510 46712 task_exit.go:204] [ 1010: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.944123 46712 task_exit.go:204] [ 1010: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.944159 46712 task_exit.go:204] [ 1010: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.944176 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.944202 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.944212 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.944285 46712 task_exit.go:204] [ 1010: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.945281 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.946805 46712 syscalls.go:262] [ 1016: 1016] Allocating stack with size of 8388608 bytes D0712 20:27:48.946913 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.948921 46712 usertrap_amd64.go:212] [ 1016: 1016] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.949091 46712 usertrap_amd64.go:106] [ 1016: 1016] Map a usertrap vma at 62000 D0712 20:27:48.949241 46712 usertrap_amd64.go:122] [ 1016: 1016] Allocate a new trap: 0xc00086b380 1 D0712 20:27:48.949273 46712 usertrap_amd64.go:225] [ 1016: 1016] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:27:48.949743 46712 usertrap_amd64.go:212] [ 1016: 1016] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.949770 46712 usertrap_amd64.go:122] [ 1016: 1016] Allocate a new trap: 0xc00086b380 2 D0712 20:27:48.949783 46712 usertrap_amd64.go:225] [ 1016: 1016] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:27:48.950649 46712 usertrap_amd64.go:212] [ 1016: 1016] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.950680 46712 usertrap_amd64.go:122] [ 1016: 1016] Allocate a new trap: 0xc00086b380 3 D0712 20:27:48.950697 46712 usertrap_amd64.go:225] [ 1016: 1016] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:27:48.957544 46712 usertrap_amd64.go:212] [ 1016: 1016] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.957575 46712 usertrap_amd64.go:122] [ 1016: 1016] Allocate a new trap: 0xc00086b380 4 D0712 20:27:48.957591 46712 usertrap_amd64.go:225] [ 1016: 1016] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:27:48.958852 46712 usertrap_amd64.go:212] [ 1016: 1016] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.958876 46712 usertrap_amd64.go:122] [ 1016: 1016] Allocate a new trap: 0xc00086b380 5 D0712 20:27:48.958889 46712 usertrap_amd64.go:225] [ 1016: 1016] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:27:48.958962 46712 usertrap_amd64.go:212] [ 1016: 1016] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.958971 46712 usertrap_amd64.go:122] [ 1016: 1016] Allocate a new trap: 0xc00086b380 6 D0712 20:27:48.958979 46712 usertrap_amd64.go:225] [ 1016: 1016] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:27:48.959492 46712 usertrap_amd64.go:212] [ 1016: 1016] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.959513 46712 usertrap_amd64.go:122] [ 1016: 1016] Allocate a new trap: 0xc00086b380 7 D0712 20:27:48.959520 46712 usertrap_amd64.go:225] [ 1016: 1016] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:27:48.959773 46712 usertrap_amd64.go:212] [ 1016: 1017] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.959795 46712 usertrap_amd64.go:122] [ 1016: 1017] Allocate a new trap: 0xc00086b380 8 D0712 20:27:48.959804 46712 usertrap_amd64.go:225] [ 1016: 1017] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:27:48.960036 46712 usertrap_amd64.go:212] [ 1016: 1016] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.960057 46712 usertrap_amd64.go:122] [ 1016: 1016] Allocate a new trap: 0xc00086b380 9 D0712 20:27:48.960067 46712 usertrap_amd64.go:225] [ 1016: 1016] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:27:48.960094 46712 usertrap_amd64.go:212] [ 1016: 1017] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.960110 46712 usertrap_amd64.go:122] [ 1016: 1017] Allocate a new trap: 0xc00086b380 10 D0712 20:27:48.960119 46712 usertrap_amd64.go:225] [ 1016: 1017] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:27:48.968307 46712 usertrap_amd64.go:212] [ 1016: 1016] Found the pattern at ip 46af29:sysno 293 D0712 20:27:48.968334 46712 usertrap_amd64.go:122] [ 1016: 1016] Allocate a new trap: 0xc00086b380 11 D0712 20:27:48.968343 46712 usertrap_amd64.go:225] [ 1016: 1016] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:27:48.971581 46712 usertrap_amd64.go:212] [ 1016: 1017] Found the pattern at ip 46b020:sysno 39 D0712 20:27:48.971616 46712 usertrap_amd64.go:122] [ 1016: 1017] Allocate a new trap: 0xc00086b380 12 D0712 20:27:48.971633 46712 usertrap_amd64.go:225] [ 1016: 1017] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:27:48.971742 46712 usertrap_amd64.go:212] [ 1016: 1017] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:48.971764 46712 usertrap_amd64.go:122] [ 1016: 1017] Allocate a new trap: 0xc00086b380 13 D0712 20:27:48.971774 46712 usertrap_amd64.go:225] [ 1016: 1017] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:27:48.971795 46712 task_signals.go:470] [ 1016: 1016] Notified of signal 23 D0712 20:27:48.971880 46712 task_signals.go:220] [ 1016: 1016] Signal 23: delivering to handler D0712 20:27:48.979036 46712 usertrap_amd64.go:212] [ 1016: 1016] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:48.979066 46712 usertrap_amd64.go:122] [ 1016: 1016] Allocate a new trap: 0xc00086b380 14 D0712 20:27:48.979082 46712 usertrap_amd64.go:225] [ 1016: 1016] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:27:48.979132 46712 task_exit.go:204] [ 1016: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.979176 46712 task_exit.go:204] [ 1016: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.979200 46712 task_signals.go:204] [ 1016: 1019] Signal 1016, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.979212 46712 task_signals.go:204] [ 1016: 1017] Signal 1016, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.979223 46712 task_exit.go:204] [ 1016: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.979245 46712 task_exit.go:204] [ 1016: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.979253 46712 task_exit.go:204] [ 1016: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.979196 46712 task_signals.go:204] [ 1016: 1018] Signal 1016, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:48.979279 46712 task_exit.go:204] [ 1016: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.979287 46712 task_exit.go:204] [ 1016: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.979305 46712 task_exit.go:204] [ 1016: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.979319 46712 task_exit.go:204] [ 1016: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:48.980664 46712 task_exit.go:204] [ 1016: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:48.980693 46712 task_exit.go:204] [ 1016: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.980716 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:48.980747 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:48.980761 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:48.980852 46712 task_exit.go:204] [ 1016: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:48.981629 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.983470 46712 syscalls.go:262] [ 1020: 1020] Allocating stack with size of 8388608 bytes D0712 20:27:48.983634 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:48.984774 46712 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:48.984804 46712 usertrap_amd64.go:106] [ 1020: 1020] Map a usertrap vma at 61000 D0712 20:27:48.985004 46712 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0008b09f0 1 D0712 20:27:48.985042 46712 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:27:48.985448 46712 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:48.985482 46712 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0008b09f0 2 D0712 20:27:48.985494 46712 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:27:48.986098 46712 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:48.986125 46712 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0008b09f0 3 D0712 20:27:48.986136 46712 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:27:48.992723 46712 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:48.992781 46712 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0008b09f0 4 D0712 20:27:48.992799 46712 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:27:48.993867 46712 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:48.993904 46712 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0008b09f0 5 D0712 20:27:48.993919 46712 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:27:48.993988 46712 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b214:sysno 13 D0712 20:27:48.994004 46712 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0008b09f0 6 D0712 20:27:48.994015 46712 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:27:48.994287 46712 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:48.994310 46712 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0008b09f0 7 D0712 20:27:48.994321 46712 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:27:48.994523 46712 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:48.994550 46712 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0008b09f0 8 D0712 20:27:48.994562 46712 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:27:48.994726 46712 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46af76:sysno 35 D0712 20:27:48.994744 46712 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0008b09f0 9 D0712 20:27:48.994752 46712 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:27:48.994816 46712 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:48.994829 46712 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0008b09f0 10 D0712 20:27:48.994839 46712 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:27:49.002438 46712 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.002468 46712 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0008b09f0 11 D0712 20:27:49.002478 46712 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:27:49.005107 46712 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.005140 46712 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0008b09f0 12 D0712 20:27:49.005154 46712 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:27:49.005196 46712 usertrap_amd64.go:212] [ 1020: 1021] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.005206 46712 usertrap_amd64.go:122] [ 1020: 1021] Allocate a new trap: 0xc0008b09f0 13 D0712 20:27:49.005216 46712 usertrap_amd64.go:225] [ 1020: 1021] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:27:49.005262 46712 task_signals.go:470] [ 1020: 1020] Notified of signal 23 D0712 20:27:49.005368 46712 task_signals.go:220] [ 1020: 1020] Signal 23: delivering to handler D0712 20:27:49.012912 46712 usertrap_amd64.go:212] [ 1020: 1020] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.013007 46712 usertrap_amd64.go:122] [ 1020: 1020] Allocate a new trap: 0xc0008b09f0 14 D0712 20:27:49.013019 46712 usertrap_amd64.go:225] [ 1020: 1020] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:27:49.013079 46712 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.013106 46712 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.013144 46712 task_signals.go:204] [ 1020: 1021] Signal 1020, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.013175 46712 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.013174 46712 task_signals.go:204] [ 1020: 1024] Signal 1020, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.013184 46712 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.013194 46712 task_exit.go:204] [ 1020: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.013155 46712 task_signals.go:204] [ 1020: 1023] Signal 1020, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.013211 46712 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.013219 46712 task_signals.go:204] [ 1020: 1022] Signal 1020, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.013239 46712 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.013243 46712 task_exit.go:204] [ 1020: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.013250 46712 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.013256 46712 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.013262 46712 task_exit.go:204] [ 1020: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.013280 46712 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.014802 46712 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.014832 46712 task_exit.go:204] [ 1020: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.014844 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.014871 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.014879 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.014938 46712 task_exit.go:204] [ 1020: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.015668 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.017222 46712 syscalls.go:262] [ 1025: 1025] Allocating stack with size of 8388608 bytes D0712 20:27:49.017370 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.018768 46712 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.018806 46712 usertrap_amd64.go:106] [ 1025: 1025] Map a usertrap vma at 65000 D0712 20:27:49.019789 46712 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000a9e570 1 D0712 20:27:49.019839 46712 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:27:49.020261 46712 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.020276 46712 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000a9e570 2 D0712 20:27:49.020284 46712 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:27:49.020768 46712 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.020785 46712 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000a9e570 3 D0712 20:27:49.020790 46712 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:27:49.026334 46712 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.026365 46712 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000a9e570 4 D0712 20:27:49.026381 46712 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:27:49.027511 46712 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.027543 46712 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000a9e570 5 D0712 20:27:49.027557 46712 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:27:49.027611 46712 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.027620 46712 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000a9e570 6 D0712 20:27:49.027629 46712 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:27:49.028061 46712 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.028084 46712 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000a9e570 7 D0712 20:27:49.028093 46712 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:27:49.028247 46712 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.028276 46712 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000a9e570 8 D0712 20:27:49.028287 46712 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:27:49.028484 46712 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.028502 46712 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000a9e570 9 D0712 20:27:49.028510 46712 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:27:49.028610 46712 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.028635 46712 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000a9e570 10 D0712 20:27:49.028649 46712 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:27:49.037584 46712 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.037618 46712 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000a9e570 11 D0712 20:27:49.037632 46712 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:27:49.040660 46712 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.040696 46712 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000a9e570 12 D0712 20:27:49.040708 46712 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:27:49.040767 46712 usertrap_amd64.go:212] [ 1025: 1026] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.040774 46712 usertrap_amd64.go:122] [ 1025: 1026] Allocate a new trap: 0xc000a9e570 13 D0712 20:27:49.040780 46712 usertrap_amd64.go:225] [ 1025: 1026] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:27:49.040806 46712 task_signals.go:470] [ 1025: 1025] Notified of signal 23 D0712 20:27:49.040909 46712 task_signals.go:220] [ 1025: 1025] Signal 23: delivering to handler D0712 20:27:49.050413 46712 usertrap_amd64.go:212] [ 1025: 1025] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.050478 46712 usertrap_amd64.go:122] [ 1025: 1025] Allocate a new trap: 0xc000a9e570 14 D0712 20:27:49.050496 46712 usertrap_amd64.go:225] [ 1025: 1025] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:27:49.050579 46712 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.050611 46712 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.050651 46712 task_signals.go:204] [ 1025: 1028] Signal 1025, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.050681 46712 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.050639 46712 task_signals.go:204] [ 1025: 1027] Signal 1025, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.050692 46712 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.050699 46712 task_exit.go:204] [ 1025: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.050720 46712 task_signals.go:204] [ 1025: 1029] Signal 1025, PID: 1029, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.050737 46712 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.050749 46712 task_signals.go:204] [ 1025: 1026] Signal 1025, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.050793 46712 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.050836 46712 task_signals.go:204] [ 1025: 1030] Signal 1025, PID: 1030, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.050858 46712 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.050874 46712 task_exit.go:204] [ 1025: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.050886 46712 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.050896 46712 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.050911 46712 task_exit.go:204] [ 1025: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.050926 46712 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.050942 46712 task_exit.go:204] [ 1025: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.050955 46712 task_exit.go:204] [ 1025: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.052512 46712 task_exit.go:204] [ 1025: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.052560 46712 task_exit.go:204] [ 1025: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.052576 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.052616 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.052628 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.052830 46712 task_exit.go:204] [ 1025: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.053490 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.055162 46712 syscalls.go:262] [ 1031: 1031] Allocating stack with size of 8388608 bytes D0712 20:27:49.055323 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.056690 46712 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.056733 46712 usertrap_amd64.go:106] [ 1031: 1031] Map a usertrap vma at 64000 D0712 20:27:49.056825 46712 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0008b0cf0 1 D0712 20:27:49.056850 46712 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:27:49.057440 46712 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.057475 46712 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0008b0cf0 2 D0712 20:27:49.057492 46712 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:27:49.058056 46712 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.058083 46712 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0008b0cf0 3 D0712 20:27:49.058095 46712 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:27:49.065169 46712 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.065226 46712 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0008b0cf0 4 D0712 20:27:49.065243 46712 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:27:49.066547 46712 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.066642 46712 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0008b0cf0 5 D0712 20:27:49.066661 46712 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:27:49.066743 46712 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.066758 46712 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0008b0cf0 6 D0712 20:27:49.066771 46712 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:27:49.067256 46712 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.067278 46712 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0008b0cf0 7 D0712 20:27:49.067285 46712 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:27:49.067413 46712 usertrap_amd64.go:212] [ 1031: 1032] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.067421 46712 usertrap_amd64.go:122] [ 1031: 1032] Allocate a new trap: 0xc0008b0cf0 8 D0712 20:27:49.067428 46712 usertrap_amd64.go:225] [ 1031: 1032] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:27:49.067624 46712 usertrap_amd64.go:212] [ 1031: 1032] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.067660 46712 usertrap_amd64.go:122] [ 1031: 1032] Allocate a new trap: 0xc0008b0cf0 9 D0712 20:27:49.067670 46712 usertrap_amd64.go:225] [ 1031: 1032] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:27:49.067743 46712 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.067761 46712 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0008b0cf0 10 D0712 20:27:49.067802 46712 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:27:49.075891 46712 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.075928 46712 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0008b0cf0 11 D0712 20:27:49.075941 46712 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:27:49.078746 46712 usertrap_amd64.go:212] [ 1031: 1032] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.078871 46712 usertrap_amd64.go:122] [ 1031: 1032] Allocate a new trap: 0xc0008b0cf0 12 D0712 20:27:49.078901 46712 usertrap_amd64.go:225] [ 1031: 1032] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:27:49.078992 46712 usertrap_amd64.go:212] [ 1031: 1032] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.079019 46712 usertrap_amd64.go:122] [ 1031: 1032] Allocate a new trap: 0xc0008b0cf0 13 D0712 20:27:49.079032 46712 usertrap_amd64.go:225] [ 1031: 1032] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:27:49.079161 46712 task_signals.go:470] [ 1031: 1031] Notified of signal 23 D0712 20:27:49.079297 46712 task_signals.go:220] [ 1031: 1031] Signal 23: delivering to handler I0712 20:27:49.087491 46712 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0712 20:27:49.087608 46712 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.087629 46712 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc0008b0cf0 14 D0712 20:27:49.087656 46712 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:27:49.087749 46712 task_exit.go:204] [ 1031: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.087790 46712 task_exit.go:204] [ 1031: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.087826 46712 task_signals.go:204] [ 1031: 1034] Signal 1031, PID: 1034, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.087818 46712 task_signals.go:204] [ 1031: 1033] Signal 1031, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.087842 46712 task_exit.go:204] [ 1031: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.087878 46712 task_exit.go:204] [ 1031: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.087895 46712 task_exit.go:204] [ 1031: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.087920 46712 task_signals.go:204] [ 1031: 1035] Signal 1031, PID: 1035, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.087944 46712 task_exit.go:204] [ 1031: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.087954 46712 task_exit.go:204] [ 1031: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.087959 46712 task_exit.go:204] [ 1031: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.087981 46712 task_signals.go:204] [ 1031: 1032] Signal 1031, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.087998 46712 task_exit.go:204] [ 1031: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.088018 46712 task_exit.go:204] [ 1031: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.088034 46712 task_exit.go:204] [ 1031: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.088055 46712 task_exit.go:204] [ 1031: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.089636 46712 task_exit.go:204] [ 1031: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.089671 46712 task_exit.go:204] [ 1031: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.089693 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.089735 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.089752 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.089886 46712 task_exit.go:204] [ 1031: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.090779 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.092430 46712 syscalls.go:262] [ 1036: 1036] Allocating stack with size of 8388608 bytes D0712 20:27:49.092614 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.093789 46712 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.093831 46712 usertrap_amd64.go:106] [ 1036: 1036] Map a usertrap vma at 60000 D0712 20:27:49.093934 46712 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc0018307b0 1 D0712 20:27:49.093968 46712 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:27:49.094364 46712 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.094392 46712 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc0018307b0 2 D0712 20:27:49.094403 46712 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:27:49.095148 46712 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.095177 46712 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc0018307b0 3 D0712 20:27:49.095188 46712 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:27:49.101805 46712 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.101823 46712 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc0018307b0 4 D0712 20:27:49.101838 46712 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:27:49.103036 46712 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.103070 46712 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc0018307b0 5 D0712 20:27:49.103084 46712 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:27:49.103180 46712 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.103209 46712 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc0018307b0 6 D0712 20:27:49.103224 46712 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:27:49.103547 46712 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.103574 46712 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc0018307b0 7 D0712 20:27:49.103587 46712 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:27:49.103829 46712 usertrap_amd64.go:212] [ 1036: 1037] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.103860 46712 usertrap_amd64.go:122] [ 1036: 1037] Allocate a new trap: 0xc0018307b0 8 D0712 20:27:49.103877 46712 usertrap_amd64.go:225] [ 1036: 1037] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:27:49.104174 46712 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.104209 46712 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc0018307b0 9 D0712 20:27:49.104222 46712 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:27:49.104276 46712 usertrap_amd64.go:212] [ 1036: 1037] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.104302 46712 usertrap_amd64.go:122] [ 1036: 1037] Allocate a new trap: 0xc0018307b0 10 D0712 20:27:49.104316 46712 usertrap_amd64.go:225] [ 1036: 1037] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:27:49.112669 46712 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.112707 46712 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc0018307b0 11 D0712 20:27:49.112722 46712 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:27:49.115755 46712 usertrap_amd64.go:212] [ 1036: 1037] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.115787 46712 usertrap_amd64.go:122] [ 1036: 1037] Allocate a new trap: 0xc0018307b0 12 D0712 20:27:49.115801 46712 usertrap_amd64.go:225] [ 1036: 1037] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:27:49.115862 46712 usertrap_amd64.go:212] [ 1036: 1037] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.115884 46712 usertrap_amd64.go:122] [ 1036: 1037] Allocate a new trap: 0xc0018307b0 13 D0712 20:27:49.115899 46712 usertrap_amd64.go:225] [ 1036: 1037] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:27:49.115945 46712 task_signals.go:470] [ 1036: 1036] Notified of signal 23 D0712 20:27:49.116019 46712 task_signals.go:220] [ 1036: 1036] Signal 23: delivering to handler I0712 20:27:49.124004 46712 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0712 20:27:49.124178 46712 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.124202 46712 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc0018307b0 14 D0712 20:27:49.124218 46712 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:27:49.124283 46712 task_exit.go:204] [ 1036: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.124314 46712 task_exit.go:204] [ 1036: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.124345 46712 task_signals.go:204] [ 1036: 1039] Signal 1036, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.124365 46712 task_signals.go:204] [ 1036: 1038] Signal 1036, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.124378 46712 task_exit.go:204] [ 1036: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.124365 46712 task_signals.go:204] [ 1036: 1037] Signal 1036, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.124386 46712 task_exit.go:204] [ 1036: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.124405 46712 task_exit.go:204] [ 1036: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.124447 46712 task_signals.go:204] [ 1036: 1040] Signal 1036, PID: 1040, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.124467 46712 task_exit.go:204] [ 1036: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.124481 46712 task_exit.go:204] [ 1036: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.124484 46712 task_exit.go:204] [ 1036: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.124493 46712 task_exit.go:204] [ 1036: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.124501 46712 task_exit.go:204] [ 1036: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.124507 46712 task_exit.go:204] [ 1036: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.124519 46712 task_exit.go:204] [ 1036: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.125972 46712 task_exit.go:204] [ 1036: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.126003 46712 task_exit.go:204] [ 1036: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.126022 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.126052 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.126058 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.126150 46712 task_exit.go:204] [ 1036: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.126879 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.128713 46712 syscalls.go:262] [ 1041: 1041] Allocating stack with size of 8388608 bytes D0712 20:27:49.128842 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.130170 46712 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.130224 46712 usertrap_amd64.go:106] [ 1041: 1041] Map a usertrap vma at 61000 D0712 20:27:49.130333 46712 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0007f1e90 1 D0712 20:27:49.130391 46712 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:27:49.130680 46712 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.130712 46712 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0007f1e90 2 D0712 20:27:49.130723 46712 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:27:49.131438 46712 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.131464 46712 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0007f1e90 3 D0712 20:27:49.131474 46712 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:27:49.137581 46712 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.137612 46712 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0007f1e90 4 D0712 20:27:49.137626 46712 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:27:49.138629 46712 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.138654 46712 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0007f1e90 5 D0712 20:27:49.138662 46712 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:27:49.138716 46712 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.138739 46712 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0007f1e90 6 D0712 20:27:49.138746 46712 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:27:49.139389 46712 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.139425 46712 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0007f1e90 7 D0712 20:27:49.139437 46712 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:27:49.139660 46712 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.139685 46712 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0007f1e90 8 D0712 20:27:49.139696 46712 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:27:49.139936 46712 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.139952 46712 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0007f1e90 9 D0712 20:27:49.139961 46712 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:27:49.139987 46712 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.140042 46712 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0007f1e90 10 D0712 20:27:49.140057 46712 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:27:49.147606 46712 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.147642 46712 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0007f1e90 11 D0712 20:27:49.147661 46712 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:27:49.151156 46712 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.151188 46712 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0007f1e90 12 D0712 20:27:49.151204 46712 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:27:49.151277 46712 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.151292 46712 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0007f1e90 13 D0712 20:27:49.151303 46712 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:27:49.151387 46712 task_signals.go:470] [ 1041: 1041] Notified of signal 23 D0712 20:27:49.151499 46712 task_signals.go:220] [ 1041: 1041] Signal 23: delivering to handler I0712 20:27:49.158251 46712 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0712 20:27:49.158449 46712 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.158475 46712 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0007f1e90 14 D0712 20:27:49.158488 46712 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:27:49.158559 46712 task_exit.go:204] [ 1041: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.158599 46712 task_exit.go:204] [ 1041: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.158602 46712 task_signals.go:204] [ 1041: 1045] Signal 1041, PID: 1045, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.158619 46712 task_signals.go:204] [ 1041: 1044] Signal 1041, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.158652 46712 task_signals.go:204] [ 1041: 1043] Signal 1041, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.158687 46712 task_exit.go:204] [ 1041: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.158701 46712 task_exit.go:204] [ 1041: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.158707 46712 task_exit.go:204] [ 1041: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.158727 46712 task_signals.go:204] [ 1041: 1042] Signal 1041, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.158753 46712 task_exit.go:204] [ 1041: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.158768 46712 task_exit.go:204] [ 1041: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.158774 46712 task_exit.go:204] [ 1041: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.158786 46712 task_exit.go:204] [ 1041: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.158794 46712 task_exit.go:204] [ 1041: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.158800 46712 task_exit.go:204] [ 1041: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.158812 46712 task_exit.go:204] [ 1041: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.160242 46712 task_exit.go:204] [ 1041: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.160274 46712 task_exit.go:204] [ 1041: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.160289 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.160312 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.160324 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.160546 46712 task_exit.go:204] [ 1041: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.161186 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.161294 46712 task_signals.go:481] [ 6: 21] No task notified of signal 23 D0712 20:27:49.162775 46712 syscalls.go:262] [ 1046: 1046] Allocating stack with size of 8388608 bytes D0712 20:27:49.162915 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.163030 46712 task_signals.go:220] [ 6: 21] Signal 23: delivering to handler D0712 20:27:49.163088 46712 task_signals.go:470] [ 6: 21] Notified of signal 23 D0712 20:27:49.163116 46712 task_signals.go:220] [ 6: 21] Signal 23: delivering to handler D0712 20:27:49.164470 46712 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.164550 46712 usertrap_amd64.go:106] [ 1046: 1046] Map a usertrap vma at 69000 D0712 20:27:49.164671 46712 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc001830ae0 1 D0712 20:27:49.164706 46712 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:27:49.165104 46712 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.165122 46712 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc001830ae0 2 D0712 20:27:49.165129 46712 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:27:49.165827 46712 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.165859 46712 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc001830ae0 3 D0712 20:27:49.165889 46712 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:27:49.172644 46712 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.172712 46712 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc001830ae0 4 D0712 20:27:49.172729 46712 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:27:49.173976 46712 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.173999 46712 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc001830ae0 5 D0712 20:27:49.174011 46712 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:27:49.174083 46712 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.174099 46712 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc001830ae0 6 D0712 20:27:49.174108 46712 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:27:49.174536 46712 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.174562 46712 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc001830ae0 7 D0712 20:27:49.174572 46712 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:27:49.174740 46712 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.174759 46712 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc001830ae0 8 D0712 20:27:49.174769 46712 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:27:49.174940 46712 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.174965 46712 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc001830ae0 9 D0712 20:27:49.174983 46712 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:27:49.175209 46712 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.175237 46712 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc001830ae0 10 D0712 20:27:49.175249 46712 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:27:49.183412 46712 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.183443 46712 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc001830ae0 11 D0712 20:27:49.183455 46712 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:27:49.186165 46712 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.186199 46712 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc001830ae0 12 D0712 20:27:49.186214 46712 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:27:49.186264 46712 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.186300 46712 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc001830ae0 13 D0712 20:27:49.186324 46712 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:27:49.186412 46712 task_signals.go:470] [ 1046: 1046] Notified of signal 23 D0712 20:27:49.186510 46712 task_signals.go:220] [ 1046: 1046] Signal 23: delivering to handler I0712 20:27:49.194509 46712 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0712 20:27:49.194662 46712 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.194692 46712 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc001830ae0 14 D0712 20:27:49.194707 46712 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:27:49.194798 46712 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.194836 46712 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.194840 46712 task_signals.go:204] [ 1046: 1048] Signal 1046, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.194864 46712 task_signals.go:204] [ 1046: 1049] Signal 1046, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.194867 46712 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.194868 46712 task_signals.go:204] [ 1046: 1050] Signal 1046, PID: 1050, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.194902 46712 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.194938 46712 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.194989 46712 task_signals.go:204] [ 1046: 1047] Signal 1046, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.195013 46712 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.195106 46712 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.195122 46712 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.195139 46712 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.195148 46712 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.195152 46712 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.195162 46712 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.196589 46712 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.196620 46712 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.196634 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.196664 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.196689 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.196833 46712 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.197828 46712 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.199459 46712 syscalls.go:262] [ 1051: 1051] Allocating stack with size of 8388608 bytes D0712 20:27:49.199650 46712 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.200739 46712 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.200783 46712 usertrap_amd64.go:106] [ 1051: 1051] Map a usertrap vma at 61000 D0712 20:27:49.200886 46712 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000e70f30 1 D0712 20:27:49.200919 46712 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:27:49.201404 46712 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.201431 46712 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000e70f30 2 D0712 20:27:49.201442 46712 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:27:49.202231 46712 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.202263 46712 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000e70f30 3 D0712 20:27:49.202272 46712 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:27:49.209618 46712 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.209654 46712 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000e70f30 4 D0712 20:27:49.209668 46712 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:27:49.210707 46712 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.210791 46712 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000e70f30 5 D0712 20:27:49.210806 46712 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:27:49.210916 46712 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.210953 46712 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000e70f30 6 D0712 20:27:49.210964 46712 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:27:49.211235 46712 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.211251 46712 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000e70f30 7 D0712 20:27:49.211257 46712 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:27:49.211668 46712 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.211684 46712 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc000e70f30 8 D0712 20:27:49.211694 46712 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:27:49.211827 46712 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.211851 46712 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc000e70f30 9 D0712 20:27:49.211862 46712 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:27:49.211965 46712 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.212000 46712 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000e70f30 10 D0712 20:27:49.212012 46712 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:27:49.220813 46712 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.220844 46712 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000e70f30 11 D0712 20:27:49.220857 46712 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:27:49.223819 46712 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.223883 46712 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc000e70f30 12 D0712 20:27:49.223904 46712 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:27:49.223982 46712 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.224002 46712 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc000e70f30 13 D0712 20:27:49.224011 46712 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:27:49.224064 46712 task_signals.go:470] [ 1051: 1051] Notified of signal 23 D0712 20:27:49.224119 46712 task_signals.go:179] [ 1051: 1051] Restarting syscall 202: interrupted by signal 23 D0712 20:27:49.224138 46712 task_signals.go:220] [ 1051: 1051] Signal 23: delivering to handler D0712 20:27:49.234291 46712 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.234345 46712 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc000e70f30 14 D0712 20:27:49.234361 46712 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:27:49.234505 46712 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.234553 46712 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.234556 46712 task_signals.go:204] [ 1051: 1054] Signal 1051, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.234587 46712 task_signals.go:204] [ 1051: 1055] Signal 1051, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.234589 46712 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.234667 46712 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.234677 46712 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.234710 46712 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.234706 46712 task_signals.go:204] [ 1051: 1053] Signal 1051, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.234721 46712 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.234728 46712 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.234748 46712 task_signals.go:204] [ 1051: 1056] Signal 1051, PID: 1056, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.234780 46712 task_exit.go:204] [ 1051: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.234800 46712 task_signals.go:204] [ 1051: 1052] Signal 1051, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.234825 46712 task_exit.go:204] [ 1051: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.234832 46712 task_exit.go:204] [ 1051: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.234845 46712 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.234922 46712 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.234965 46712 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.234983 46712 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.236831 46712 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.236848 46712 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.236862 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.236905 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.236923 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.237089 46712 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.238066 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.239674 46712 syscalls.go:262] [ 1057: 1057] Allocating stack with size of 8388608 bytes D0712 20:27:49.239799 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.241692 46712 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.241740 46712 usertrap_amd64.go:106] [ 1057: 1057] Map a usertrap vma at 68000 D0712 20:27:49.241819 46712 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc000a9e720 1 D0712 20:27:49.241890 46712 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:27:49.242174 46712 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.242200 46712 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc000a9e720 2 D0712 20:27:49.242211 46712 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:27:49.242691 46712 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.242723 46712 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc000a9e720 3 D0712 20:27:49.242734 46712 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:27:49.249850 46712 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.249883 46712 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc000a9e720 4 D0712 20:27:49.249897 46712 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:27:49.251163 46712 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.251190 46712 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc000a9e720 5 D0712 20:27:49.251200 46712 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:27:49.251245 46712 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.251250 46712 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc000a9e720 6 D0712 20:27:49.251255 46712 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:27:49.251656 46712 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.251673 46712 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc000a9e720 7 D0712 20:27:49.251679 46712 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:27:49.251831 46712 usertrap_amd64.go:212] [ 1057: 1058] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.251854 46712 usertrap_amd64.go:122] [ 1057: 1058] Allocate a new trap: 0xc000a9e720 8 D0712 20:27:49.251863 46712 usertrap_amd64.go:225] [ 1057: 1058] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:27:49.252011 46712 usertrap_amd64.go:212] [ 1057: 1058] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.252029 46712 usertrap_amd64.go:122] [ 1057: 1058] Allocate a new trap: 0xc000a9e720 9 D0712 20:27:49.252038 46712 usertrap_amd64.go:225] [ 1057: 1058] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:27:49.252193 46712 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.252241 46712 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc000a9e720 10 D0712 20:27:49.252257 46712 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:27:49.252931 46712 usertrap_amd64.go:212] [ 1057: 1058] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.252999 46712 usertrap_amd64.go:122] [ 1057: 1058] Allocate a new trap: 0xc000a9e720 11 D0712 20:27:49.253016 46712 usertrap_amd64.go:225] [ 1057: 1058] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:27:49.253181 46712 usertrap_amd64.go:212] [ 1057: 1058] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.253209 46712 usertrap_amd64.go:122] [ 1057: 1058] Allocate a new trap: 0xc000a9e720 12 D0712 20:27:49.253223 46712 usertrap_amd64.go:225] [ 1057: 1058] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:27:49.253299 46712 task_signals.go:470] [ 1057: 1057] Notified of signal 23 D0712 20:27:49.253433 46712 task_signals.go:220] [ 1057: 1057] Signal 23: delivering to handler D0712 20:27:49.261703 46712 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.261739 46712 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc000a9e720 13 D0712 20:27:49.261751 46712 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:27:49.264338 46712 task_signals.go:470] [ 1057: 1057] Notified of signal 23 D0712 20:27:49.265162 46712 task_signals.go:220] [ 1057: 1057] Signal 23: delivering to handler D0712 20:27:49.277576 46712 task_signals.go:470] [ 1057: 1057] Notified of signal 23 D0712 20:27:49.278191 46712 task_signals.go:220] [ 1057: 1057] Signal 23: delivering to handler D0712 20:27:49.278855 46712 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.278885 46712 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc000a9e720 14 D0712 20:27:49.278904 46712 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:27:49.278998 46712 task_exit.go:204] [ 1057: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.279033 46712 task_exit.go:204] [ 1057: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.279068 46712 task_signals.go:204] [ 1057: 1061] Signal 1057, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.279080 46712 task_signals.go:204] [ 1057: 1059] Signal 1057, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.279061 46712 task_signals.go:204] [ 1057: 1060] Signal 1057, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.279063 46712 task_signals.go:204] [ 1057: 1058] Signal 1057, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.279106 46712 task_exit.go:204] [ 1057: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.279126 46712 task_exit.go:204] [ 1057: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.279141 46712 task_exit.go:204] [ 1057: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.279161 46712 task_exit.go:204] [ 1057: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.279178 46712 task_exit.go:204] [ 1057: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.279185 46712 task_exit.go:204] [ 1057: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.279196 46712 task_exit.go:204] [ 1057: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.279204 46712 task_exit.go:204] [ 1057: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.279209 46712 task_exit.go:204] [ 1057: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.279252 46712 task_exit.go:204] [ 1057: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.280824 46712 task_exit.go:204] [ 1057: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.280892 46712 task_exit.go:204] [ 1057: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.280907 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.280966 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.280997 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.281120 46712 task_exit.go:204] [ 1057: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.281864 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.283744 46712 syscalls.go:262] [ 1062: 1062] Allocating stack with size of 8388608 bytes D0712 20:27:49.283866 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.286432 46712 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.286582 46712 usertrap_amd64.go:106] [ 1062: 1062] Map a usertrap vma at 68000 D0712 20:27:49.286661 46712 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc00107c030 1 D0712 20:27:49.286698 46712 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:27:49.287364 46712 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.287391 46712 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc00107c030 2 D0712 20:27:49.287411 46712 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:27:49.288332 46712 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.288360 46712 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc00107c030 3 D0712 20:27:49.288386 46712 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:27:49.296519 46712 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.296565 46712 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc00107c030 4 D0712 20:27:49.296584 46712 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:27:49.298015 46712 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.298055 46712 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc00107c030 5 D0712 20:27:49.298070 46712 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:27:49.298127 46712 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.298154 46712 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc00107c030 6 D0712 20:27:49.298159 46712 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:27:49.298676 46712 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.298697 46712 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc00107c030 7 D0712 20:27:49.298706 46712 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:27:49.298902 46712 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.298932 46712 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc00107c030 8 D0712 20:27:49.298945 46712 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:27:49.299303 46712 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.299330 46712 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc00107c030 9 D0712 20:27:49.299348 46712 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:27:49.299393 46712 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.299401 46712 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc00107c030 10 D0712 20:27:49.299409 46712 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:27:49.307175 46712 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.307272 46712 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc00107c030 11 D0712 20:27:49.307298 46712 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:27:49.309902 46712 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.309940 46712 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc00107c030 12 D0712 20:27:49.309954 46712 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:27:49.309979 46712 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.309987 46712 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc00107c030 13 D0712 20:27:49.310004 46712 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:27:49.310107 46712 task_signals.go:470] [ 1062: 1062] Notified of signal 23 D0712 20:27:49.310320 46712 task_signals.go:220] [ 1062: 1062] Signal 23: delivering to handler D0712 20:27:49.318306 46712 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.318336 46712 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc00107c030 14 D0712 20:27:49.318346 46712 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:27:49.318421 46712 task_exit.go:204] [ 1062: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.318460 46712 task_signals.go:204] [ 1062: 1063] Signal 1062, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.318480 46712 task_signals.go:204] [ 1062: 1065] Signal 1062, PID: 1065, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.318505 46712 task_exit.go:204] [ 1062: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.318548 46712 task_signals.go:204] [ 1062: 1064] Signal 1062, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.318568 46712 task_exit.go:204] [ 1062: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.318579 46712 task_exit.go:204] [ 1062: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.318583 46712 task_exit.go:204] [ 1062: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.318572 46712 task_signals.go:204] [ 1062: 1066] Signal 1062, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.318595 46712 task_exit.go:204] [ 1062: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.318609 46712 task_exit.go:204] [ 1062: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.318630 46712 task_exit.go:204] [ 1062: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.318665 46712 task_exit.go:204] [ 1062: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.318678 46712 task_exit.go:204] [ 1062: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.318682 46712 task_exit.go:204] [ 1062: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.318689 46712 task_exit.go:204] [ 1062: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.320074 46712 task_exit.go:204] [ 1062: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.320101 46712 task_exit.go:204] [ 1062: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.320112 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.320142 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.320157 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.320390 46712 task_exit.go:204] [ 1062: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.321191 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.322812 46712 syscalls.go:262] [ 1067: 1067] Allocating stack with size of 8388608 bytes D0712 20:27:49.322947 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.325411 46712 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.325454 46712 usertrap_amd64.go:106] [ 1067: 1067] Map a usertrap vma at 67000 D0712 20:27:49.325563 46712 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc00107c120 1 D0712 20:27:49.325593 46712 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:27:49.326450 46712 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.326484 46712 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc00107c120 2 D0712 20:27:49.326502 46712 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:27:49.327226 46712 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.327258 46712 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc00107c120 3 D0712 20:27:49.327270 46712 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:27:49.338313 46712 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.338355 46712 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc00107c120 4 D0712 20:27:49.338371 46712 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:27:49.339565 46712 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.339591 46712 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc00107c120 5 D0712 20:27:49.339600 46712 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:27:49.339650 46712 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.339658 46712 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc00107c120 6 D0712 20:27:49.339665 46712 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:27:49.339898 46712 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.339922 46712 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc00107c120 7 D0712 20:27:49.339929 46712 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:27:49.340118 46712 usertrap_amd64.go:212] [ 1067: 1068] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.340134 46712 usertrap_amd64.go:122] [ 1067: 1068] Allocate a new trap: 0xc00107c120 8 D0712 20:27:49.340140 46712 usertrap_amd64.go:225] [ 1067: 1068] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:27:49.340551 46712 usertrap_amd64.go:212] [ 1067: 1068] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.340607 46712 usertrap_amd64.go:122] [ 1067: 1068] Allocate a new trap: 0xc00107c120 9 D0712 20:27:49.340631 46712 usertrap_amd64.go:225] [ 1067: 1068] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:27:49.340717 46712 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.340743 46712 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc00107c120 10 D0712 20:27:49.340754 46712 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:27:49.349277 46712 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.349336 46712 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc00107c120 11 D0712 20:27:49.349356 46712 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:27:49.352251 46712 usertrap_amd64.go:212] [ 1067: 1068] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.352283 46712 usertrap_amd64.go:122] [ 1067: 1068] Allocate a new trap: 0xc00107c120 12 D0712 20:27:49.352299 46712 usertrap_amd64.go:225] [ 1067: 1068] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:27:49.352339 46712 usertrap_amd64.go:212] [ 1067: 1068] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.352344 46712 usertrap_amd64.go:122] [ 1067: 1068] Allocate a new trap: 0xc00107c120 13 D0712 20:27:49.352351 46712 usertrap_amd64.go:225] [ 1067: 1068] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:27:49.352372 46712 task_signals.go:470] [ 1067: 1067] Notified of signal 23 D0712 20:27:49.352460 46712 task_signals.go:220] [ 1067: 1067] Signal 23: delivering to handler D0712 20:27:49.360726 46712 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.360764 46712 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc00107c120 14 D0712 20:27:49.360777 46712 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:27:49.360849 46712 task_exit.go:204] [ 1067: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.360875 46712 task_exit.go:204] [ 1067: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.360911 46712 task_signals.go:204] [ 1067: 1072] Signal 1067, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.360925 46712 task_signals.go:204] [ 1067: 1068] Signal 1067, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.360905 46712 task_signals.go:204] [ 1067: 1071] Signal 1067, PID: 1071, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.360982 46712 task_signals.go:204] [ 1067: 1069] Signal 1067, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.361039 46712 task_exit.go:204] [ 1067: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.360910 46712 task_signals.go:204] [ 1067: 1070] Signal 1067, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.361625 46712 task_exit.go:204] [ 1067: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.361848 46712 task_exit.go:204] [ 1067: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.361936 46712 task_exit.go:204] [ 1067: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.361970 46712 task_exit.go:204] [ 1067: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.362319 46712 task_exit.go:204] [ 1067: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.362368 46712 task_exit.go:204] [ 1067: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.362540 46712 task_exit.go:204] [ 1067: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.362600 46712 task_exit.go:204] [ 1067: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.362639 46712 task_exit.go:204] [ 1067: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.362801 46712 task_exit.go:204] [ 1067: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.363015 46712 task_exit.go:204] [ 1067: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.363065 46712 task_exit.go:204] [ 1067: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.364720 46712 task_exit.go:204] [ 1067: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.364809 46712 task_exit.go:204] [ 1067: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.365040 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.365283 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.365355 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.365760 46712 task_exit.go:204] [ 1067: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.367311 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.369768 46712 syscalls.go:262] [ 1073: 1073] Allocating stack with size of 8388608 bytes D0712 20:27:49.369920 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.371187 46712 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.371249 46712 usertrap_amd64.go:106] [ 1073: 1073] Map a usertrap vma at 67000 D0712 20:27:49.371345 46712 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc00086bf80 1 D0712 20:27:49.371372 46712 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:27:49.371661 46712 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.371679 46712 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc00086bf80 2 D0712 20:27:49.371688 46712 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:27:49.372200 46712 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.372217 46712 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc00086bf80 3 D0712 20:27:49.372227 46712 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:27:49.381056 46712 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.381099 46712 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc00086bf80 4 D0712 20:27:49.381112 46712 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:27:49.382295 46712 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.382320 46712 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc00086bf80 5 D0712 20:27:49.382328 46712 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:27:49.382396 46712 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.382400 46712 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc00086bf80 6 D0712 20:27:49.382405 46712 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:27:49.382863 46712 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.382882 46712 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc00086bf80 7 D0712 20:27:49.382887 46712 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:27:49.383135 46712 usertrap_amd64.go:212] [ 1073: 1074] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.383166 46712 usertrap_amd64.go:122] [ 1073: 1074] Allocate a new trap: 0xc00086bf80 8 D0712 20:27:49.383174 46712 usertrap_amd64.go:225] [ 1073: 1074] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:27:49.383422 46712 usertrap_amd64.go:212] [ 1073: 1074] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.383447 46712 usertrap_amd64.go:122] [ 1073: 1074] Allocate a new trap: 0xc00086bf80 9 D0712 20:27:49.383458 46712 usertrap_amd64.go:225] [ 1073: 1074] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:27:49.383587 46712 usertrap_amd64.go:212] [ 1073: 1076] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.383616 46712 usertrap_amd64.go:122] [ 1073: 1076] Allocate a new trap: 0xc00086bf80 10 D0712 20:27:49.383625 46712 usertrap_amd64.go:225] [ 1073: 1076] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:27:49.384358 46712 usertrap_amd64.go:212] [ 1073: 1074] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.384437 46712 usertrap_amd64.go:122] [ 1073: 1074] Allocate a new trap: 0xc00086bf80 11 D0712 20:27:49.384455 46712 usertrap_amd64.go:225] [ 1073: 1074] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:27:49.384579 46712 usertrap_amd64.go:212] [ 1073: 1074] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.384600 46712 usertrap_amd64.go:122] [ 1073: 1074] Allocate a new trap: 0xc00086bf80 12 D0712 20:27:49.384610 46712 usertrap_amd64.go:225] [ 1073: 1074] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:27:49.384627 46712 task_signals.go:470] [ 1073: 1073] Notified of signal 23 D0712 20:27:49.384735 46712 task_signals.go:220] [ 1073: 1073] Signal 23: delivering to handler D0712 20:27:49.391647 46712 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.391679 46712 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc00086bf80 13 D0712 20:27:49.391693 46712 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:27:49.395925 46712 task_signals.go:470] [ 1073: 1073] Notified of signal 23 D0712 20:27:49.396066 46712 task_signals.go:220] [ 1073: 1073] Signal 23: delivering to handler D0712 20:27:49.401633 46712 usertrap_amd64.go:212] [ 1073: 1073] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.401660 46712 usertrap_amd64.go:122] [ 1073: 1073] Allocate a new trap: 0xc00086bf80 14 D0712 20:27:49.401675 46712 usertrap_amd64.go:225] [ 1073: 1073] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:27:49.401756 46712 task_exit.go:204] [ 1073: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.401786 46712 task_exit.go:204] [ 1073: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.401838 46712 task_signals.go:204] [ 1073: 1074] Signal 1073, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.401837 46712 task_signals.go:204] [ 1073: 1076] Signal 1073, PID: 1076, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.401863 46712 task_exit.go:204] [ 1073: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.401875 46712 task_exit.go:204] [ 1073: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.401872 46712 task_signals.go:204] [ 1073: 1075] Signal 1073, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.401882 46712 task_exit.go:204] [ 1073: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.401875 46712 task_signals.go:204] [ 1073: 1078] Signal 1073, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.401915 46712 task_exit.go:204] [ 1073: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.401925 46712 task_signals.go:204] [ 1073: 1077] Signal 1073, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.401937 46712 task_exit.go:204] [ 1073: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.401943 46712 task_exit.go:204] [ 1073: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.401951 46712 task_exit.go:204] [ 1073: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.401960 46712 task_exit.go:204] [ 1073: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.401966 46712 task_exit.go:204] [ 1073: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.401975 46712 task_exit.go:204] [ 1073: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.401980 46712 task_exit.go:204] [ 1073: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.401984 46712 task_exit.go:204] [ 1073: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.402008 46712 task_exit.go:204] [ 1073: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.403450 46712 task_exit.go:204] [ 1073: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.403474 46712 task_exit.go:204] [ 1073: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.403485 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.403511 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.403518 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.403613 46712 task_exit.go:204] [ 1073: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.404682 46712 task_stop.go:118] [ 6: 8] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.406341 46712 syscalls.go:262] [ 1079: 1079] Allocating stack with size of 8388608 bytes D0712 20:27:49.406527 46712 task_stop.go:138] [ 6: 8] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.407498 46712 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.407582 46712 usertrap_amd64.go:106] [ 1079: 1079] Map a usertrap vma at 63000 D0712 20:27:49.407657 46712 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc0008b1680 1 D0712 20:27:49.407677 46712 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:49.408017 46712 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.408034 46712 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc0008b1680 2 D0712 20:27:49.408041 46712 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:49.408570 46712 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.408592 46712 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc0008b1680 3 D0712 20:27:49.408604 46712 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:49.415106 46712 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.415142 46712 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc0008b1680 4 D0712 20:27:49.415155 46712 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:49.416276 46712 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.416299 46712 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc0008b1680 5 D0712 20:27:49.416306 46712 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:49.416340 46712 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.416346 46712 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc0008b1680 6 D0712 20:27:49.416351 46712 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:49.416851 46712 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.416872 46712 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc0008b1680 7 D0712 20:27:49.416879 46712 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:49.417075 46712 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.417099 46712 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc0008b1680 8 D0712 20:27:49.417108 46712 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:49.417313 46712 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.417329 46712 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc0008b1680 9 D0712 20:27:49.417342 46712 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:49.417364 46712 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.417372 46712 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc0008b1680 10 D0712 20:27:49.417392 46712 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:49.424578 46712 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.424607 46712 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc0008b1680 11 D0712 20:27:49.424616 46712 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:49.428321 46712 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.428344 46712 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc0008b1680 12 D0712 20:27:49.428358 46712 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:49.428420 46712 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.428441 46712 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc0008b1680 13 D0712 20:27:49.428449 46712 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:49.428488 46712 task_signals.go:470] [ 1079: 1079] Notified of signal 23 D0712 20:27:49.428590 46712 task_signals.go:220] [ 1079: 1079] Signal 23: delivering to handler I0712 20:27:49.437260 46712 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0712 20:27:49.437344 46712 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.437357 46712 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc0008b1680 14 D0712 20:27:49.437369 46712 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:49.437442 46712 task_exit.go:204] [ 1079: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.437481 46712 task_exit.go:204] [ 1079: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.437495 46712 task_signals.go:204] [ 1079: 1080] Signal 1079, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.437513 46712 task_signals.go:204] [ 1079: 1082] Signal 1079, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.437499 46712 task_signals.go:204] [ 1079: 1083] Signal 1079, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.437525 46712 task_exit.go:204] [ 1079: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.437546 46712 task_signals.go:204] [ 1079: 1084] Signal 1079, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.437522 46712 task_signals.go:204] [ 1079: 1081] Signal 1079, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.437570 46712 task_exit.go:204] [ 1079: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.437581 46712 task_exit.go:204] [ 1079: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.437592 46712 task_exit.go:204] [ 1079: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.437599 46712 task_exit.go:204] [ 1079: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.437603 46712 task_exit.go:204] [ 1079: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.437619 46712 task_exit.go:204] [ 1079: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.437638 46712 task_exit.go:204] [ 1079: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.437642 46712 task_exit.go:204] [ 1079: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.437670 46712 task_exit.go:204] [ 1079: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.437694 46712 task_exit.go:204] [ 1079: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.437702 46712 task_exit.go:204] [ 1079: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.437714 46712 task_exit.go:204] [ 1079: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.439055 46712 task_exit.go:204] [ 1079: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.439083 46712 task_exit.go:204] [ 1079: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.439093 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.439116 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.439143 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.439288 46712 task_exit.go:204] [ 1079: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.439952 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.441328 46712 syscalls.go:262] [ 1085: 1085] Allocating stack with size of 8388608 bytes D0712 20:27:49.441521 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.442615 46712 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.442651 46712 usertrap_amd64.go:106] [ 1085: 1085] Map a usertrap vma at 67000 D0712 20:27:49.442743 46712 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00107c3c0 1 D0712 20:27:49.442769 46712 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:27:49.442960 46712 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.442976 46712 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00107c3c0 2 D0712 20:27:49.442988 46712 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:27:49.443393 46712 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.443409 46712 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00107c3c0 3 D0712 20:27:49.443419 46712 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:27:49.448821 46712 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.448841 46712 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00107c3c0 4 D0712 20:27:49.448851 46712 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:27:49.449877 46712 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.449909 46712 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00107c3c0 5 D0712 20:27:49.449922 46712 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:27:49.449993 46712 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.450009 46712 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00107c3c0 6 D0712 20:27:49.450014 46712 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:27:49.450540 46712 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.450566 46712 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00107c3c0 7 D0712 20:27:49.450576 46712 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:27:49.450769 46712 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.450780 46712 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc00107c3c0 8 D0712 20:27:49.450795 46712 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:27:49.451087 46712 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.451114 46712 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc00107c3c0 9 D0712 20:27:49.451124 46712 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:27:49.451147 46712 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.451211 46712 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00107c3c0 10 D0712 20:27:49.451264 46712 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:27:49.458150 46712 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.458187 46712 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00107c3c0 11 D0712 20:27:49.458202 46712 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:27:49.461464 46712 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.461507 46712 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc00107c3c0 12 D0712 20:27:49.461521 46712 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:27:49.461543 46712 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.461553 46712 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc00107c3c0 13 D0712 20:27:49.461562 46712 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:27:49.461593 46712 task_signals.go:470] [ 1085: 1085] Notified of signal 23 D0712 20:27:49.461674 46712 task_signals.go:220] [ 1085: 1085] Signal 23: delivering to handler I0712 20:27:49.467157 46712 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0712 20:27:49.467210 46712 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.467218 46712 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00107c3c0 14 D0712 20:27:49.467225 46712 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:27:49.467241 46712 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.467260 46712 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.467273 46712 task_signals.go:204] [ 1085: 1086] Signal 1085, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.467284 46712 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.467288 46712 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.467292 46712 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.467301 46712 task_signals.go:204] [ 1085: 1088] Signal 1085, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.467308 46712 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.467301 46712 task_signals.go:204] [ 1085: 1087] Signal 1085, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.467312 46712 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.467325 46712 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.467396 46712 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.467439 46712 task_signals.go:204] [ 1085: 1089] Signal 1085, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.467464 46712 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.467479 46712 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.467490 46712 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.468644 46712 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.468667 46712 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.468683 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.468743 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.468764 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.468834 46712 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.469598 46712 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.471271 46712 syscalls.go:262] [ 1090: 1090] Allocating stack with size of 8388608 bytes D0712 20:27:49.471414 46712 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.472252 46712 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.472290 46712 usertrap_amd64.go:106] [ 1090: 1090] Map a usertrap vma at 62000 D0712 20:27:49.472360 46712 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0001daff0 1 D0712 20:27:49.472378 46712 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:27:49.472574 46712 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.472596 46712 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0001daff0 2 D0712 20:27:49.472621 46712 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:27:49.473258 46712 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.473281 46712 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0001daff0 3 D0712 20:27:49.473289 46712 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:27:49.478692 46712 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.478722 46712 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0001daff0 4 D0712 20:27:49.478745 46712 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:27:49.479843 46712 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.479880 46712 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0001daff0 5 D0712 20:27:49.479894 46712 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:27:49.479957 46712 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.479972 46712 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0001daff0 6 D0712 20:27:49.479980 46712 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:27:49.480314 46712 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.480343 46712 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0001daff0 7 D0712 20:27:49.480352 46712 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:27:49.480535 46712 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.480566 46712 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc0001daff0 8 D0712 20:27:49.480575 46712 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:27:49.480812 46712 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.480840 46712 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc0001daff0 9 D0712 20:27:49.480850 46712 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:27:49.481066 46712 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.481096 46712 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0001daff0 10 D0712 20:27:49.481106 46712 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:27:49.481747 46712 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.481812 46712 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc0001daff0 11 D0712 20:27:49.481831 46712 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:27:49.481905 46712 usertrap_amd64.go:212] [ 1090: 1091] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.481911 46712 usertrap_amd64.go:122] [ 1090: 1091] Allocate a new trap: 0xc0001daff0 12 D0712 20:27:49.481917 46712 usertrap_amd64.go:225] [ 1090: 1091] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:27:49.481951 46712 task_signals.go:470] [ 1090: 1090] Notified of signal 23 D0712 20:27:49.482170 46712 task_signals.go:220] [ 1090: 1090] Signal 23: delivering to handler D0712 20:27:49.489162 46712 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.489200 46712 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0001daff0 13 D0712 20:27:49.489212 46712 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:27:49.492706 46712 task_signals.go:470] [ 1090: 1090] Notified of signal 23 D0712 20:27:49.492761 46712 task_signals.go:220] [ 1090: 1090] Signal 23: delivering to handler D0712 20:27:49.499822 46712 usertrap_amd64.go:212] [ 1090: 1090] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.499857 46712 usertrap_amd64.go:122] [ 1090: 1090] Allocate a new trap: 0xc0001daff0 14 D0712 20:27:49.499873 46712 usertrap_amd64.go:225] [ 1090: 1090] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:27:49.499940 46712 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.499973 46712 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.500008 46712 task_signals.go:204] [ 1090: 1093] Signal 1090, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.500033 46712 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.500023 46712 task_signals.go:204] [ 1090: 1091] Signal 1090, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.499990 46712 task_signals.go:204] [ 1090: 1092] Signal 1090, PID: 1092, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.500042 46712 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.500063 46712 task_exit.go:204] [ 1090: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.500088 46712 task_signals.go:204] [ 1090: 1094] Signal 1090, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.500101 46712 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.500113 46712 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.500117 46712 task_exit.go:204] [ 1090: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.500130 46712 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.500156 46712 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.500168 46712 task_exit.go:204] [ 1090: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.500195 46712 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.501580 46712 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.501611 46712 task_exit.go:204] [ 1090: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.501633 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.501668 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.501681 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.501848 46712 task_exit.go:204] [ 1090: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.502536 46712 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.504037 46712 syscalls.go:262] [ 1095: 1095] Allocating stack with size of 8388608 bytes D0712 20:27:49.504177 46712 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.505362 46712 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.505411 46712 usertrap_amd64.go:106] [ 1095: 1095] Map a usertrap vma at 67000 D0712 20:27:49.505508 46712 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0001db050 1 D0712 20:27:49.505543 46712 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0712 20:27:49.506015 46712 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.506044 46712 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0001db050 2 D0712 20:27:49.506060 46712 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0712 20:27:49.506812 46712 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.506846 46712 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0001db050 3 D0712 20:27:49.506865 46712 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0712 20:27:49.513642 46712 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.513669 46712 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0001db050 4 D0712 20:27:49.513683 46712 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0712 20:27:49.515157 46712 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.515185 46712 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0001db050 5 D0712 20:27:49.515196 46712 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0712 20:27:49.515248 46712 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.515255 46712 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0001db050 6 D0712 20:27:49.515264 46712 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0712 20:27:49.515512 46712 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.515530 46712 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0001db050 7 D0712 20:27:49.515538 46712 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0712 20:27:49.515700 46712 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.515719 46712 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc0001db050 8 D0712 20:27:49.515727 46712 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0712 20:27:49.516038 46712 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.516076 46712 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc0001db050 9 D0712 20:27:49.516093 46712 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0712 20:27:49.516197 46712 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.516225 46712 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0001db050 10 D0712 20:27:49.516234 46712 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0712 20:27:49.523824 46712 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.523849 46712 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0001db050 11 D0712 20:27:49.523866 46712 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0712 20:27:49.526483 46712 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.526512 46712 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc0001db050 12 D0712 20:27:49.526524 46712 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0712 20:27:49.526610 46712 usertrap_amd64.go:212] [ 1095: 1096] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.526641 46712 usertrap_amd64.go:122] [ 1095: 1096] Allocate a new trap: 0xc0001db050 13 D0712 20:27:49.526657 46712 usertrap_amd64.go:225] [ 1095: 1096] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0712 20:27:49.526718 46712 task_signals.go:470] [ 1095: 1095] Notified of signal 23 D0712 20:27:49.526823 46712 task_signals.go:220] [ 1095: 1095] Signal 23: delivering to handler D0712 20:27:49.534235 46712 usertrap_amd64.go:212] [ 1095: 1095] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.534274 46712 usertrap_amd64.go:122] [ 1095: 1095] Allocate a new trap: 0xc0001db050 14 D0712 20:27:49.534288 46712 usertrap_amd64.go:225] [ 1095: 1095] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0712 20:27:49.534349 46712 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.534389 46712 task_signals.go:204] [ 1095: 1098] Signal 1095, PID: 1098, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.534397 46712 task_signals.go:204] [ 1095: 1097] Signal 1095, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.534419 46712 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.534430 46712 task_signals.go:204] [ 1095: 1096] Signal 1095, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.534435 46712 task_signals.go:204] [ 1095: 1099] Signal 1095, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.534442 46712 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.534453 46712 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.534470 46712 task_exit.go:204] [ 1095: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.534493 46712 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.534519 46712 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.534534 46712 task_exit.go:204] [ 1095: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.534549 46712 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.534559 46712 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.534565 46712 task_exit.go:204] [ 1095: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.534576 46712 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.535909 46712 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.535956 46712 task_exit.go:204] [ 1095: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.535973 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.536012 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.536023 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.536137 46712 task_exit.go:204] [ 1095: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.536834 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.538502 46712 syscalls.go:262] [ 1100: 1100] Allocating stack with size of 8388608 bytes D0712 20:27:49.538736 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.540342 46712 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.540418 46712 usertrap_amd64.go:106] [ 1100: 1100] Map a usertrap vma at 69000 D0712 20:27:49.540561 46712 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0001db0e0 1 D0712 20:27:49.540598 46712 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:27:49.541193 46712 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.541220 46712 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0001db0e0 2 D0712 20:27:49.541232 46712 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:27:49.542109 46712 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.542135 46712 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0001db0e0 3 D0712 20:27:49.542145 46712 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:27:49.548470 46712 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.548499 46712 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0001db0e0 4 D0712 20:27:49.548514 46712 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:27:49.549830 46712 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.549931 46712 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0001db0e0 5 D0712 20:27:49.550003 46712 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:27:49.550104 46712 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.550126 46712 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0001db0e0 6 D0712 20:27:49.550136 46712 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:27:49.550596 46712 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.550618 46712 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0001db0e0 7 D0712 20:27:49.550626 46712 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:27:49.550842 46712 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.550921 46712 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc0001db0e0 8 D0712 20:27:49.550937 46712 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:27:49.551560 46712 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.551618 46712 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0001db0e0 9 D0712 20:27:49.551643 46712 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:27:49.551679 46712 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.551802 46712 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc0001db0e0 10 D0712 20:27:49.551818 46712 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:27:49.560886 46712 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.560927 46712 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0001db0e0 11 D0712 20:27:49.560971 46712 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:27:49.563686 46712 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.563735 46712 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc0001db0e0 12 D0712 20:27:49.563752 46712 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:27:49.563842 46712 usertrap_amd64.go:212] [ 1100: 1101] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.563892 46712 usertrap_amd64.go:122] [ 1100: 1101] Allocate a new trap: 0xc0001db0e0 13 D0712 20:27:49.563925 46712 usertrap_amd64.go:225] [ 1100: 1101] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:27:49.564014 46712 task_signals.go:470] [ 1100: 1100] Notified of signal 23 D0712 20:27:49.564176 46712 task_signals.go:220] [ 1100: 1100] Signal 23: delivering to handler D0712 20:27:49.573661 46712 usertrap_amd64.go:212] [ 1100: 1100] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.573722 46712 usertrap_amd64.go:122] [ 1100: 1100] Allocate a new trap: 0xc0001db0e0 14 D0712 20:27:49.573738 46712 usertrap_amd64.go:225] [ 1100: 1100] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:27:49.573831 46712 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.573876 46712 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.573905 46712 task_signals.go:204] [ 1100: 1102] Signal 1100, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.573929 46712 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.573901 46712 task_signals.go:204] [ 1100: 1103] Signal 1100, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.573958 46712 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.573945 46712 task_signals.go:204] [ 1100: 1101] Signal 1100, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.573928 46712 task_signals.go:204] [ 1100: 1105] Signal 1100, PID: 1105, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.573967 46712 task_exit.go:204] [ 1100: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.574002 46712 task_signals.go:204] [ 1100: 1104] Signal 1100, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.574016 46712 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.574050 46712 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.574059 46712 task_exit.go:204] [ 1100: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.574086 46712 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.574151 46712 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.574163 46712 task_exit.go:204] [ 1100: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.574184 46712 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.574201 46712 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.574207 46712 task_exit.go:204] [ 1100: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.574218 46712 task_exit.go:204] [ 1100: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.575877 46712 task_exit.go:204] [ 1100: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.575951 46712 task_exit.go:204] [ 1100: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.575976 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.576045 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.576069 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.576260 46712 task_exit.go:204] [ 1100: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.577110 46712 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.578776 46712 syscalls.go:262] [ 1106: 1106] Allocating stack with size of 8388608 bytes D0712 20:27:49.578918 46712 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.583107 46712 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.583176 46712 usertrap_amd64.go:106] [ 1106: 1106] Map a usertrap vma at 66000 D0712 20:27:49.583278 46712 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc0001db320 1 D0712 20:27:49.583321 46712 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:49.583765 46712 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.583793 46712 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc0001db320 2 D0712 20:27:49.583804 46712 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:49.584539 46712 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.584566 46712 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc0001db320 3 D0712 20:27:49.584578 46712 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:49.593605 46712 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.593639 46712 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc0001db320 4 D0712 20:27:49.593650 46712 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:49.594846 46712 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.594967 46712 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc0001db320 5 D0712 20:27:49.594988 46712 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:49.596620 46712 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.596636 46712 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc0001db320 6 D0712 20:27:49.596646 46712 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:49.597273 46712 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.597323 46712 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc0001db320 7 D0712 20:27:49.597335 46712 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:49.597678 46712 usertrap_amd64.go:212] [ 1106: 1107] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.597728 46712 usertrap_amd64.go:122] [ 1106: 1107] Allocate a new trap: 0xc0001db320 8 D0712 20:27:49.597746 46712 usertrap_amd64.go:225] [ 1106: 1107] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:49.598069 46712 usertrap_amd64.go:212] [ 1106: 1107] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.598095 46712 usertrap_amd64.go:122] [ 1106: 1107] Allocate a new trap: 0xc0001db320 9 D0712 20:27:49.598108 46712 usertrap_amd64.go:225] [ 1106: 1107] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:49.598235 46712 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.598265 46712 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc0001db320 10 D0712 20:27:49.598278 46712 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:49.599134 46712 usertrap_amd64.go:212] [ 1106: 1107] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.599158 46712 usertrap_amd64.go:122] [ 1106: 1107] Allocate a new trap: 0xc0001db320 11 D0712 20:27:49.599170 46712 usertrap_amd64.go:225] [ 1106: 1107] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:49.599278 46712 usertrap_amd64.go:212] [ 1106: 1107] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.599294 46712 usertrap_amd64.go:122] [ 1106: 1107] Allocate a new trap: 0xc0001db320 12 D0712 20:27:49.599309 46712 usertrap_amd64.go:225] [ 1106: 1107] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:49.599354 46712 task_signals.go:470] [ 1106: 1106] Notified of signal 23 D0712 20:27:49.599413 46712 task_signals.go:220] [ 1106: 1106] Signal 23: delivering to handler D0712 20:27:49.606268 46712 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.606295 46712 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc0001db320 13 D0712 20:27:49.606304 46712 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:49.610062 46712 task_signals.go:470] [ 1106: 1106] Notified of signal 23 D0712 20:27:49.610139 46712 task_signals.go:220] [ 1106: 1106] Signal 23: delivering to handler D0712 20:27:49.619555 46712 usertrap_amd64.go:212] [ 1106: 1106] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.619600 46712 usertrap_amd64.go:122] [ 1106: 1106] Allocate a new trap: 0xc0001db320 14 D0712 20:27:49.619617 46712 usertrap_amd64.go:225] [ 1106: 1106] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:49.619694 46712 task_exit.go:204] [ 1106: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.619770 46712 task_exit.go:204] [ 1106: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.619794 46712 task_signals.go:204] [ 1106: 1109] Signal 1106, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.619807 46712 task_exit.go:204] [ 1106: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.619811 46712 task_exit.go:204] [ 1106: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.619815 46712 task_exit.go:204] [ 1106: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.619827 46712 task_signals.go:204] [ 1106: 1110] Signal 1106, PID: 1110, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.619814 46712 task_signals.go:204] [ 1106: 1108] Signal 1106, PID: 1108, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.619834 46712 task_exit.go:204] [ 1106: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.619861 46712 task_exit.go:204] [ 1106: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.619898 46712 task_exit.go:204] [ 1106: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.619920 46712 task_signals.go:204] [ 1106: 1107] Signal 1106, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.619934 46712 task_exit.go:204] [ 1106: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.619942 46712 task_exit.go:204] [ 1106: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.619948 46712 task_exit.go:204] [ 1106: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.619960 46712 task_exit.go:204] [ 1106: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.621455 46712 task_exit.go:204] [ 1106: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.621481 46712 task_exit.go:204] [ 1106: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.621505 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.621615 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.621708 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.621799 46712 task_exit.go:204] [ 1106: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.622636 46712 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.624418 46712 syscalls.go:262] [ 1111: 1111] Allocating stack with size of 8388608 bytes D0712 20:27:49.624536 46712 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.626020 46712 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.626081 46712 usertrap_amd64.go:106] [ 1111: 1111] Map a usertrap vma at 68000 D0712 20:27:49.626176 46712 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc0001db560 1 D0712 20:27:49.626208 46712 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0712 20:27:49.626585 46712 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.626601 46712 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc0001db560 2 D0712 20:27:49.626607 46712 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0712 20:27:49.627503 46712 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.627534 46712 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc0001db560 3 D0712 20:27:49.627546 46712 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0712 20:27:49.635182 46712 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.635206 46712 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc0001db560 4 D0712 20:27:49.635222 46712 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0712 20:27:49.636674 46712 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.636755 46712 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc0001db560 5 D0712 20:27:49.636906 46712 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0712 20:27:49.637016 46712 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.637036 46712 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc0001db560 6 D0712 20:27:49.637046 46712 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0712 20:27:49.637477 46712 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.637495 46712 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc0001db560 7 D0712 20:27:49.637501 46712 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0712 20:27:49.637702 46712 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.637747 46712 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc0001db560 8 D0712 20:27:49.637764 46712 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0712 20:27:49.638056 46712 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.638097 46712 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc0001db560 9 D0712 20:27:49.638111 46712 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0712 20:27:49.638186 46712 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.638220 46712 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc0001db560 10 D0712 20:27:49.638229 46712 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0712 20:27:49.639185 46712 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.639209 46712 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc0001db560 11 D0712 20:27:49.639219 46712 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0712 20:27:49.639240 46712 usertrap_amd64.go:212] [ 1111: 1112] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.639249 46712 usertrap_amd64.go:122] [ 1111: 1112] Allocate a new trap: 0xc0001db560 12 D0712 20:27:49.639257 46712 usertrap_amd64.go:225] [ 1111: 1112] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0712 20:27:49.639313 46712 task_signals.go:470] [ 1111: 1111] Notified of signal 23 D0712 20:27:49.639498 46712 task_signals.go:220] [ 1111: 1111] Signal 23: delivering to handler D0712 20:27:49.646443 46712 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.646472 46712 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc0001db560 13 D0712 20:27:49.646485 46712 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0712 20:27:49.650560 46712 task_signals.go:470] [ 1111: 1111] Notified of signal 23 D0712 20:27:49.650653 46712 task_signals.go:220] [ 1111: 1111] Signal 23: delivering to handler D0712 20:27:49.650736 46712 task_signals.go:470] [ 1111: 1111] Notified of signal 23 D0712 20:27:49.650777 46712 task_signals.go:220] [ 1111: 1111] Signal 23: delivering to handler D0712 20:27:49.658547 46712 usertrap_amd64.go:212] [ 1111: 1111] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.658581 46712 usertrap_amd64.go:122] [ 1111: 1111] Allocate a new trap: 0xc0001db560 14 D0712 20:27:49.658592 46712 usertrap_amd64.go:225] [ 1111: 1111] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0712 20:27:49.658656 46712 task_exit.go:204] [ 1111: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.658691 46712 task_exit.go:204] [ 1111: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.658714 46712 task_signals.go:204] [ 1111: 1114] Signal 1111, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.658710 46712 task_signals.go:204] [ 1111: 1112] Signal 1111, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.658733 46712 task_exit.go:204] [ 1111: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.658759 46712 task_signals.go:204] [ 1111: 1113] Signal 1111, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.658774 46712 task_signals.go:204] [ 1111: 1115] Signal 1111, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.658802 46712 task_exit.go:204] [ 1111: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.658813 46712 task_exit.go:204] [ 1111: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.658819 46712 task_exit.go:204] [ 1111: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.658833 46712 task_exit.go:204] [ 1111: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.658845 46712 task_exit.go:204] [ 1111: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.658853 46712 task_exit.go:204] [ 1111: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.658858 46712 task_exit.go:204] [ 1111: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.658862 46712 task_exit.go:204] [ 1111: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.658869 46712 task_exit.go:204] [ 1111: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.660362 46712 task_exit.go:204] [ 1111: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.660382 46712 task_exit.go:204] [ 1111: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.660392 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.660450 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.660466 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.660551 46712 task_exit.go:204] [ 1111: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.661451 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.662915 46712 syscalls.go:262] [ 1116: 1116] Allocating stack with size of 8388608 bytes D0712 20:27:49.663003 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.664320 46712 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.664359 46712 usertrap_amd64.go:106] [ 1116: 1116] Map a usertrap vma at 62000 D0712 20:27:49.664542 46712 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc001bf4480 1 D0712 20:27:49.664584 46712 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:27:49.665170 46712 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.665221 46712 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc001bf4480 2 D0712 20:27:49.665237 46712 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:27:49.666185 46712 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.666215 46712 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc001bf4480 3 D0712 20:27:49.666226 46712 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:27:49.672465 46712 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.672491 46712 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc001bf4480 4 D0712 20:27:49.672501 46712 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:27:49.673670 46712 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.673696 46712 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc001bf4480 5 D0712 20:27:49.673705 46712 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:27:49.673759 46712 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.673779 46712 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc001bf4480 6 D0712 20:27:49.673786 46712 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:27:49.673983 46712 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.674002 46712 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc001bf4480 7 D0712 20:27:49.674010 46712 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:27:49.674181 46712 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.674197 46712 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc001bf4480 8 D0712 20:27:49.674205 46712 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:27:49.674346 46712 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.674372 46712 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc001bf4480 9 D0712 20:27:49.674383 46712 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:27:49.674535 46712 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.674558 46712 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc001bf4480 10 D0712 20:27:49.674568 46712 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:27:49.683219 46712 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.683255 46712 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc001bf4480 11 D0712 20:27:49.683270 46712 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:27:49.685996 46712 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.686032 46712 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc001bf4480 12 D0712 20:27:49.686046 46712 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:27:49.686125 46712 usertrap_amd64.go:212] [ 1116: 1117] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.686155 46712 usertrap_amd64.go:122] [ 1116: 1117] Allocate a new trap: 0xc001bf4480 13 D0712 20:27:49.686174 46712 usertrap_amd64.go:225] [ 1116: 1117] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:27:49.686198 46712 task_signals.go:470] [ 1116: 1116] Notified of signal 23 D0712 20:27:49.686284 46712 task_signals.go:220] [ 1116: 1116] Signal 23: delivering to handler D0712 20:27:49.694602 46712 usertrap_amd64.go:212] [ 1116: 1116] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.694622 46712 usertrap_amd64.go:122] [ 1116: 1116] Allocate a new trap: 0xc001bf4480 14 D0712 20:27:49.694633 46712 usertrap_amd64.go:225] [ 1116: 1116] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:27:49.694684 46712 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.694710 46712 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.694735 46712 task_signals.go:204] [ 1116: 1119] Signal 1116, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.694736 46712 task_signals.go:204] [ 1116: 1118] Signal 1116, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.694809 46712 task_signals.go:204] [ 1116: 1120] Signal 1116, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.694837 46712 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.694855 46712 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.694861 46712 task_exit.go:204] [ 1116: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.694874 46712 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.694882 46712 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.694892 46712 task_exit.go:204] [ 1116: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.694906 46712 task_signals.go:204] [ 1116: 1117] Signal 1116, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.694917 46712 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.694925 46712 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.694942 46712 task_exit.go:204] [ 1116: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.694952 46712 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.696494 46712 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.696578 46712 task_exit.go:204] [ 1116: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.696596 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.696627 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.696653 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.696738 46712 task_exit.go:204] [ 1116: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.697745 46712 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.699255 46712 syscalls.go:262] [ 1121: 1121] Allocating stack with size of 8388608 bytes D0712 20:27:49.699413 46712 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.700869 46712 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.700906 46712 usertrap_amd64.go:106] [ 1121: 1121] Map a usertrap vma at 63000 D0712 20:27:49.701013 46712 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc0018317d0 1 D0712 20:27:49.701039 46712 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:49.701544 46712 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.701567 46712 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc0018317d0 2 D0712 20:27:49.701576 46712 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:49.702020 46712 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.702042 46712 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc0018317d0 3 D0712 20:27:49.702048 46712 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:49.707201 46712 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.707226 46712 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc0018317d0 4 D0712 20:27:49.707234 46712 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:49.708530 46712 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.708556 46712 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc0018317d0 5 D0712 20:27:49.708567 46712 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:49.708629 46712 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.708645 46712 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc0018317d0 6 D0712 20:27:49.708653 46712 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:49.708935 46712 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.709004 46712 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc0018317d0 7 D0712 20:27:49.709030 46712 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:49.709182 46712 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.709204 46712 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc0018317d0 8 D0712 20:27:49.709213 46712 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:49.709358 46712 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:49.709382 46712 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc0018317d0 9 D0712 20:27:49.709392 46712 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b6e0 trap addr 632d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:49.709585 46712 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.709611 46712 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc0018317d0 10 D0712 20:27:49.709621 46712 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:49.709643 46712 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.709661 46712 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc0018317d0 11 D0712 20:27:49.709717 46712 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46af76 trap addr 63370 ([184 35 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:49.710100 46712 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.710127 46712 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc0018317d0 12 D0712 20:27:49.710137 46712 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:49.710174 46712 usertrap_amd64.go:212] [ 1121: 1122] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.710183 46712 usertrap_amd64.go:122] [ 1121: 1122] Allocate a new trap: 0xc0018317d0 13 D0712 20:27:49.710190 46712 usertrap_amd64.go:225] [ 1121: 1122] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:49.710207 46712 task_signals.go:470] [ 1121: 1121] Notified of signal 23 D0712 20:27:49.711227 46712 task_signals.go:220] [ 1121: 1121] Signal 23: delivering to handler D0712 20:27:49.718021 46712 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.718052 46712 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc0018317d0 14 D0712 20:27:49.718063 46712 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46af29 trap addr 63460 ([184 37 1 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:49.721411 46712 task_signals.go:470] [ 1121: 1121] Notified of signal 23 D0712 20:27:49.721452 46712 task_signals.go:220] [ 1121: 1121] Signal 23: delivering to handler D0712 20:27:49.729026 46712 usertrap_amd64.go:212] [ 1121: 1121] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.729079 46712 usertrap_amd64.go:122] [ 1121: 1121] Allocate a new trap: 0xc0018317d0 15 D0712 20:27:49.729100 46712 usertrap_amd64.go:225] [ 1121: 1121] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0712 20:27:49.729181 46712 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.729213 46712 task_signals.go:204] [ 1121: 1124] Signal 1121, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.729221 46712 task_signals.go:204] [ 1121: 1125] Signal 1121, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.729253 46712 task_signals.go:204] [ 1121: 1122] Signal 1121, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.729263 46712 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.729290 46712 task_signals.go:204] [ 1121: 1123] Signal 1121, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.729297 46712 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.729314 46712 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.729328 46712 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.729342 46712 task_exit.go:204] [ 1121: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.729360 46712 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.729375 46712 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.729378 46712 task_exit.go:204] [ 1121: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.729387 46712 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.729397 46712 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.729401 46712 task_exit.go:204] [ 1121: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.730664 46712 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.730700 46712 task_exit.go:204] [ 1121: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.730713 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.730768 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.730795 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.730926 46712 task_exit.go:204] [ 1121: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.731515 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.732928 46712 syscalls.go:262] [ 1126: 1126] Allocating stack with size of 8388608 bytes D0712 20:27:49.733067 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.733969 46712 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.734005 46712 usertrap_amd64.go:106] [ 1126: 1126] Map a usertrap vma at 66000 D0712 20:27:49.734129 46712 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0008b1ef0 1 D0712 20:27:49.734159 46712 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:49.734454 46712 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.734478 46712 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0008b1ef0 2 D0712 20:27:49.734489 46712 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:49.735053 46712 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.735080 46712 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0008b1ef0 3 D0712 20:27:49.735090 46712 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:49.741358 46712 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.741437 46712 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0008b1ef0 4 D0712 20:27:49.741448 46712 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:49.742963 46712 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.743023 46712 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0008b1ef0 5 D0712 20:27:49.743040 46712 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:49.743104 46712 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.743124 46712 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0008b1ef0 6 D0712 20:27:49.743129 46712 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:49.743480 46712 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.743502 46712 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0008b1ef0 7 D0712 20:27:49.743511 46712 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:49.743746 46712 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.743806 46712 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc0008b1ef0 8 D0712 20:27:49.743824 46712 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:49.744129 46712 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.744159 46712 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc0008b1ef0 9 D0712 20:27:49.744170 46712 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:49.744226 46712 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.744246 46712 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0008b1ef0 10 D0712 20:27:49.744253 46712 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:49.752447 46712 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.752473 46712 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0008b1ef0 11 D0712 20:27:49.752482 46712 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:49.754863 46712 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.754888 46712 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc0008b1ef0 12 D0712 20:27:49.754895 46712 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:49.754934 46712 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.754939 46712 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc0008b1ef0 13 D0712 20:27:49.754944 46712 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:49.754970 46712 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0712 20:27:49.755025 46712 task_signals.go:220] [ 1126: 1126] Signal 23: delivering to handler D0712 20:27:49.763279 46712 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.763314 46712 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0008b1ef0 14 D0712 20:27:49.763327 46712 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:49.763392 46712 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.763434 46712 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.763436 46712 task_signals.go:204] [ 1126: 1128] Signal 1126, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.763457 46712 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.763458 46712 task_signals.go:204] [ 1126: 1129] Signal 1126, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.763466 46712 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.763472 46712 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.763491 46712 task_signals.go:204] [ 1126: 1130] Signal 1126, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.763524 46712 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.763531 46712 task_signals.go:204] [ 1126: 1127] Signal 1126, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.763543 46712 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.763549 46712 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.763560 46712 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.763566 46712 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.763570 46712 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.763578 46712 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.765068 46712 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.765136 46712 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.765159 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.765191 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.765205 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.765326 46712 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.765947 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.767355 46712 syscalls.go:262] [ 1131: 1131] Allocating stack with size of 8388608 bytes D0712 20:27:49.767495 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.768527 46712 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.768553 46712 usertrap_amd64.go:106] [ 1131: 1131] Map a usertrap vma at 64000 D0712 20:27:49.768628 46712 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc0001dbdd0 1 D0712 20:27:49.768651 46712 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:27:49.768908 46712 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.768925 46712 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc0001dbdd0 2 D0712 20:27:49.768931 46712 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:27:49.769747 46712 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.769780 46712 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc0001dbdd0 3 D0712 20:27:49.769792 46712 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:27:49.777555 46712 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.777589 46712 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc0001dbdd0 4 D0712 20:27:49.777603 46712 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:27:49.781761 46712 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.781804 46712 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc0001dbdd0 5 D0712 20:27:49.781817 46712 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:27:49.781880 46712 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.781887 46712 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc0001dbdd0 6 D0712 20:27:49.781892 46712 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:27:49.782243 46712 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.782258 46712 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc0001dbdd0 7 D0712 20:27:49.782263 46712 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:27:49.782452 46712 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.782469 46712 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc0001dbdd0 8 D0712 20:27:49.782478 46712 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:27:49.782697 46712 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:49.782715 46712 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc0001dbdd0 9 D0712 20:27:49.782724 46712 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b6e0 trap addr 642d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:27:49.782736 46712 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.782751 46712 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc0001dbdd0 10 D0712 20:27:49.782759 46712 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:27:49.782856 46712 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.782872 46712 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc0001dbdd0 11 D0712 20:27:49.782880 46712 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46af76 trap addr 64370 ([184 35 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:27:49.816205 46712 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.817836 46712 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc0001dbdd0 12 D0712 20:27:49.818253 46712 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:27:49.820866 46712 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.821000 46712 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc0001dbdd0 13 D0712 20:27:49.821038 46712 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b020 trap addr 64410 ([184 39 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:27:49.821260 46712 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.821290 46712 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc0001dbdd0 14 D0712 20:27:49.821307 46712 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b04f trap addr 64460 ([184 234 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:27:49.821664 46712 task_signals.go:470] [ 1131: 1131] Notified of signal 23 D0712 20:27:49.822069 46712 task_signals.go:220] [ 1131: 1131] Signal 23: delivering to handler D0712 20:27:49.833211 46712 task_signals.go:470] [ 1131: 1131] Notified of signal 23 D0712 20:27:49.833340 46712 task_signals.go:220] [ 1131: 1131] Signal 23: delivering to handler I0712 20:27:49.833712 46712 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0712 20:27:49.833820 46712 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.833847 46712 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc0001dbdd0 15 D0712 20:27:49.833868 46712 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0712 20:27:49.833961 46712 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.833983 46712 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.834009 46712 task_signals.go:204] [ 1131: 1134] Signal 1131, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.834020 46712 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.834025 46712 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.834029 46712 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.834048 46712 task_signals.go:204] [ 1131: 1135] Signal 1131, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.834059 46712 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.834066 46712 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.834028 46712 task_signals.go:204] [ 1131: 1133] Signal 1131, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.834092 46712 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.834091 46712 task_signals.go:204] [ 1131: 1132] Signal 1131, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.834109 46712 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.834154 46712 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.834188 46712 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.834211 46712 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.835893 46712 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.835930 46712 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.835953 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.836019 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.836065 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.836134 46712 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.836840 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.838665 46712 syscalls.go:262] [ 1136: 1136] Allocating stack with size of 8388608 bytes D0712 20:27:49.838829 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.841372 46712 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.841426 46712 usertrap_amd64.go:106] [ 1136: 1136] Map a usertrap vma at 65000 D0712 20:27:49.841524 46712 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0008b00c0 1 D0712 20:27:49.841544 46712 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:27:49.841972 46712 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.841990 46712 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0008b00c0 2 D0712 20:27:49.841996 46712 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:27:49.846089 46712 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.846118 46712 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0008b00c0 3 D0712 20:27:49.846130 46712 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:27:49.852251 46712 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.852286 46712 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0008b00c0 4 D0712 20:27:49.852298 46712 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:27:49.853349 46712 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.853375 46712 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0008b00c0 5 D0712 20:27:49.853383 46712 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:27:49.853412 46712 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.853416 46712 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0008b00c0 6 D0712 20:27:49.853427 46712 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:27:49.853648 46712 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.853669 46712 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0008b00c0 7 D0712 20:27:49.853675 46712 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:27:49.853807 46712 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.853820 46712 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc0008b00c0 8 D0712 20:27:49.853835 46712 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:27:49.853978 46712 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.853992 46712 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc0008b00c0 9 D0712 20:27:49.853997 46712 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:27:49.854083 46712 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.854104 46712 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0008b00c0 10 D0712 20:27:49.854113 46712 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:27:49.857774 46712 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.857804 46712 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc0008b00c0 11 D0712 20:27:49.857814 46712 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:27:49.857829 46712 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.857834 46712 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc0008b00c0 12 D0712 20:27:49.857839 46712 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:27:49.857853 46712 task_signals.go:470] [ 1136: 1136] Notified of signal 23 D0712 20:27:49.857945 46712 task_signals.go:220] [ 1136: 1136] Signal 23: delivering to handler D0712 20:27:49.861638 46712 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.861711 46712 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0008b00c0 13 D0712 20:27:49.861735 46712 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:27:49.869942 46712 task_signals.go:470] [ 1136: 1136] Notified of signal 23 D0712 20:27:49.871128 46712 task_signals.go:220] [ 1136: 1136] Signal 23: delivering to handler D0712 20:27:49.871264 46712 task_signals.go:470] [ 1136: 1136] Notified of signal 23 D0712 20:27:49.871291 46712 task_signals.go:220] [ 1136: 1136] Signal 23: delivering to handler D0712 20:27:49.871616 46712 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.871630 46712 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc0008b00c0 14 D0712 20:27:49.871640 46712 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:27:49.871657 46712 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.871673 46712 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.871716 46712 task_signals.go:204] [ 1136: 1139] Signal 1136, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.871738 46712 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.871785 46712 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.871790 46712 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.871803 46712 task_signals.go:204] [ 1136: 1138] Signal 1136, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.871847 46712 task_signals.go:204] [ 1136: 1140] Signal 1136, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.871857 46712 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.871875 46712 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.871882 46712 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.871826 46712 task_signals.go:204] [ 1136: 1137] Signal 1136, PID: 1137, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.871906 46712 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.871918 46712 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.871922 46712 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.871940 46712 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.873324 46712 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.873357 46712 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.873369 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.873429 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.873442 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.873627 46712 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.874252 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.875936 46712 syscalls.go:262] [ 1141: 1141] Allocating stack with size of 8388608 bytes D0712 20:27:49.876468 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.883919 46712 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.883977 46712 usertrap_amd64.go:106] [ 1141: 1141] Map a usertrap vma at 6a000 D0712 20:27:49.884050 46712 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000e70240 1 D0712 20:27:49.884095 46712 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:27:49.887493 46712 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.887514 46712 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000e70240 2 D0712 20:27:49.887528 46712 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:27:49.897378 46712 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.897442 46712 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000e70240 3 D0712 20:27:49.897460 46712 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:27:49.907102 46712 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.907137 46712 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000e70240 4 D0712 20:27:49.907152 46712 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:27:49.908138 46712 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.908158 46712 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000e70240 5 D0712 20:27:49.908193 46712 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:27:49.908255 46712 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.908262 46712 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000e70240 6 D0712 20:27:49.908270 46712 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:27:49.908505 46712 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.908514 46712 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000e70240 7 D0712 20:27:49.908522 46712 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:27:49.908757 46712 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.908868 46712 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc000e70240 8 D0712 20:27:49.908933 46712 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:27:49.909301 46712 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.909385 46712 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc000e70240 9 D0712 20:27:49.909438 46712 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:27:49.909492 46712 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.909501 46712 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000e70240 10 D0712 20:27:49.909509 46712 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:27:49.909753 46712 usertrap_amd64.go:212] [ 1141: 1144] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:49.909794 46712 usertrap_amd64.go:122] [ 1141: 1144] Allocate a new trap: 0xc000e70240 11 D0712 20:27:49.909810 46712 usertrap_amd64.go:225] [ 1141: 1144] Apply the binary patch addr 46b6e0 trap addr 6a370 ([184 24 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:27:49.918079 46712 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.918128 46712 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000e70240 12 D0712 20:27:49.918148 46712 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:27:49.920821 46712 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.920854 46712 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc000e70240 13 D0712 20:27:49.920875 46712 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:27:49.921576 46712 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.921613 46712 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc000e70240 14 D0712 20:27:49.921627 46712 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0712 20:27:49.921744 46712 task_signals.go:470] [ 1141: 1141] Notified of signal 23 D0712 20:27:49.921899 46712 task_signals.go:220] [ 1141: 1141] Signal 23: delivering to handler D0712 20:27:49.932985 46712 task_signals.go:470] [ 1141: 1141] Notified of signal 23 D0712 20:27:49.934743 46712 task_signals.go:220] [ 1141: 1141] Signal 23: delivering to handler D0712 20:27:49.935001 46712 task_signals.go:481] [ 1141: 1141] No task notified of signal 23 D0712 20:27:49.935135 46712 task_signals.go:220] [ 1141: 1141] Signal 23: delivering to handler D0712 20:27:49.935643 46712 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.935677 46712 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc000e70240 15 D0712 20:27:49.935694 46712 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0712 20:27:49.935744 46712 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.935778 46712 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.935815 46712 task_signals.go:204] [ 1141: 1142] Signal 1141, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.935845 46712 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.935854 46712 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.935859 46712 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.935875 46712 task_signals.go:204] [ 1141: 1143] Signal 1141, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.935882 46712 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.935889 46712 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.935894 46712 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.935908 46712 task_signals.go:204] [ 1141: 1144] Signal 1141, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.935926 46712 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.935934 46712 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.935940 46712 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.935966 46712 task_signals.go:204] [ 1141: 1145] Signal 1141, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.935998 46712 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.937639 46712 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.938257 46712 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.938375 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.938524 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.938657 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.938802 46712 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.939954 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.941522 46712 syscalls.go:262] [ 1146: 1146] Allocating stack with size of 8388608 bytes D0712 20:27:49.941682 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.942391 46712 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.942443 46712 usertrap_amd64.go:106] [ 1146: 1146] Map a usertrap vma at 62000 D0712 20:27:49.942512 46712 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000a9e420 1 D0712 20:27:49.942537 46712 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0712 20:27:49.942966 46712 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.942990 46712 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000a9e420 2 D0712 20:27:49.943000 46712 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0712 20:27:49.943623 46712 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.943642 46712 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000a9e420 3 D0712 20:27:49.943670 46712 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0712 20:27:49.953226 46712 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.953268 46712 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000a9e420 4 D0712 20:27:49.953278 46712 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0712 20:27:49.954396 46712 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.954427 46712 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000a9e420 5 D0712 20:27:49.954440 46712 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0712 20:27:49.954473 46712 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.954482 46712 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000a9e420 6 D0712 20:27:49.954500 46712 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0712 20:27:49.954744 46712 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.954773 46712 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000a9e420 7 D0712 20:27:49.954784 46712 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0712 20:27:49.954952 46712 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.954983 46712 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc000a9e420 8 D0712 20:27:49.954995 46712 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0712 20:27:49.955256 46712 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.955310 46712 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000a9e420 9 D0712 20:27:49.955327 46712 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0712 20:27:49.955374 46712 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.955389 46712 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc000a9e420 10 D0712 20:27:49.955395 46712 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0712 20:27:49.964283 46712 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46af29:sysno 293 D0712 20:27:49.964324 46712 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000a9e420 11 D0712 20:27:49.964338 46712 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0712 20:27:49.966837 46712 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b020:sysno 39 D0712 20:27:49.966873 46712 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc000a9e420 12 D0712 20:27:49.966889 46712 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0712 20:27:49.966937 46712 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:49.966968 46712 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc000a9e420 13 D0712 20:27:49.967009 46712 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0712 20:27:49.967061 46712 task_signals.go:470] [ 1146: 1146] Notified of signal 23 D0712 20:27:49.967138 46712 task_signals.go:220] [ 1146: 1146] Signal 23: delivering to handler D0712 20:27:49.975987 46712 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:49.976034 46712 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc000a9e420 14 D0712 20:27:49.976049 46712 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0712 20:27:49.976097 46712 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.976127 46712 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.976162 46712 task_signals.go:204] [ 1146: 1147] Signal 1146, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.976189 46712 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.976198 46712 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.976205 46712 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.976226 46712 task_signals.go:204] [ 1146: 1148] Signal 1146, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.976241 46712 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.976249 46712 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.976254 46712 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.976270 46712 task_signals.go:204] [ 1146: 1149] Signal 1146, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.976280 46712 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.976286 46712 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.976292 46712 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.976306 46712 task_signals.go:204] [ 1146: 1150] Signal 1146, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:49.976327 46712 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:49.978531 46712 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:49.978570 46712 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.978593 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:49.978624 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:49.978643 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:49.978708 46712 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:49.979616 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.980893 46712 syscalls.go:262] [ 1151: 1151] Allocating stack with size of 8388608 bytes D0712 20:27:49.981065 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:49.983170 46712 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:49.983219 46712 usertrap_amd64.go:106] [ 1151: 1151] Map a usertrap vma at 60000 D0712 20:27:49.983596 46712 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000a9e510 1 D0712 20:27:49.983630 46712 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0712 20:27:49.984041 46712 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:49.984074 46712 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000a9e510 2 D0712 20:27:49.984085 46712 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0712 20:27:49.984677 46712 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:49.984699 46712 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000a9e510 3 D0712 20:27:49.984707 46712 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0712 20:27:49.991763 46712 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:49.991812 46712 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000a9e510 4 D0712 20:27:49.991827 46712 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0712 20:27:49.993211 46712 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:49.993241 46712 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000a9e510 5 D0712 20:27:49.993253 46712 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0712 20:27:49.993934 46712 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b214:sysno 13 D0712 20:27:49.993958 46712 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000a9e510 6 D0712 20:27:49.993968 46712 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0712 20:27:49.994456 46712 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:49.994480 46712 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000a9e510 7 D0712 20:27:49.994496 46712 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0712 20:27:49.994676 46712 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:49.994692 46712 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc000a9e510 8 D0712 20:27:49.994700 46712 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0712 20:27:49.994983 46712 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46af76:sysno 35 D0712 20:27:49.994996 46712 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc000a9e510 9 D0712 20:27:49.995004 46712 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0712 20:27:49.995038 46712 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:49.995046 46712 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000a9e510 10 D0712 20:27:49.995054 46712 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0712 20:27:50.003788 46712 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46af29:sysno 293 D0712 20:27:50.003828 46712 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000a9e510 11 D0712 20:27:50.003842 46712 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0712 20:27:50.006612 46712 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46b020:sysno 39 D0712 20:27:50.006641 46712 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc000a9e510 12 D0712 20:27:50.006655 46712 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0712 20:27:50.006684 46712 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:50.006701 46712 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc000a9e510 13 D0712 20:27:50.006710 46712 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0712 20:27:50.006731 46712 task_signals.go:470] [ 1151: 1151] Notified of signal 23 D0712 20:27:50.006784 46712 task_signals.go:220] [ 1151: 1151] Signal 23: delivering to handler D0712 20:27:50.014176 46712 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:50.014211 46712 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc000a9e510 14 D0712 20:27:50.014223 46712 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0712 20:27:50.014301 46712 task_exit.go:204] [ 1151: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.014331 46712 task_exit.go:204] [ 1151: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.014355 46712 task_signals.go:204] [ 1151: 1154] Signal 1151, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.014348 46712 task_signals.go:204] [ 1151: 1152] Signal 1151, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.014372 46712 task_exit.go:204] [ 1151: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.014370 46712 task_signals.go:204] [ 1151: 1155] Signal 1151, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.014384 46712 task_signals.go:204] [ 1151: 1153] Signal 1151, PID: 1153, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.014398 46712 task_exit.go:204] [ 1151: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.014416 46712 task_exit.go:204] [ 1151: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.014431 46712 task_exit.go:204] [ 1151: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.014444 46712 task_exit.go:204] [ 1151: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.014449 46712 task_exit.go:204] [ 1151: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.014456 46712 task_exit.go:204] [ 1151: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.014463 46712 task_exit.go:204] [ 1151: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.014469 46712 task_exit.go:204] [ 1151: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.014478 46712 task_exit.go:204] [ 1151: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.015779 46712 task_exit.go:204] [ 1151: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.015807 46712 task_exit.go:204] [ 1151: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.015827 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:50.015859 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:50.015868 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:50.016055 46712 task_exit.go:204] [ 1151: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.016576 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.018076 46712 syscalls.go:262] [ 1156: 1156] Allocating stack with size of 8388608 bytes D0712 20:27:50.018285 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.019299 46712 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:50.019386 46712 usertrap_amd64.go:106] [ 1156: 1156] Map a usertrap vma at 66000 D0712 20:27:50.019556 46712 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001830990 1 D0712 20:27:50.019589 46712 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0712 20:27:50.019788 46712 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:50.019821 46712 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001830990 2 D0712 20:27:50.019830 46712 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0712 20:27:50.020539 46712 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:50.020562 46712 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001830990 3 D0712 20:27:50.020570 46712 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0712 20:27:50.025947 46712 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:50.025988 46712 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001830990 4 D0712 20:27:50.026003 46712 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0712 20:27:50.027043 46712 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:50.027069 46712 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001830990 5 D0712 20:27:50.027081 46712 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0712 20:27:50.027115 46712 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46b214:sysno 13 D0712 20:27:50.027136 46712 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001830990 6 D0712 20:27:50.027144 46712 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0712 20:27:50.027364 46712 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:50.027384 46712 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001830990 7 D0712 20:27:50.027391 46712 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0712 20:27:50.027578 46712 usertrap_amd64.go:212] [ 1156: 1157] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:50.027600 46712 usertrap_amd64.go:122] [ 1156: 1157] Allocate a new trap: 0xc001830990 8 D0712 20:27:50.027610 46712 usertrap_amd64.go:225] [ 1156: 1157] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0712 20:27:50.028002 46712 usertrap_amd64.go:212] [ 1156: 1157] Found the pattern at ip 46af76:sysno 35 D0712 20:27:50.028031 46712 usertrap_amd64.go:122] [ 1156: 1157] Allocate a new trap: 0xc001830990 9 D0712 20:27:50.028046 46712 usertrap_amd64.go:225] [ 1156: 1157] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0712 20:27:50.028183 46712 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:50.028206 46712 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001830990 10 D0712 20:27:50.028217 46712 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0712 20:27:50.035711 46712 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46af29:sysno 293 D0712 20:27:50.035736 46712 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001830990 11 D0712 20:27:50.035746 46712 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0712 20:27:50.038895 46712 usertrap_amd64.go:212] [ 1156: 1157] Found the pattern at ip 46b020:sysno 39 D0712 20:27:50.038931 46712 usertrap_amd64.go:122] [ 1156: 1157] Allocate a new trap: 0xc001830990 12 D0712 20:27:50.038945 46712 usertrap_amd64.go:225] [ 1156: 1157] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0712 20:27:50.039017 46712 usertrap_amd64.go:212] [ 1156: 1157] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:50.039027 46712 usertrap_amd64.go:122] [ 1156: 1157] Allocate a new trap: 0xc001830990 13 D0712 20:27:50.039035 46712 usertrap_amd64.go:225] [ 1156: 1157] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0712 20:27:50.039104 46712 task_signals.go:470] [ 1156: 1156] Notified of signal 23 D0712 20:27:50.039211 46712 task_signals.go:220] [ 1156: 1156] Signal 23: delivering to handler D0712 20:27:50.047215 46712 usertrap_amd64.go:212] [ 1156: 1156] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:50.047251 46712 usertrap_amd64.go:122] [ 1156: 1156] Allocate a new trap: 0xc001830990 14 D0712 20:27:50.047271 46712 usertrap_amd64.go:225] [ 1156: 1156] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0712 20:27:50.047343 46712 task_exit.go:204] [ 1156: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.047406 46712 task_signals.go:204] [ 1156: 1159] Signal 1156, PID: 1159, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.047457 46712 task_signals.go:204] [ 1156: 1158] Signal 1156, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.047470 46712 task_exit.go:204] [ 1156: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.047489 46712 task_signals.go:204] [ 1156: 1157] Signal 1156, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.047488 46712 task_signals.go:204] [ 1156: 1160] Signal 1156, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.047502 46712 task_exit.go:204] [ 1156: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.047514 46712 task_exit.go:204] [ 1156: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.047523 46712 task_exit.go:204] [ 1156: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.047535 46712 task_exit.go:204] [ 1156: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.047549 46712 task_exit.go:204] [ 1156: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.047562 46712 task_exit.go:204] [ 1156: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.047571 46712 task_exit.go:204] [ 1156: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.047586 46712 task_exit.go:204] [ 1156: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.047591 46712 task_exit.go:204] [ 1156: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.047611 46712 task_exit.go:204] [ 1156: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.049059 46712 task_exit.go:204] [ 1156: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.049083 46712 task_exit.go:204] [ 1156: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.049096 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:50.049132 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:50.049156 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:50.049230 46712 task_exit.go:204] [ 1156: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.049361 46712 task_signals.go:470] [ 6: 14] Notified of signal 23 D0712 20:27:50.049463 46712 task_signals.go:220] [ 6: 14] Signal 23: delivering to handler D0712 20:27:50.050076 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.051524 46712 syscalls.go:262] [ 1161: 1161] Allocating stack with size of 8388608 bytes D0712 20:27:50.051721 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.053635 46712 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:50.053679 46712 usertrap_amd64.go:106] [ 1161: 1161] Map a usertrap vma at 69000 D0712 20:27:50.053761 46712 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000e70570 1 D0712 20:27:50.053800 46712 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:27:50.054241 46712 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:50.054292 46712 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000e70570 2 D0712 20:27:50.054307 46712 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:27:50.055059 46712 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:50.055086 46712 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000e70570 3 D0712 20:27:50.055098 46712 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:27:50.061861 46712 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:50.061897 46712 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000e70570 4 D0712 20:27:50.061938 46712 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:27:50.063019 46712 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:50.063044 46712 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000e70570 5 D0712 20:27:50.063057 46712 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:27:50.063269 46712 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b214:sysno 13 D0712 20:27:50.063319 46712 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000e70570 6 D0712 20:27:50.063338 46712 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:27:50.063729 46712 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:50.063756 46712 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000e70570 7 D0712 20:27:50.063768 46712 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:27:50.063955 46712 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:50.063979 46712 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc000e70570 8 D0712 20:27:50.063989 46712 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:27:50.064191 46712 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46af76:sysno 35 D0712 20:27:50.064215 46712 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc000e70570 9 D0712 20:27:50.064225 46712 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:27:50.064323 46712 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:50.064345 46712 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000e70570 10 D0712 20:27:50.064355 46712 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:27:50.064824 46712 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46b020:sysno 39 D0712 20:27:50.064894 46712 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc000e70570 11 D0712 20:27:50.064922 46712 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:27:50.065061 46712 usertrap_amd64.go:212] [ 1161: 1162] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:50.065102 46712 usertrap_amd64.go:122] [ 1161: 1162] Allocate a new trap: 0xc000e70570 12 D0712 20:27:50.065112 46712 usertrap_amd64.go:225] [ 1161: 1162] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:27:50.065147 46712 task_signals.go:470] [ 1161: 1161] Notified of signal 23 D0712 20:27:50.065169 46712 task_signals.go:220] [ 1161: 1161] Signal 23: delivering to handler D0712 20:27:50.071807 46712 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46af29:sysno 293 D0712 20:27:50.071845 46712 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000e70570 13 D0712 20:27:50.071861 46712 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:27:50.076259 46712 task_signals.go:470] [ 1161: 1161] Notified of signal 23 D0712 20:27:50.076325 46712 task_signals.go:220] [ 1161: 1161] Signal 23: delivering to handler D0712 20:27:50.083077 46712 sys_signal.go:495] [ 1161: 1161] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0712 20:27:50.083163 46712 usertrap_amd64.go:212] [ 1161: 1161] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:50.083177 46712 usertrap_amd64.go:122] [ 1161: 1161] Allocate a new trap: 0xc000e70570 14 D0712 20:27:50.083191 46712 usertrap_amd64.go:225] [ 1161: 1161] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:27:50.083264 46712 task_exit.go:204] [ 1161: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.083301 46712 task_exit.go:204] [ 1161: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.083330 46712 task_signals.go:204] [ 1161: 1162] Signal 1161, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.083357 46712 task_exit.go:204] [ 1161: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.083345 46712 task_signals.go:204] [ 1161: 1164] Signal 1161, PID: 1164, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.083366 46712 task_exit.go:204] [ 1161: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.083453 46712 task_exit.go:204] [ 1161: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.083524 46712 task_signals.go:204] [ 1161: 1165] Signal 1161, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.083554 46712 task_exit.go:204] [ 1161: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.083551 46712 task_signals.go:204] [ 1161: 1163] Signal 1161, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.083570 46712 task_exit.go:204] [ 1161: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.083590 46712 task_exit.go:204] [ 1161: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.083604 46712 task_exit.go:204] [ 1161: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.083628 46712 task_exit.go:204] [ 1161: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.083644 46712 task_exit.go:204] [ 1161: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.083655 46712 task_exit.go:204] [ 1161: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.085162 46712 task_exit.go:204] [ 1161: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.085196 46712 task_exit.go:204] [ 1161: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.085216 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:50.085273 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:50.085344 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:50.085373 46712 task_exit.go:204] [ 1161: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.086010 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.087303 46712 syscalls.go:262] [ 1166: 1166] Allocating stack with size of 8388608 bytes D0712 20:27:50.087433 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.088803 46712 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:50.088844 46712 usertrap_amd64.go:106] [ 1166: 1166] Map a usertrap vma at 61000 D0712 20:27:50.088922 46712 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc001bf4780 1 D0712 20:27:50.088991 46712 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0712 20:27:50.089388 46712 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:50.089430 46712 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc001bf4780 2 D0712 20:27:50.089449 46712 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0712 20:27:50.090302 46712 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:50.090332 46712 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc001bf4780 3 D0712 20:27:50.090344 46712 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0712 20:27:50.096699 46712 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:50.096730 46712 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc001bf4780 4 D0712 20:27:50.096739 46712 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0712 20:27:50.097849 46712 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:50.097876 46712 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc001bf4780 5 D0712 20:27:50.097886 46712 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0712 20:27:50.097926 46712 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46b214:sysno 13 D0712 20:27:50.097939 46712 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc001bf4780 6 D0712 20:27:50.097948 46712 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0712 20:27:50.098222 46712 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:50.098246 46712 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc001bf4780 7 D0712 20:27:50.098253 46712 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0712 20:27:50.098439 46712 usertrap_amd64.go:212] [ 1166: 1167] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:50.098461 46712 usertrap_amd64.go:122] [ 1166: 1167] Allocate a new trap: 0xc001bf4780 8 D0712 20:27:50.098471 46712 usertrap_amd64.go:225] [ 1166: 1167] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0712 20:27:50.098844 46712 usertrap_amd64.go:212] [ 1166: 1167] Found the pattern at ip 46af76:sysno 35 D0712 20:27:50.098868 46712 usertrap_amd64.go:122] [ 1166: 1167] Allocate a new trap: 0xc001bf4780 9 D0712 20:27:50.098877 46712 usertrap_amd64.go:225] [ 1166: 1167] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0712 20:27:50.098923 46712 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:50.098937 46712 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc001bf4780 10 D0712 20:27:50.098945 46712 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0712 20:27:50.106910 46712 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46af29:sysno 293 D0712 20:27:50.106961 46712 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc001bf4780 11 D0712 20:27:50.106978 46712 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0712 20:27:50.109562 46712 usertrap_amd64.go:212] [ 1166: 1167] Found the pattern at ip 46b020:sysno 39 D0712 20:27:50.109599 46712 usertrap_amd64.go:122] [ 1166: 1167] Allocate a new trap: 0xc001bf4780 12 D0712 20:27:50.109615 46712 usertrap_amd64.go:225] [ 1166: 1167] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0712 20:27:50.109635 46712 usertrap_amd64.go:212] [ 1166: 1167] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:50.109642 46712 usertrap_amd64.go:122] [ 1166: 1167] Allocate a new trap: 0xc001bf4780 13 D0712 20:27:50.109651 46712 usertrap_amd64.go:225] [ 1166: 1167] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0712 20:27:50.109672 46712 task_signals.go:470] [ 1166: 1166] Notified of signal 23 D0712 20:27:50.109746 46712 task_signals.go:220] [ 1166: 1166] Signal 23: delivering to handler D0712 20:27:50.117722 46712 usertrap_amd64.go:212] [ 1166: 1166] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:50.117758 46712 usertrap_amd64.go:122] [ 1166: 1166] Allocate a new trap: 0xc001bf4780 14 D0712 20:27:50.117773 46712 usertrap_amd64.go:225] [ 1166: 1166] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0712 20:27:50.117839 46712 task_exit.go:204] [ 1166: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.117874 46712 task_exit.go:204] [ 1166: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.117921 46712 task_signals.go:204] [ 1166: 1167] Signal 1166, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.117941 46712 task_exit.go:204] [ 1166: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.117971 46712 task_exit.go:204] [ 1166: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.117978 46712 task_exit.go:204] [ 1166: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.117994 46712 task_signals.go:204] [ 1166: 1170] Signal 1166, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.118016 46712 task_exit.go:204] [ 1166: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.118024 46712 task_exit.go:204] [ 1166: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.118030 46712 task_exit.go:204] [ 1166: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.118012 46712 task_signals.go:204] [ 1166: 1169] Signal 1166, PID: 1169, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.118074 46712 task_signals.go:204] [ 1166: 1168] Signal 1166, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.118084 46712 task_exit.go:204] [ 1166: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.118112 46712 task_exit.go:204] [ 1166: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.118132 46712 task_exit.go:204] [ 1166: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.118174 46712 task_exit.go:204] [ 1166: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.119694 46712 task_exit.go:204] [ 1166: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.119732 46712 task_exit.go:204] [ 1166: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.119753 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:50.119783 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:50.119807 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:50.120095 46712 task_exit.go:204] [ 1166: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.120681 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.121961 46712 syscalls.go:262] [ 1171: 1171] Allocating stack with size of 8388608 bytes D0712 20:27:50.122078 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.123384 46712 usertrap_amd64.go:212] [ 1171: 1171] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:50.123431 46712 usertrap_amd64.go:106] [ 1171: 1171] Map a usertrap vma at 64000 D0712 20:27:50.123590 46712 usertrap_amd64.go:122] [ 1171: 1171] Allocate a new trap: 0xc000a9ecc0 1 D0712 20:27:50.123628 46712 usertrap_amd64.go:225] [ 1171: 1171] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0712 20:27:50.124532 46712 usertrap_amd64.go:212] [ 1171: 1171] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:50.124555 46712 usertrap_amd64.go:122] [ 1171: 1171] Allocate a new trap: 0xc000a9ecc0 2 D0712 20:27:50.124565 46712 usertrap_amd64.go:225] [ 1171: 1171] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0712 20:27:50.125229 46712 usertrap_amd64.go:212] [ 1171: 1171] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:50.125254 46712 usertrap_amd64.go:122] [ 1171: 1171] Allocate a new trap: 0xc000a9ecc0 3 D0712 20:27:50.125261 46712 usertrap_amd64.go:225] [ 1171: 1171] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0712 20:27:50.132251 46712 usertrap_amd64.go:212] [ 1171: 1171] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:50.132285 46712 usertrap_amd64.go:122] [ 1171: 1171] Allocate a new trap: 0xc000a9ecc0 4 D0712 20:27:50.132298 46712 usertrap_amd64.go:225] [ 1171: 1171] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0712 20:27:50.133494 46712 usertrap_amd64.go:212] [ 1171: 1171] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:50.133532 46712 usertrap_amd64.go:122] [ 1171: 1171] Allocate a new trap: 0xc000a9ecc0 5 D0712 20:27:50.133548 46712 usertrap_amd64.go:225] [ 1171: 1171] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0712 20:27:50.133613 46712 usertrap_amd64.go:212] [ 1171: 1171] Found the pattern at ip 46b214:sysno 13 D0712 20:27:50.133619 46712 usertrap_amd64.go:122] [ 1171: 1171] Allocate a new trap: 0xc000a9ecc0 6 D0712 20:27:50.133624 46712 usertrap_amd64.go:225] [ 1171: 1171] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0712 20:27:50.133976 46712 usertrap_amd64.go:212] [ 1171: 1171] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:50.133991 46712 usertrap_amd64.go:122] [ 1171: 1171] Allocate a new trap: 0xc000a9ecc0 7 D0712 20:27:50.133997 46712 usertrap_amd64.go:225] [ 1171: 1171] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0712 20:27:50.134175 46712 usertrap_amd64.go:212] [ 1171: 1172] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:50.134196 46712 usertrap_amd64.go:122] [ 1171: 1172] Allocate a new trap: 0xc000a9ecc0 8 D0712 20:27:50.134202 46712 usertrap_amd64.go:225] [ 1171: 1172] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0712 20:27:50.134387 46712 usertrap_amd64.go:212] [ 1171: 1172] Found the pattern at ip 46af76:sysno 35 D0712 20:27:50.134404 46712 usertrap_amd64.go:122] [ 1171: 1172] Allocate a new trap: 0xc000a9ecc0 9 D0712 20:27:50.134415 46712 usertrap_amd64.go:225] [ 1171: 1172] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0712 20:27:50.134488 46712 usertrap_amd64.go:212] [ 1171: 1171] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:50.134510 46712 usertrap_amd64.go:122] [ 1171: 1171] Allocate a new trap: 0xc000a9ecc0 10 D0712 20:27:50.134519 46712 usertrap_amd64.go:225] [ 1171: 1171] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0712 20:27:50.142662 46712 usertrap_amd64.go:212] [ 1171: 1171] Found the pattern at ip 46af29:sysno 293 D0712 20:27:50.142695 46712 usertrap_amd64.go:122] [ 1171: 1171] Allocate a new trap: 0xc000a9ecc0 11 D0712 20:27:50.142707 46712 usertrap_amd64.go:225] [ 1171: 1171] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0712 20:27:50.145567 46712 usertrap_amd64.go:212] [ 1171: 1172] Found the pattern at ip 46b020:sysno 39 D0712 20:27:50.145603 46712 usertrap_amd64.go:122] [ 1171: 1172] Allocate a new trap: 0xc000a9ecc0 12 D0712 20:27:50.145618 46712 usertrap_amd64.go:225] [ 1171: 1172] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0712 20:27:50.145712 46712 usertrap_amd64.go:212] [ 1171: 1172] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:50.145741 46712 usertrap_amd64.go:122] [ 1171: 1172] Allocate a new trap: 0xc000a9ecc0 13 D0712 20:27:50.145754 46712 usertrap_amd64.go:225] [ 1171: 1172] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0712 20:27:50.145835 46712 task_signals.go:470] [ 1171: 1171] Notified of signal 23 D0712 20:27:50.145939 46712 task_signals.go:220] [ 1171: 1171] Signal 23: delivering to handler D0712 20:27:50.153519 46712 usertrap_amd64.go:212] [ 1171: 1171] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:50.153563 46712 usertrap_amd64.go:122] [ 1171: 1171] Allocate a new trap: 0xc000a9ecc0 14 D0712 20:27:50.153578 46712 usertrap_amd64.go:225] [ 1171: 1171] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0712 20:27:50.153634 46712 task_exit.go:204] [ 1171: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.153670 46712 task_exit.go:204] [ 1171: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.153687 46712 task_signals.go:204] [ 1171: 1173] Signal 1171, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.153711 46712 task_signals.go:204] [ 1171: 1175] Signal 1171, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.153715 46712 task_exit.go:204] [ 1171: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.153731 46712 task_exit.go:204] [ 1171: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.153738 46712 task_exit.go:204] [ 1171: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.153696 46712 task_signals.go:204] [ 1171: 1174] Signal 1171, PID: 1174, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.153780 46712 task_exit.go:204] [ 1171: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.153794 46712 task_signals.go:204] [ 1171: 1172] Signal 1171, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.153808 46712 task_exit.go:204] [ 1171: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.153813 46712 task_exit.go:204] [ 1171: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.153822 46712 task_exit.go:204] [ 1171: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.153829 46712 task_exit.go:204] [ 1171: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.153834 46712 task_exit.go:204] [ 1171: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.153841 46712 task_exit.go:204] [ 1171: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.155334 46712 task_exit.go:204] [ 1171: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.155364 46712 task_exit.go:204] [ 1171: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.155407 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:50.155436 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:50.155447 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:50.155550 46712 task_exit.go:204] [ 1171: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.156097 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.157559 46712 syscalls.go:262] [ 1176: 1176] Allocating stack with size of 8388608 bytes D0712 20:27:50.157765 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.161097 46712 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:50.161162 46712 usertrap_amd64.go:106] [ 1176: 1176] Map a usertrap vma at 65000 D0712 20:27:50.161261 46712 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000a9ee10 1 D0712 20:27:50.161298 46712 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0712 20:27:50.161695 46712 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:50.161723 46712 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000a9ee10 2 D0712 20:27:50.161734 46712 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0712 20:27:50.162560 46712 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:50.162583 46712 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000a9ee10 3 D0712 20:27:50.162590 46712 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0712 20:27:50.169773 46712 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:50.169810 46712 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000a9ee10 4 D0712 20:27:50.169822 46712 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0712 20:27:50.171069 46712 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:50.171130 46712 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000a9ee10 5 D0712 20:27:50.171149 46712 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0712 20:27:50.171316 46712 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b214:sysno 13 D0712 20:27:50.171337 46712 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000a9ee10 6 D0712 20:27:50.171348 46712 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0712 20:27:50.171603 46712 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:50.171618 46712 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000a9ee10 7 D0712 20:27:50.171628 46712 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0712 20:27:50.171854 46712 usertrap_amd64.go:212] [ 1176: 1178] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:50.171873 46712 usertrap_amd64.go:122] [ 1176: 1178] Allocate a new trap: 0xc000a9ee10 8 D0712 20:27:50.171881 46712 usertrap_amd64.go:225] [ 1176: 1178] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0712 20:27:50.172016 46712 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:50.172047 46712 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000a9ee10 9 D0712 20:27:50.172059 46712 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0712 20:27:50.172227 46712 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46b6e0:sysno 24 D0712 20:27:50.172250 46712 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000a9ee10 10 D0712 20:27:50.172260 46712 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46b6e0 trap addr 65320 ([184 24 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0712 20:27:50.172493 46712 usertrap_amd64.go:212] [ 1176: 1177] Found the pattern at ip 46af76:sysno 35 D0712 20:27:50.172554 46712 usertrap_amd64.go:122] [ 1176: 1177] Allocate a new trap: 0xc000a9ee10 11 D0712 20:27:50.172591 46712 usertrap_amd64.go:225] [ 1176: 1177] Apply the binary patch addr 46af76 trap addr 65370 ([184 35 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0712 20:27:50.180018 46712 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46af29:sysno 293 D0712 20:27:50.180048 46712 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000a9ee10 12 D0712 20:27:50.180058 46712 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0712 20:27:50.182754 46712 usertrap_amd64.go:212] [ 1176: 1177] Found the pattern at ip 46b020:sysno 39 D0712 20:27:50.182799 46712 usertrap_amd64.go:122] [ 1176: 1177] Allocate a new trap: 0xc000a9ee10 13 D0712 20:27:50.182808 46712 usertrap_amd64.go:225] [ 1176: 1177] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0712 20:27:50.182869 46712 usertrap_amd64.go:212] [ 1176: 1177] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:50.182887 46712 usertrap_amd64.go:122] [ 1176: 1177] Allocate a new trap: 0xc000a9ee10 14 D0712 20:27:50.182894 46712 usertrap_amd64.go:225] [ 1176: 1177] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0712 20:27:50.182909 46712 task_signals.go:470] [ 1176: 1176] Notified of signal 23 D0712 20:27:50.183002 46712 task_signals.go:220] [ 1176: 1176] Signal 23: delivering to handler D0712 20:27:50.190296 46712 usertrap_amd64.go:212] [ 1176: 1176] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:50.190340 46712 usertrap_amd64.go:122] [ 1176: 1176] Allocate a new trap: 0xc000a9ee10 15 D0712 20:27:50.190353 46712 usertrap_amd64.go:225] [ 1176: 1176] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0712 20:27:50.190396 46712 task_exit.go:204] [ 1176: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.190423 46712 task_exit.go:204] [ 1176: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.190450 46712 task_signals.go:204] [ 1176: 1177] Signal 1176, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.190481 46712 task_exit.go:204] [ 1176: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.190490 46712 task_exit.go:204] [ 1176: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.190498 46712 task_exit.go:204] [ 1176: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.190524 46712 task_signals.go:204] [ 1176: 1178] Signal 1176, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.190549 46712 task_exit.go:204] [ 1176: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.190558 46712 task_exit.go:204] [ 1176: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.190528 46712 task_signals.go:204] [ 1176: 1180] Signal 1176, PID: 1180, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.190549 46712 task_signals.go:204] [ 1176: 1179] Signal 1176, PID: 1179, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.190565 46712 task_exit.go:204] [ 1176: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.190614 46712 task_exit.go:204] [ 1176: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.190647 46712 task_exit.go:204] [ 1176: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.190661 46712 task_exit.go:204] [ 1176: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.190671 46712 task_exit.go:204] [ 1176: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.192027 46712 task_exit.go:204] [ 1176: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.192060 46712 task_exit.go:204] [ 1176: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.192073 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:50.192104 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:50.192116 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:50.192266 46712 task_exit.go:204] [ 1176: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.192992 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.194402 46712 syscalls.go:262] [ 1181: 1181] Allocating stack with size of 8388608 bytes D0712 20:27:50.194595 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.201671 46712 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:50.201709 46712 usertrap_amd64.go:106] [ 1181: 1181] Map a usertrap vma at 69000 D0712 20:27:50.201817 46712 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0008b0bd0 1 D0712 20:27:50.201850 46712 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:27:50.202207 46712 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:50.202228 46712 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0008b0bd0 2 D0712 20:27:50.202246 46712 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:27:50.202705 46712 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:50.202727 46712 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0008b0bd0 3 D0712 20:27:50.202737 46712 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:27:50.208984 46712 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:50.209036 46712 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0008b0bd0 4 D0712 20:27:50.209050 46712 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:27:50.211075 46712 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:50.211106 46712 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0008b0bd0 5 D0712 20:27:50.211117 46712 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:27:50.211188 46712 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b214:sysno 13 D0712 20:27:50.211194 46712 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0008b0bd0 6 D0712 20:27:50.211199 46712 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:27:50.211605 46712 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:50.211631 46712 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0008b0bd0 7 D0712 20:27:50.211638 46712 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:27:50.212669 46712 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:50.212694 46712 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc0008b0bd0 8 D0712 20:27:50.212701 46712 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:27:50.212899 46712 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46af76:sysno 35 D0712 20:27:50.212924 46712 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc0008b0bd0 9 D0712 20:27:50.212935 46712 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:27:50.213201 46712 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:50.213230 46712 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0008b0bd0 10 D0712 20:27:50.213242 46712 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:27:50.220612 46712 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46af29:sysno 293 D0712 20:27:50.220641 46712 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0008b0bd0 11 D0712 20:27:50.220650 46712 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:27:50.226693 46712 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46b020:sysno 39 D0712 20:27:50.226719 46712 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc0008b0bd0 12 D0712 20:27:50.226728 46712 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:27:50.226888 46712 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:50.226913 46712 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc0008b0bd0 13 D0712 20:27:50.226927 46712 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:27:50.226991 46712 task_signals.go:470] [ 1181: 1181] Notified of signal 23 D0712 20:27:50.227186 46712 task_signals.go:220] [ 1181: 1181] Signal 23: delivering to handler D0712 20:27:50.237363 46712 task_signals.go:470] [ 1181: 1181] Notified of signal 23 D0712 20:27:50.237412 46712 task_signals.go:220] [ 1181: 1181] Signal 23: delivering to handler D0712 20:27:50.238123 46712 task_signals.go:470] [ 1181: 1181] Notified of signal 23 D0712 20:27:50.239347 46712 task_signals.go:220] [ 1181: 1181] Signal 23: delivering to handler D0712 20:27:50.243645 46712 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:50.243702 46712 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0008b0bd0 14 D0712 20:27:50.243718 46712 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:27:50.243789 46712 task_exit.go:204] [ 1181: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.243812 46712 task_exit.go:204] [ 1181: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.243839 46712 task_signals.go:204] [ 1181: 1182] Signal 1181, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.243852 46712 task_exit.go:204] [ 1181: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.243858 46712 task_exit.go:204] [ 1181: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.243861 46712 task_exit.go:204] [ 1181: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.243877 46712 task_signals.go:204] [ 1181: 1183] Signal 1181, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.243884 46712 task_exit.go:204] [ 1181: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.243888 46712 task_exit.go:204] [ 1181: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.243892 46712 task_exit.go:204] [ 1181: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.243914 46712 task_signals.go:204] [ 1181: 1184] Signal 1181, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.243921 46712 task_exit.go:204] [ 1181: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.243926 46712 task_exit.go:204] [ 1181: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.243929 46712 task_exit.go:204] [ 1181: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.243940 46712 task_signals.go:204] [ 1181: 1185] Signal 1181, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.243946 46712 task_exit.go:204] [ 1181: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.245653 46712 task_exit.go:204] [ 1181: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.245699 46712 task_exit.go:204] [ 1181: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.245717 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:50.245766 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:50.245810 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:50.245936 46712 task_exit.go:204] [ 1181: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.246690 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.248188 46712 syscalls.go:262] [ 1186: 1186] Allocating stack with size of 8388608 bytes D0712 20:27:50.248292 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.251663 46712 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:50.251711 46712 usertrap_amd64.go:106] [ 1186: 1186] Map a usertrap vma at 69000 D0712 20:27:50.251842 46712 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc001830f60 1 D0712 20:27:50.251871 46712 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0712 20:27:50.252130 46712 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:50.252151 46712 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc001830f60 2 D0712 20:27:50.252157 46712 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0712 20:27:50.252815 46712 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:50.252834 46712 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc001830f60 3 D0712 20:27:50.252841 46712 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0712 20:27:50.258864 46712 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:50.258894 46712 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc001830f60 4 D0712 20:27:50.258903 46712 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0712 20:27:50.259909 46712 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:50.259953 46712 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc001830f60 5 D0712 20:27:50.259962 46712 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0712 20:27:50.260012 46712 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b214:sysno 13 D0712 20:27:50.260023 46712 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc001830f60 6 D0712 20:27:50.260033 46712 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0712 20:27:50.260186 46712 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:50.260200 46712 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc001830f60 7 D0712 20:27:50.260205 46712 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0712 20:27:50.260345 46712 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:50.260366 46712 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc001830f60 8 D0712 20:27:50.260376 46712 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0712 20:27:50.260542 46712 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46af76:sysno 35 D0712 20:27:50.260563 46712 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc001830f60 9 D0712 20:27:50.260569 46712 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0712 20:27:50.260684 46712 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:50.260696 46712 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc001830f60 10 D0712 20:27:50.260705 46712 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0712 20:27:50.268077 46712 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46af29:sysno 293 D0712 20:27:50.268101 46712 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc001830f60 11 D0712 20:27:50.268110 46712 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0712 20:27:50.270895 46712 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b020:sysno 39 D0712 20:27:50.270922 46712 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc001830f60 12 D0712 20:27:50.270931 46712 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0712 20:27:50.270965 46712 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:50.270984 46712 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc001830f60 13 D0712 20:27:50.270995 46712 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0712 20:27:50.271056 46712 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0712 20:27:50.271121 46712 task_signals.go:220] [ 1186: 1186] Signal 23: delivering to handler D0712 20:27:50.277695 46712 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:50.277725 46712 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc001830f60 14 D0712 20:27:50.277735 46712 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0712 20:27:50.277790 46712 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.277814 46712 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.277849 46712 task_signals.go:204] [ 1186: 1187] Signal 1186, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.277870 46712 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.277889 46712 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.277893 46712 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.277906 46712 task_signals.go:204] [ 1186: 1188] Signal 1186, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.277914 46712 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.277918 46712 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.277921 46712 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.277931 46712 task_signals.go:204] [ 1186: 1189] Signal 1186, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.277946 46712 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.277950 46712 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.277953 46712 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.277960 46712 task_signals.go:204] [ 1186: 1190] Signal 1186, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.277973 46712 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.279198 46712 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.279231 46712 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.279245 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:50.279270 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:50.279276 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:50.279386 46712 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.279872 46712 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.281232 46712 syscalls.go:262] [ 1191: 1191] Allocating stack with size of 8388608 bytes D0712 20:27:50.281340 46712 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.284768 46712 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:50.284806 46712 usertrap_amd64.go:106] [ 1191: 1191] Map a usertrap vma at 63000 D0712 20:27:50.284886 46712 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000e709c0 1 D0712 20:27:50.284919 46712 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0712 20:27:50.285255 46712 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:50.285281 46712 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000e709c0 2 D0712 20:27:50.285291 46712 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0712 20:27:50.285804 46712 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:50.285826 46712 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000e709c0 3 D0712 20:27:50.285832 46712 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0712 20:27:50.291896 46712 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:50.291929 46712 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000e709c0 4 D0712 20:27:50.291942 46712 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0712 20:27:50.293343 46712 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:50.293407 46712 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000e709c0 5 D0712 20:27:50.293448 46712 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0712 20:27:50.293525 46712 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b214:sysno 13 D0712 20:27:50.293548 46712 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000e709c0 6 D0712 20:27:50.293556 46712 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0712 20:27:50.293999 46712 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:50.294020 46712 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000e709c0 7 D0712 20:27:50.294028 46712 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0712 20:27:50.294279 46712 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:50.294323 46712 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000e709c0 8 D0712 20:27:50.294340 46712 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0712 20:27:50.294487 46712 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46af76:sysno 35 D0712 20:27:50.294520 46712 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000e709c0 9 D0712 20:27:50.294533 46712 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0712 20:27:50.294615 46712 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:50.294637 46712 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000e709c0 10 D0712 20:27:50.294647 46712 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0712 20:27:50.302844 46712 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46af29:sysno 293 D0712 20:27:50.302870 46712 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000e709c0 11 D0712 20:27:50.302879 46712 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0712 20:27:50.305449 46712 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b020:sysno 39 D0712 20:27:50.305474 46712 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000e709c0 12 D0712 20:27:50.305485 46712 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0712 20:27:50.305509 46712 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:50.305513 46712 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000e709c0 13 D0712 20:27:50.305518 46712 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0712 20:27:50.305535 46712 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0712 20:27:50.305636 46712 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0712 20:27:50.313513 46712 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae44:sysno 231 D0712 20:27:50.313539 46712 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000e709c0 14 D0712 20:27:50.313549 46712 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0712 20:27:50.313610 46712 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.313633 46712 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.313665 46712 task_signals.go:204] [ 1191: 1192] Signal 1191, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.313694 46712 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.313690 46712 task_signals.go:204] [ 1191: 1194] Signal 1191, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.313703 46712 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.313729 46712 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.313746 46712 task_signals.go:204] [ 1191: 1195] Signal 1191, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.313767 46712 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.313775 46712 task_signals.go:204] [ 1191: 1193] Signal 1191, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0712 20:27:50.313792 46712 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.313798 46712 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.313806 46712 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.313822 46712 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.313838 46712 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.313847 46712 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0712 20:27:50.315239 46712 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0712 20:27:50.315272 46712 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.315285 46712 task_signals.go:470] [ 6: 6] Notified of signal 17 D0712 20:27:50.315311 46712 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0712 20:27:50.315326 46712 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0712 20:27:50.315394 46712 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0712 20:27:50.315926 46712 task_stop.go:118] [ 6: 14] Entering internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.317226 46712 syscalls.go:262] [ 1196: 1196] Allocating stack with size of 8388608 bytes D0712 20:27:50.317355 46712 task_stop.go:138] [ 6: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0712 20:27:50.318532 46712 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b70f:sysno 204 D0712 20:27:50.318576 46712 usertrap_amd64.go:106] [ 1196: 1196] Map a usertrap vma at 6a000 D0712 20:27:50.318660 46712 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000e70a50 1 D0712 20:27:50.318683 46712 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0712 20:27:50.319956 46712 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae93:sysno 257 D0712 20:27:50.319982 46712 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000e70a50 2 D0712 20:27:50.319991 46712 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0712 20:27:50.320805 46712 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b41d:sysno 9 D0712 20:27:50.320836 46712 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000e70a50 3 D0712 20:27:50.320848 46712 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0712 20:27:50.327411 46712 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b1d3:sysno 14 D0712 20:27:50.327442 46712 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000e70a50 4 D0712 20:27:50.327463 46712 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0712 20:27:50.328603 46712 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46afa0:sysno 186 D0712 20:27:50.328631 46712 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000e70a50 5 D0712 20:27:50.328645 46712 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0712 20:27:50.328713 46712 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b214:sysno 13 D0712 20:27:50.328730 46712 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000e70a50 6 D0712 20:27:50.328737 46712 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0712 20:27:50.328981 46712 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b5eb:sysno 56 D0712 20:27:50.329001 46712 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000e70a50 7 D0712 20:27:50.329010 46712 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0712 20:27:50.329188 46712 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b60c:sysno 186 D0712 20:27:50.329231 46712 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000e70a50 8 D0712 20:27:50.329243 46712 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0712 20:27:50.329365 46712 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46af76:sysno 35 D0712 20:27:50.329866 46712 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000e70a50 9 D0712 20:27:50.329898 46712 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0712 20:27:50.329972 46712 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b57c:sysno 202 D0712 20:27:50.329992 46712 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000e70a50 10 D0712 20:27:50.330003 46712 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0712 20:27:50.337271 46712 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46af29:sysno 293 D0712 20:27:50.337297 46712 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000e70a50 11 D0712 20:27:50.337309 46712 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0712 20:27:50.341190 46712 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b020:sysno 39 D0712 20:27:50.341216 46712 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000e70a50 12 D0712 20:27:50.341229 46712 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0712 20:27:50.341321 46712 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b04f:sysno 234 D0712 20:27:50.341349 46712 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000e70a50 13 D0712 20:27:50.341359 46712 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0712 20:27:50.341414 46712 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0712 20:27:50.341496 46712 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0712 20:27:50.347223 46712 task_signals.go:309] [ 1196: 1196] failed to restore from a signal frame: bad address D0712 20:27:50.347290 46712 task_signals.go:470] [ 1196: 1196] Notified of signal 11 D0712 20:27:50.347308 46712 task_signals.go:220] [ 1196: 1196] Signal 11: delivering to handler W0712 20:27:50.383162 46876 util.go:64] FATAL ERROR: waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-cover-test-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-cover-test-0": urpc method "containerManager.WaitPID" failed: EOF W0712 20:27:50.383359 46876 main.go:274] Failure to execute command, err: 1 D0712 20:27:50.396302 1 connection.go:127] sock read failed, closing connection: EOF W0712 20:27:50.396336 46674 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-cover-test-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. I0712 20:27:50.396436 1 gofer.go:319] All lisafs servers exited. I0712 20:27:50.396471 1 main.go:265] Exiting with status: 0 D0712 20:27:50.399024 46674 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-cover-test-0 D0712 20:27:50.399092 46674 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-cover-test-0 D0712 20:27:50.399098 46674 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-cover-test-0 D0712 20:27:50.399104 46674 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.399177 46674 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-cover-test-0, PID: 46707 D0712 20:27:50.407405 46674 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407454 46674 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407534 46674 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407610 46674 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407637 46674 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407656 46674 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407691 46674 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407706 46674 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407717 46674 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407751 46674 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407790 46674 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407841 46674 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407854 46674 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-cover-test-0" D0712 20:27:50.407876 46674 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-cover-test-0" I0712 20:27:50.408467 46674 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0712 20:27:50.461990 47172 main.go:230] *************************** I0712 20:27:50.462077 47172 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-test-0] I0712 20:27:50.462118 47172 main.go:232] Version 0.0.0 I0712 20:27:50.462139 47172 main.go:233] GOOS: linux I0712 20:27:50.462159 47172 main.go:234] GOARCH: amd64 I0712 20:27:50.462179 47172 main.go:235] PID: 47172 I0712 20:27:50.462214 47172 main.go:236] UID: 0, GID: 0 I0712 20:27:50.462235 47172 main.go:237] Configuration: I0712 20:27:50.462269 47172 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root I0712 20:27:50.462292 47172 main.go:239] Platform: systrap I0712 20:27:50.462319 47172 main.go:240] FileAccess: shared I0712 20:27:50.462353 47172 main.go:241] Directfs: true I0712 20:27:50.462371 47172 main.go:242] Overlay: none I0712 20:27:50.462402 47172 main.go:243] Network: sandbox, logging: false I0712 20:27:50.462432 47172 main.go:244] Strace: false, max size: 1024, syscalls: I0712 20:27:50.462452 47172 main.go:245] IOURING: false I0712 20:27:50.462480 47172 main.go:246] Debug: true I0712 20:27:50.462508 47172 main.go:247] Systemd: false I0712 20:27:50.462535 47172 main.go:248] *************************** D0712 20:27:50.462593 47172 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0712 20:27:50.462740 47172 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist W0712 20:27:50.462851 47172 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-cover-test-0"]: exit status 128 I0712 20:27:50.461990 47172 main.go:230] *************************** I0712 20:27:50.462077 47172 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-test-0] I0712 20:27:50.462118 47172 main.go:232] Version 0.0.0 I0712 20:27:50.462139 47172 main.go:233] GOOS: linux I0712 20:27:50.462159 47172 main.go:234] GOARCH: amd64 I0712 20:27:50.462179 47172 main.go:235] PID: 47172 I0712 20:27:50.462214 47172 main.go:236] UID: 0, GID: 0 I0712 20:27:50.462235 47172 main.go:237] Configuration: I0712 20:27:50.462269 47172 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root I0712 20:27:50.462292 47172 main.go:239] Platform: systrap I0712 20:27:50.462319 47172 main.go:240] FileAccess: shared I0712 20:27:50.462353 47172 main.go:241] Directfs: true I0712 20:27:50.462371 47172 main.go:242] Overlay: none I0712 20:27:50.462402 47172 main.go:243] Network: sandbox, logging: false I0712 20:27:50.462432 47172 main.go:244] Strace: false, max size: 1024, syscalls: I0712 20:27:50.462452 47172 main.go:245] IOURING: false I0712 20:27:50.462480 47172 main.go:246] Debug: true I0712 20:27:50.462508 47172 main.go:247] Systemd: false I0712 20:27:50.462535 47172 main.go:248] *************************** D0712 20:27:50.462593 47172 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0712 20:27:50.462740 47172 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist loading container "ci-gvisor-systrap-1-cover-test-0": file does not exist W0712 20:27:50.462851 47172 main.go:274] Failure to execute command, err: 1 [11501069.040031] [ 683186] 0 683186 4151 21 28672 0 0 exe [11501069.048508] [ 683420] 0 683420 4563 20 73728 0 0 exe [11501069.056977] [ 683428] 0 683428 4151 21 28672 0 0 exe [11501069.065441] [ 683558] 0 683558 1 1 12288 0 0 exe [11501069.073910] [ 683569] 0 683569 1 1 12288 0 0 exe [11501069.082821] [ 683693] 0 683693 1 1 12288 0 0 exe [11501069.091302] [ 683750] 0 683750 1 1 12288 0 0 exe [11501069.099770] [ 683770] 0 683770 1 1 12288 0 0 exe [11501069.108250] [ 683792] 0 683792 1 1 12288 0 0 exe [11501069.116731] [ 683809] 0 683809 1 1 12288 0 0 exe [11501069.125206] [ 683813] 0 683813 1 1 12288 0 0 exe [11501069.133686] [ 684085] 0 684085 4533 18 81920 0 0 exe [11501069.142329] [ 684091] 0 684091 4145 20 36864 0 0 exe [11501069.150800] [ 684310] 65534 684310 1 1 12288 0 0 exe [11501069.159268] [ 684316] 65534 684316 1 1 12288 0 0 exe [11501069.167734] [ 684345] 0 684345 4145 20 36864 0 0 exe [11501069.176201] [ 684536] 0 684536 1 1 12288 0 0 exe [11501069.184685] [ 684547] 0 684547 1 1 12288 0 0 exe [11501069.193205] [ 684560] 0 684560 1 1 12288 0 0 exe [11501069.201676] [ 684610] 0 684610 1 1 12288 0 0 exe [11501069.210157] [ 684654] 0 684654 1 1 12288 0 0 exe [11501069.218627] [ 684686] 0 684686 1 1 12288 0 0 exe [11501069.227098] [ 684711] 0 684711 1 1 12288 0 0 exe [11501069.235566] [ 684731] 0 684731 1 1 12288 0 0 exe [11501069.244045] [ 684763] 0 684763 1 1 12288 0 0 exe [11501069.252518] [ 684779] 0 684779 1 1 12288 0 0 exe [11501069.260995] [ 684797] 0 684797 1 1 12288 0 0 exe [11501069.269466] [ 684811] 0 684811 1 1 12288 0 0 exe [11501069.278029] [ 684848] 0 684848 1 1 12288 0 0 exe [11501069.286498] [ 684854] 0 684854 1 1 12288 0 0 exe [11501069.295057] [ 684876] 0 684876 1 1 12288 0 0 exe [11501069.303532] [ 684880] 0 684880 1 1 12288 0 0 exe [11501069.311999] [ 687179] 0 687179 4157 22 28672 0 0 exe [11501069.320479] [ 687213] 0 687213 4157 22 28672 0 0 exe [11501069.330008] [ 687234] 0 687234 105692 71130 790528 0 0 exe [11501069.338535] [ 687235] 0 687235 105692 71130 790528 0 0 exe [11501069.347016] [ 687447] 0 687447 4139 19 36864 0 0 exe [11501069.355504] [ 687455] 0 687455 4151 21 36864 0 0 exe [11501069.363971] [ 687485] 0 687485 4151 21 36864 0 0 exe [11501069.372521] [ 687780] 65534 687780 1 1 12288 0 0 exe [11501069.380987] [ 687784] 65534 687784 1 1 12288 0 0 exe [11501069.389552] [ 687879] 0 687879 4151 21 36864 0 0 exe [11501069.398133] [ 688264] 0 688264 4633 20 73728 0 0 exe [11501069.406600] [ 688268] 0 688268 4633 20 73728 0 0 exe [11501069.415081] [ 688280] 0 688280 4633 20 73728 0 0 exe [11501069.423549] [ 688286] 0 688286 4151 21 36864 0 0 exe [11501069.432115] [ 688666] 0 688666 4151 21 36864 0 0 exe [11501069.440586] [ 688720] 0 688720 1 1 12288 0 0 exe [11501069.449057] [ 688728] 0 688728 1 1 12288 0 0 exe [11501069.457520] [ 688738] 0 688738 1 1 12288 0 0 exe [11501069.465982] [ 688747] 0 688747 1 1 12288 0 0 exe [11501069.474445] [ 688816] 0 688816 1 1 12288 0 0 exe [11501069.482907] [ 688834] 0 688834 4151 21 36864 0 0 exe [11501069.491371] [ 688875] 0 688875 1 1 12288 0 0 exe [11501069.499928] [ 688889] 0 688889 1 1 12288 0 0 exe [11501069.508487] [ 688907] 0 688907 1 1 12288 0 0 exe [11501069.516951] [ 688929] 0 688929 1 1 12288 0 0 exe [11501069.525432] [ 688933] 0 688933 1 1 12288 0 0 exe [11501069.533897] [ 688960] 0 688960 1 1 12288 0 0 exe [11501069.542378] [ 688966] 0 688966 1 1 12288 0 0 exe [11501069.550862] [ 688981] 0 688981 1 1 12288 0 0 exe [11501069.559327] [ 688990] 0 688990 1 1 12288 0 0 exe [11501069.567887] [ 689013] 0 689013 1 1 12288 0 0 exe [11501069.576354] [ 689032] 0 689032 1 1 12288 0 0 exe [11501069.584817] [ 689057] 0 689057 1 1 12288 0 0 exe [11501069.593384] [ 689103] 0 689103 1 1 12288 0 0 exe [11501069.601859] [ 689137] 0 689137 1 1 12288 0 0 exe [11501069.610332] [ 689177] 0 689177 1 1 12288 0 0 exe [11501069.618895] [ 689211] 0 689211 1 1 12288 0 0 exe [11501069.627359] [ 689369] 0 689369 1 1 12288 0 0 exe [11501069.635820] [ 689397] 0 689397 1 1 12288 0 0 exe [11501069.644320] [ 689413] 0 689413 1 1 12288 0 0 exe [11501069.652902] [ 689503] 0 689503 4151 21 36864 0 0 exe [11501069.661388] [ 690218] 0 690218 4151 21 28672 0 0 exe [11501069.669856] [ 690765] 0 690765 4163 23 28672 0 0 exe [11501069.678409] [ 690816] 0 690816 4151 21 28672 0 0 exe [11501069.686872] [ 690926] 0 690926 4151 21 36864 0 0 exe [11501069.695339] [ 691256] 0 691256 4157 22 28672 0 0 exe [11501069.703888] [ 691546] 65534 691546 1 1 12288 0 0 exe [11501069.712350] [ 691604] 0 691604 4145 20 36864 0 0 exe [11501069.720814] [ 691616] 0 691616 4145 20 36864 0 0 exe [11501069.729371] [ 691639] 0 691639 4151 21 36864 0 0 exe [11501069.737863] [ 691642] 0 691642 4145 20 36864 0 0 exe [11501069.746328] [ 691670] 0 691670 4545 21 81920 0 0 exe [11501069.754793] [ 691671] 0 691671 4545 21 81920 0 0 exe [11501069.763255] [ 691674] 0 691674 4545 21 81920 0 0 exe [11501069.771801] [ 691682] 0 691682 4145 20 36864 0 0 exe [11501069.780260] [ 691683] 0 691683 4145 20 36864 0 0 exe [11501069.788721] [ 691686] 0 691686 4545 21 81920 0 0 exe [11501069.797195] [ 691687] 0 691687 4545 21 81920 0 0 exe [11501069.805657] [ 691688] 0 691688 4545 21 81920 0 0 exe [11501069.814121] [ 691689] 0 691689 4151 21 36864 0 0 exe [11501069.822583] [ 691692] 0 691692 4151 21 36864 0 0 exe [11501069.831047] [ 691789] 0 691789 4633 20 73728 0 0 exe [11501069.839505] [ 691906] 0 691906 1 1 12288 0 0 exe [11501069.847968] [ 691910] 0 691910 1 1 12288 0 0 exe [11501069.856432] [ 691915] 0 691915 1 1 12288 0 0 exe [11501069.864899] [ 691921] 0 691921 1 1 12288 0 0 exe [11501069.873458] [ 691925] 0 691925 1 1 12288 0 0 exe [11501069.882007] [ 691929] 0 691929 1 1 12288 0 0 exe [11501069.890477] [ 691933] 0 691933 1 1 12288 0 0 exe [11501069.898938] [ 691938] 0 691938 1 1 12288 0 0 exe [11501069.907399] [ 691939] 0 691939 1 1 12288 0 0 exe [11501069.915860] [ 691945] 0 691945 1 1 12288 0 0 exe [11501069.924320] [ 691949] 0 691949 1 1 12288 0 0 exe [11501069.932782] [ 691953] 0 691953 1 1 12288 0 0 exe [11501069.941255] [ 692030] 0 692030 4151 21 28672 0 0 exe [11501069.949717] [ 692031] 0 692031 4151 21 28672 0 0 exe [11501069.958269] [ 692089] 0 692089 4151 21 28672 0 0 exe [11501069.966733] [ 692518] 0 692518 4151 21 28672 0 0 exe [11501069.975206] [ 692519] 0 692519 4151 21 28672 0 0 exe [11501069.983673] [ 692529] 0 692529 4151 21 28672 0 0 exe [11501069.992226] [ 692586] 0 692586 4139 19 28672 0 0 exe [11501070.000700] [ 692594] 0 692594 4151 21 28672 0 0 exe [11501070.009169] [ 692609] 0 692609 4151 21 28672 0 0 exe [11501070.017715] [ 692651] 0 692651 1 1 12288 0 0 exe [11501070.026175] [ 692657] 0 692657 1 1 12288 0 0 exe [11501070.034643] [ 692661] 0 692661 1 1 12288 0 0 exe [11501070.043111] [ 692665] 0 692665 1 1 12288 0 0 exe [11501070.051577] [ 692739] 0 692739 1 1 12288 0 0 exe [11501070.060047] [ 692800] 0 692800 4151 21 28672 0 0 exe [11501070.068521] [ 692819] 0 692819 4151 21 28672 0 0 exe [11501070.076986] [ 692820] 0 692820 4151 21 28672 0 0 exe [11501070.085554] [ 692826] 0 692826 103587 69076 823296 0 0 exe [11501070.094027] [ 692827] 0 692827 103587 69076 823296 0 0 exe [11501070.102499] [ 692835] 0 692835 4175 25 28672 0 0 exe [11501070.110957] [ 692836] 0 692836 4175 25 28672 0 0 exe [11501070.119418] [ 692837] 0 692837 4175 25 28672 0 0 exe [11501070.127879] [ 692859] 0 692859 4145 20 28672 0 0 exe [11501070.136339] [ 692952] 0 692952 4549 21 57344 0 0 exe [11501070.144801] [ 692956] 0 692956 4549 21 57344 0 0 exe [11501070.153358] [ 692957] 0 692957 4157 22 28672 0 0 exe [11501070.161905] [ 692982] 0 692982 4414 23 53248 0 0 exe [11501070.170451] [ 692983] 0 692983 4414 23 53248 0 0 exe [11501070.178911] [ 692984] 0 692984 4302 22 73728 0 0 exe [11501070.187397] [ 692985] 0 692985 4302 22 73728 0 0 exe [11501070.195870] [ 692986] 0 692986 4786 20 86016 0 0 exe [11501070.204330] [ 692987] 0 692987 4786 20 86016 0 0 exe [11501070.212793] [ 692988] 0 692988 4490 21 77824 0 0 exe [11501070.221440] [ 692989] 0 692989 4490 21 77824 0 0 exe [11501070.229902] [ 692990] 0 692990 4404 21 69632 0 0 exe [11501070.238452] [ 692991] 0 692991 4404 21 69632 0 0 exe [11501070.246910] [ 692992] 0 692992 4151 21 28672 0 0 exe [11501070.255372] [ 692993] 0 692993 4151 21 28672 0 0 exe [11501070.263924] [ 692994] 0 692994 4404 21 69632 0 0 exe [11501070.272386] [ 692995] 0 692995 4404 21 69632 0 0 exe [11501070.280850] [ 692996] 0 692996 4404 21 69632 0 0 exe [11501070.289316] [ 692997] 0 692997 4145 18 28672 0 0 exe [11501070.297862] [ 692998] 0 692998 4145 18 28672 0 0 exe [11501070.306341] [ 692999] 0 692999 4543 20 57344 0 0 exe [11501070.314803] [ 693000] 0 693000 4543 20 57344 0 0 exe [11501070.323361] [ 693001] 0 693001 4543 20 57344 0 0 exe [11501070.331819] [ 693002] 0 693002 4543 20 57344 0 0 exe [11501070.340278] [ 693004] 0 693004 4786 20 86016 0 0 exe [11501070.348739] [ 693005] 0 693005 4414 23 53248 0 0 exe [11501070.357208] [ 693006] 0 693006 4302 22 73728 0 0 exe [11501070.365673] [ 693007] 0 693007 6284 21 94208 0 0 exe [11501070.374225] [ 693008] 0 693008 4145 18 28672 0 0 exe [11501070.382683] [ 693009] 0 693009 4145 18 28672 0 0 exe [11501070.391145] [ 693010] 0 693010 4145 20 28672 0 0 exe [11501070.399699] [ 693012] 0 693012 4145 20 28672 0 0 exe [11501070.408165] [ 693013] 0 693013 4302 22 73728 0 0 exe [11501070.416628] [ 693014] 0 693014 4410 22 69632 0 0 exe [11501070.425142] [ 693015] 0 693015 4410 22 69632 0 0 exe [11501070.433626] [ 693016] 0 693016 4295 21 49152 0 0 exe [11501070.442090] [ 693017] 0 693017 4295 21 49152 0 0 exe [11501070.450552] [ 693018] 0 693018 4549 21 57344 0 0 exe [11501070.459013] [ 693019] 0 693019 4549 21 57344 0 0 exe [11501070.467474] [ 693037] 0 693037 4151 21 28672 0 0 exe [11501070.475936] [ 693052] 0 693052 4549 21 57344 0 0 exe [11501070.484404] [ 693055] 0 693055 4295 21 49152 0 0 exe [11501070.492963] [ 693057] 0 693057 4404 21 69632 0 0 exe [11501070.501426] [ 693064] 0 693064 4295 21 49152 0 0 exe [11501070.509893] [ 693070] 0 693070 4157 22 28672 0 0 exe [11501070.518366] [ 693085] 0 693085 4295 21 49152 0 0 exe [11501070.526839] [ 693144] 0 693144 4549 21 57344 0 0 exe [11501070.535319] [ 693148] 0 693148 4404 21 69632 0 0 exe [11501070.543795] [ 693150] 0 693150 4404 21 69632 0 0 exe [11501070.552257] [ 693157] 0 693157 4151 21 36864 0 0 exe [11501070.560804] [ 693160] 0 693160 4151 21 36864 0 0 exe [11501070.569350] [ 693169] 0 693169 4169 24 28672 0 0 exe [11501070.577810] [ 693170] 0 693170 4151 21 36864 0 0 exe [11501070.586272] [ 693212] 0 693212 4549 20 73728 0 0 exe [11501070.594911] [ 693224] 0 693224 4145 20 28672 0 0 exe [11501070.603375] [ 693225] 0 693225 4145 20 28672 0 0 exe [11501070.611839] [ 693265] 0 693265 4549 21 57344 0 0 exe [11501070.620303] [ 693323] 0 693323 4157 22 28672 0 0 exe [11501070.628774] [ 693369] 0 693369 4151 21 36864 0 0 exe [11501070.637247] [ 693375] 0 693375 4151 21 36864 0 0 exe [11501070.645718] [ 693378] 0 693378 4151 21 36864 0 0 exe [11501070.654268] [ 693380] 0 693380 4151 21 36864 0 0 exe [11501070.662728] [ 693441] 0 693441 4157 22 28672 0 0 exe [11501070.671193] [ 693443] 0 693443 4151 21 28672 0 0 exe [11501070.679746] [ 693444] 0 693444 4157 22 28672 0 0 exe [11501070.688211] [ 693466] 0 693466 452103 9171 434176 0 0 image [11501070.696864] [ 693493] 0 693493 396484 9047 405504 0 0 exe [11501070.705343] [ 693496] 0 693496 1509223 108390 2351104 0 0 exe [11501070.713895] [ 693575] 0 693575 4151 21 36864 0 0 exe [11501070.722449] [ 693584] 0 693584 4410 22 69632 0 0 exe [11501070.730916] [ 693585] 0 693585 1 0 12288 0 0 exe [11501070.739381] [ 693607] 0 693607 28370 3144 237568 0 0 exe [11501070.747848] [ 693630] 0 693630 4151 21 36864 0 0 exe [11501070.756411] [ 693644] 0 693644 4133 16 28672 0 0 exe [11501070.764876] [ 693645] 0 693645 4133 16 28672 0 0 exe [11501070.773348] [ 693646] 0 693646 4133 16 28672 0 0 exe [11501070.781813] [ 693647] 0 693647 4133 16 28672 0 0 exe [11501070.790294] [ 693648] 0 693648 4133 16 28672 0 0 exe [11501070.798755] [ 693649] 0 693649 4133 16 28672 0 0 exe [11501070.807222] [ 693650] 0 693650 4133 16 28672 0 0 exe [11501070.815691] [ 693651] 0 693651 4133 16 28672 0 0 exe [11501070.824168] [ 693652] 0 693652 4145 18 28672 0 0 exe [11501070.832635] [ 693653] 0 693653 4145 18 28672 0 0 exe [11501070.841131] [ 693654] 0 693654 4133 16 28672 0 0 exe [11501070.849597] [ 693655] 0 693655 4133 16 28672 0 0 exe [11501070.858061] [ 693656] 0 693656 4133 16 28672 0 0 exe [11501070.866526] [ 693657] 0 693657 4133 16 28672 0 0 exe [11501070.874992] [ 693658] 0 693658 4133 16 28672 0 0 exe [11501070.883459] [ 693661] 0 693661 4133 16 28672 0 0 exe [11501070.891930] [ 693662] 0 693662 4133 16 28672 0 0 exe [11501070.900394] [ 693666] 0 693666 4133 16 28672 0 0 exe [11501070.908857] [ 693668] 0 693668 4151 18 28672 0 0 exe [11501070.917332] [ 693669] 0 693669 4133 16 28672 0 0 exe [11501070.925792] [ 693670] 0 693670 4157 22 28672 0 0 exe [11501070.934254] [ 693671] 0 693671 4151 18 28672 0 0 exe [11501070.942718] [ 693672] 0 693672 4151 18 28672 0 0 exe [11501070.951183] [ 693673] 0 693673 4133 16 28672 0 0 exe [11501070.959659] [ 693674] 0 693674 4133 16 28672 0 0 exe [11501070.968121] [ 693675] 0 693675 4157 22 28672 0 0 exe [11501070.976581] [ 693676] 0 693676 4175 25 28672 0 0 exe [11501070.985043] [ 693677] 0 693677 4133 16 28672 0 0 exe [11501070.993516] [ 693678] 0 693678 4133 16 28672 0 0 exe [11501071.001979] [ 693679] 0 693679 4133 16 28672 0 0 exe [11501071.010437] [ 693680] 0 693680 4133 16 28672 0 0 exe [11501071.018900] [ 693681] 0 693681 4133 16 28672 0 0 exe [11501071.027363] [ 693682] 0 693682 4133 16 28672 0 0 exe [11501071.035826] [ 693683] 0 693683 4133 16 28672 0 0 exe [11501071.044288] [ 693684] 0 693684 4133 16 28672 0 0 exe [11501071.052750] [ 693685] 0 693685 4133 16 28672 0 0 exe [11501071.061226] [ 693686] 0 693686 4163 23 28672 0 0 exe [11501071.069690] [ 693687] 0 693687 4175 25 28672 0 0 exe [11501071.078152] [ 693688] 0 693688 4163 23 28672 0 0 exe [11501071.086703] [ 693689] 0 693689 4133 16 28672 0 0 exe [11501071.095164] [ 693690] 0 693690 4133 16 28672 0 0 exe [11501071.103625] [ 693691] 0 693691 4133 16 28672 0 0 exe [11501071.112100] [ 693692] 0 693692 4163 23 28672 0 0 exe [11501071.120565] [ 693693] 0 693693 4139 18 28672 0 0 exe [11501071.129031] [ 693694] 0 693694 4133 16 28672 0 0 exe [11501071.137582] [ 693695] 0 693695 4163 23 28672 0 0 exe [11501071.146047] [ 693696] 0 693696 4139 18 28672 0 0 exe [11501071.154505] [ 693697] 0 693697 4133 16 28672 0 0 exe [11501071.162970] [ 693698] 0 693698 6285 23 94208 0 0 exe [11501071.171432] [ 693699] 0 693699 4163 23 28672 0 0 exe [11501071.179895] [ 693700] 0 693700 6285 23 94208 0 0 exe [11501071.188451] [ 693701] 0 693701 4133 16 28672 0 0 exe [11501071.196914] [ 693702] 0 693702 4133 16 28672 0 0 exe [11501071.205385] [ 693703] 0 693703 4163 23 28672 0 0 exe [11501071.213847] [ 693704] 0 693704 4163 23 28672 0 0 exe [11501071.222311] [ 693705] 0 693705 4133 16 28672 0 0 exe [11501071.230773] [ 693706] 0 693706 4139 18 28672 0 0 exe [11501071.239235] [ 693707] 0 693707 4157 22 28672 0 0 exe [11501071.247696] [ 693708] 0 693708 4151 19 28672 0 0 exe [11501071.256161] [ 693709] 0 693709 4163 23 28672 0 0 exe [11501071.264630] [ 693711] 0 693711 4151 19 28672 0 0 exe [11501071.273120] [ 693712] 0 693712 4157 22 28672 0 0 exe [11501071.281673] [ 693713] 0 693713 4145 18 28672 0 0 exe [11501071.290134] [ 693714] 0 693714 4145 18 28672 0 0 exe [11501071.298681] [ 693722] 0 693722 4175 25 28672 0 0 exe [11501071.307231] [ 693730] 0 693730 4490 23 69632 0 0 exe [11501071.315775] [ 693732] 0 693732 4175 25 28672 0 0 exe [11501071.324236] [ 693731] 0 693731 4163 23 28672 0 0 exe [11501071.332700] [ 693733] 0 693733 6285 23 94208 0 0 exe [11501071.341181] [ 693734] 0 693734 4163 23 28672 0 0 exe [11501071.349652] [ 693735] 0 693735 4175 25 28672 0 0 exe [11501071.358124] [ 693738] 0 693738 6285 23 94208 0 0 exe [11501071.366591] [ 693749] 0 693749 4163 23 28672 0 0 exe [11501071.375070] [ 693764] 0 693764 4410 22 69632 0 0 exe [11501071.384230] [ 693798] 65534 693798 1 1 12288 0 0 exe [11501071.392714] [ 693800] 65534 693800 1 1 12288 0 0 exe [11501071.401195] [ 693807] 65534 693807 1 1 12288 0 0 exe [11501071.409676] [ 693808] 65534 693808 1 1 12288 0 0 exe [11501071.418166] [ 693812] 65534 693812 1 1 12288 0 0 exe [11501071.426648] [ 693814] 65534 693814 491 1 45056 0 0 exe [11501071.435135] [ 693915] 0 693915 4490 23 69632 0 0 exe [11501071.443611] [ 693916] 0 693916 4490 23 69632 0 0 exe [11501071.452102] [ 693935] 0 693935 6285 23 94208 0 0 exe [11501071.460585] [ 693936] 0 693936 4157 22 28672 0 0 exe [11501071.469066] [ 693943] 0 693943 4157 22 28672 0 0 exe [11501071.477541] [ 693945] 0 693945 4157 22 28672 0 0 exe [11501071.486017] [ 693949] 0 693949 4157 22 28672 0 0 exe [11501071.494495] [ 693962] 0 693962 6285 23 94208 0 0 exe [11501071.502968] [ 694010] 0 694010 4175 25 28672 0 0 exe [11501071.511448] [ 694015] 0 694015 6285 23 94208 0 0 exe [11501071.519932] [ 694020] 0 694020 4157 22 28672 0 0 exe [11501071.528409] [ 694021] 0 694021 4145 18 28672 0 0 exe [11501071.536889] [ 694022] 0 694022 4145 18 28672 0 0 exe [11501071.545366] [ 694030] 0 694030 4163 23 28672 0 0 exe [11501071.553838] [ 694034] 0 694034 4139 19 28672 0 0 exe [11501071.562358] [ 694036] 0 694036 4151 21 36864 0 0 exe [11501071.570839] [ 694037] 0 694037 4145 20 36864 0 0 exe [11501071.579320] [ 694045] 0 694045 14526 9564 163840 0 0 exe [11501071.587809] [ 694052] 0 694052 14526 9564 163840 0 0 exe [11501071.596298] [ 694071] 0 694071 4139 19 28672 0 0 exe [11501071.604777] [ 694161] 0 694161 4410 22 69632 0 0 exe [11501071.613247] [ 694162] 0 694162 4410 22 69632 0 0 exe [11501071.621724] [ 694185] 0 694185 4151 21 36864 0 0 exe [11501071.630199] [ 694224] 0 694224 4151 21 28672 0 0 exe [11501071.638671] [ 694225] 0 694225 4151 21 28672 0 0 exe [11501071.647153] [ 694228] 0 694228 4145 20 28672 0 0 exe [11501071.655632] [ 694244] 0 694244 4175 25 28672 0 0 exe [11501071.664109] [ 694246] 0 694246 4163 23 28672 0 0 exe [11501071.672594] [ 694247] 0 694247 4490 21 77824 0 0 exe [11501071.681076] [ 694277] 0 694277 4163 23 28672 0 0 exe [11501071.689550] [ 694290] 0 694290 4163 23 28672 0 0 exe [11501071.698028] [ 694377] 0 694377 4151 21 36864 0 0 exe [11501071.706500] [ 694392] 0 694392 4490 21 77824 0 0 exe [11501071.714977] [ 694394] 0 694394 4490 21 77824 0 0 exe [11501071.723458] [ 694396] 0 694396 4151 21 28672 0 0 exe [11501071.731943] [ 694408] 0 694408 184723 1752 139264 0 0 image [11501071.740798] [ 694415] 0 694415 184723 1034 139264 0 0 exe [11501071.749278] [ 694416] 0 694416 513283 58321 1081344 0 0 exe [11501071.757759] [ 694446] 0 694446 4157 22 36864 0 0 exe [11501071.766242] [ 694447] 0 694447 4414 23 53248 0 0 exe [11501071.774719] [ 694466] 0 694466 1 1 12288 0 0 exe [11501071.783195] [ 694484] 0 694484 28403 2743 237568 0 0 exe [11501071.791685] [ 694502] 0 694502 184787 1592 143360 0 0 image [11501071.800351] [ 694514] 0 694514 4157 22 28672 0 0 exe [11501071.808861] [ 694524] 0 694524 39838 11029 315392 0 0 exe [11501071.817368] [ 694549] 0 694549 852 1 53248 0 0 exe [11501071.825843] [ 694566] 0 694566 4157 22 36864 0 0 exe [11501071.834402] [ 694576] 0 694576 880 1 65536 0 0 exe [11501071.842869] [ 694577] 0 694577 694 1 49152 0 0 exe [11501071.851334] [ 694580] 0 694580 750 105 53248 0 0 exe [11501071.859803] [ 694586] 0 694586 715 1 49152 0 0 exe [11501071.868358] [ 694595] 0 694595 741 1 65536 0 0 exe [11501071.876821] [ 694596] 0 694596 778 1 61440 0 0 exe [11501071.885304] [ 694612] 0 694612 757 1 61440 0 0 exe [11501071.893778] [ 694623] 0 694623 1 1 12288 0 0 exe [11501071.902246] [ 694630] 0 694630 2893 1 77824 0 0 exe [11501071.910739] [ 694662] 0 694662 1 1 12288 0 0 exe [11501071.919325] [ 694718] 0 694718 1 1 12288 0 0 exe [11501071.927803] [ 694857] 0 694857 4157 22 28672 0 0 exe [11501071.936272] [ 694932] 0 694932 4414 23 53248 0 0 exe [11501071.944735] [ 694951] 0 694951 4151 21 36864 0 0 exe [11501071.953212] [ 694955] 0 694955 4151 21 36864 0 0 exe [11501071.961675] [ 695078] 0 695078 4151 21 28672 0 0 exe [11501071.970152] [ 695162] 0 695162 2332 1 69632 0 0 exe [11501071.978622] [ 695164] 0 695164 1 1 12288 0 0 exe [11501071.987093] [ 695172] 0 695172 1 1 12288 0 0 exe [11501071.995562] [ 695180] 0 695180 1 1 12288 0 0 exe [11501072.004123] [ 695181] 0 695181 1 1 12288 0 0 exe [11501072.012618] [ 695185] 0 695185 2342 1 77824 0 0 exe [11501072.021362] [ 695258] 0 695258 4157 22 36864 0 0 exe [11501072.029845] [ 695274] 0 695274 470664 11663 446464 0 0 image [11501072.038501] [ 695287] 0 695287 4151 21 36864 0 0 exe [11501072.047010] [ 695291] 0 695291 470376 10036 442368 0 0 image [11501072.055661] [ 695303] 0 695303 433606 10177 421888 0 0 exe [11501072.064139] [ 695304] 0 695304 1021192 21495 856064 0 0 exe [11501072.072604] [ 695316] 0 695316 19149 6855 208896 0 0 exe [11501072.081074] [ 695374] 0 695374 4151 21 36864 0 0 exe [11501072.089544] [ 695378] 0 695378 763 1 49152 0 0 exe [11501072.098099] [ 695395] 0 695395 732 1 61440 0 0 exe [11501072.106668] [ 695407] 0 695407 1 0 12288 0 0 exe [11501072.115243] [ 695424] 0 695424 2349 1 65536 0 0 exe [11501072.123738] [ 695428] 0 695428 4414 23 53248 0 0 exe [11501072.132218] [ 695430] 0 695430 4414 23 53248 0 0 exe [11501072.140702] [ 695446] 0 695446 28373 2754 233472 0 0 exe [11501072.149198] [ 695455] 0 695455 4163 23 28672 0 0 exe [11501072.157752] [ 695506] 0 695506 4151 21 36864 0 0 exe [11501072.166220] [ 695573] 0 695573 1 1 12288 0 0 exe [11501072.174810] [ 695756] 0 695756 4157 22 36864 0 0 exe [11501072.183276] [ 695758] 0 695758 4786 20 86016 0 0 exe [11501072.191749] [ 695797] 0 695797 4151 21 28672 0 0 exe [11501072.200233] [ 695804] 0 695804 4151 21 28672 0 0 exe [11501072.208703] [ 695811] 0 695811 4151 21 28672 0 0 exe [11501072.217187] [ 695812] 0 695812 4151 21 28672 0 0 exe [11501072.225653] [ 695819] 0 695819 4404 21 69632 0 0 exe [11501072.234223] [ 695838] 0 695838 4151 21 36864 0 0 exe [11501072.242691] [ 695847] 0 695847 4151 21 28672 0 0 exe [11501072.251178] [ 695864] 0 695864 4151 21 28672 0 0 exe [11501072.259909] [ 695870] 0 695870 4151 21 28672 0 0 exe [11501072.268392] [ 695871] 0 695871 4151 21 28672 0 0 exe [11501072.276876] [ 695943] 0 695943 88839 52103 778240 0 0 exe [11501072.285349] [ 695980] 0 695980 88839 52103 778240 0 0 exe [11501072.293810] [ 695995] 0 695995 88839 52103 778240 0 0 exe [11501072.302384] [ 695996] 0 695996 88839 52103 778240 0 0 exe [11501072.310859] [ 695997] 0 695997 88839 52103 778240 0 0 exe [11501072.319336] [ 696020] 0 696020 4157 22 36864 0 0 exe [11501072.327811] [ 696036] 0 696036 88839 52103 778240 0 0 exe [11501072.336276] [ 696038] 0 696038 4157 22 36864 0 0 exe [11501072.344757] [ 696060] 0 696060 88839 52103 778240 0 0 exe [11501072.353250] [ 696084] 0 696084 88839 52103 778240 0 0 exe [11501072.361735] [ 696095] 0 696095 88839 52103 778240 0 0 exe [11501072.370230] [ 696103] 0 696103 104233 69238 839680 0 0 exe [11501072.378726] [ 696275] 0 696275 88839 52103 778240 0 0 exe [11501072.387204] [ 696333] 0 696333 88839 52103 778240 0 0 exe [11501072.395686] [ 696393] 0 696393 4404 21 69632 0 0 exe [11501072.404164] [ 696436] 0 696436 4163 23 28672 0 0 exe [11501072.412645] [ 696461] 0 696461 4145 20 28672 0 0 exe [11501072.421130] [ 696466] 0 696466 4145 20 28672 0 0 exe [11501072.429607] [ 696470] 0 696470 489161 10282 450560 0 0 image [11501072.438270] [ 696498] 0 696498 507594 10895 454656 0 0 image [11501072.447028] [ 696505] 0 696505 452039 10525 434176 0 0 exe [11501072.455512] [ 696507] 0 696507 1416535 124257 2584576 0 0 exe [11501072.463991] [ 696547] 0 696547 433414 10037 425984 0 0 exe [11501072.472469] [ 696548] 0 696548 1538667 123504 2686976 0 0 exe [11501072.480967] [ 696635] 0 696635 4157 22 28672 0 0 exe [11501072.489444] [ 696636] 0 696636 4157 22 28672 0 0 exe [11501072.497920] [ 696656] 0 696656 4133 17 28672 0 0 exe [11501072.506399] [ 696661] 0 696661 4133 17 28672 0 0 exe [11501072.515326] [ 696679] 0 696679 1 1 12288 0 0 exe [11501072.523823] [ 696693] 0 696693 32449 2940 253952 0 0 exe [11501072.532306] [ 696702] 0 696702 32449 2940 253952 0 0 exe [11501072.540782] [ 696707] 0 696707 28446 2822 233472 0 0 exe [11501072.549262] [ 696718] 0 696718 32449 2940 253952 0 0 exe [11501072.557726] [ 696722] 0 696722 32449 2940 253952 0 0 exe [11501072.566201] [ 696802] 0 696802 4151 21 28672 0 0 exe [11501072.574684] [ 696803] 0 696803 4151 21 28672 0 0 exe [11501072.583169] [ 696821] 0 696821 4151 21 28672 0 0 exe [11501072.591719] [ 696917] 0 696917 1 1 12288 0 0 exe [11501072.600184] [ 696921] 0 696921 1 1 12288 0 0 exe [11501072.608665] [ 696925] 0 696925 1 1 12288 0 0 exe [11501072.617158] [ 696929] 0 696929 1 1 12288 0 0 exe [11501072.625652] [ 696933] 0 696933 1 1 12288 0 0 exe [11501072.634142] [ 696937] 0 696937 1 1 12288 0 0 exe [11501072.642633] [ 696941] 0 696941 1 1 12288 0 0 exe [11501072.651137] [ 697182] 0 697182 103587 69076 823296 0 0 exe [11501072.659652] [ 697183] 0 697183 103587 69076 823296 0 0 exe [11501072.668168] [ 697279] 0 697279 4157 22 28672 0 0 exe [11501072.676657] [ 697280] 0 697280 4157 22 28672 0 0 exe [11501072.685268] [ 697555] 0 697555 4157 22 36864 0 0 exe [11501072.693761] [ 697556] 0 697556 4157 22 36864 0 0 exe [11501072.703130] [ 697560] 0 697560 4157 22 36864 0 0 exe [11501072.711624] [ 697563] 0 697563 4145 20 28672 0 0 exe [11501072.720114] [ 697564] 0 697564 4151 21 28672 0 0 exe [11501072.728604] [ 697565] 0 697565 7905 22 98304 0 0 exe [11501072.737124] [ 697566] 0 697566 4145 20 28672 0 0 exe [11501072.745624] [ 697567] 0 697567 4151 21 28672 0 0 exe [11501072.754120] [ 697568] 0 697568 4151 21 28672 0 0 exe [11501072.762608] [ 697570] 0 697570 4151 21 28672 0 0 exe [11501072.771089] [ 697569] 0 697569 4157 22 28672 0 0 exe [11501072.779587] [ 697571] 0 697571 4467 18 69632 0 0 exe [11501072.788078] [ 697572] 0 697572 4145 20 28672 0 0 exe [11501072.796555] [ 697573] 0 697573 4151 21 28672 0 0 exe [11501072.805034] [ 697574] 0 697574 4133 29 28672 0 0 exe [11501072.813534] [ 697575] 0 697575 4151 21 28672 0 0 exe [11501072.822022] [ 697576] 0 697576 4133 18 28672 0 0 exe [11501072.830498] [ 697577] 0 697577 4145 20 28672 0 0 exe [11501072.838972] [ 697579] 0 697579 4467 18 69632 0 0 exe [11501072.847538] [ 697581] 0 697581 4151 21 28672 0 0 exe [11501072.856018] [ 697584] 0 697584 4133 29 28672 0 0 exe [11501072.864509] [ 697580] 0 697580 4151 21 28672 0 0 exe [11501072.872987] [ 697585] 0 697585 4151 21 28672 0 0 exe [11501072.881464] [ 697589] 0 697589 4151 21 28672 0 0 exe [11501072.890302] [ 697587] 0 697587 4145 20 28672 0 0 exe [11501072.898790] [ 697591] 0 697591 4151 21 28672 0 0 exe [11501072.907274] [ 697593] 0 697593 7905 22 98304 0 0 exe [11501072.915755] [ 697595] 0 697595 4133 27 28672 0 0 exe [11501072.924235] [ 697596] 0 697596 4145 20 28672 0 0 exe [11501072.933255] [ 697598] 0 697598 4133 18 28672 0 0 exe [11501072.941732] [ 697602] 0 697602 4151 21 28672 0 0 exe [11501072.950208] [ 697605] 0 697605 4467 18 69632 0 0 exe [11501072.958693] [ 697607] 0 697607 4133 27 28672 0 0 exe [11501072.967169] [ 697608] 0 697608 4133 18 28672 0 0 exe [11501072.975649] [ 697609] 0 697609 4151 21 28672 0 0 exe [11501072.984128] [ 697610] 0 697610 4145 20 28672 0 0 exe [11501072.992607] [ 697611] 0 697611 4212 21 53248 0 0 exe [11501073.001082] [ 697612] 0 697612 4467 18 69632 0 0 exe [11501073.009559] [ 697613] 0 697613 4467 18 69632 0 0 exe [11501073.018029] [ 697615] 0 697615 4133 18 28672 0 0 exe [11501073.026761] [ 697614] 0 697614 4151 21 28672 0 0 exe [11501073.035236] [ 697618] 0 697618 4151 21 28672 0 0 exe [11501073.043717] [ 697619] 0 697619 4151 21 28672 0 0 exe [11501073.052193] [ 697621] 0 697621 4133 18 28672 0 0 exe [11501073.060673] [ 697622] 0 697622 4494 16 57344 0 0 exe [11501073.069150] [ 697625] 0 697625 4151 21 28672 0 0 exe [11501073.077627] [ 697626] 0 697626 4151 21 28672 0 0 exe [11501073.086109] [ 697627] 0 697627 4133 18 28672 0 0 exe [11501073.094586] [ 697628] 0 697628 4151 21 28672 0 0 exe [11501073.103067] [ 697629] 0 697629 4151 21 28672 0 0 exe [11501073.111545] [ 697631] 0 697631 4494 16 57344 0 0 exe [11501073.120044] [ 697639] 0 697639 4151 21 28672 0 0 exe [11501073.128522] [ 697646] 0 697646 4151 21 28672 0 0 exe [11501073.137005] [ 697647] 0 697647 4151 21 28672 0 0 exe [11501073.145485] [ 697648] 0 697648 4133 18 28672 0 0 exe [11501073.153969] [ 697649] 0 697649 4212 21 53248 0 0 exe [11501073.162471] [ 697650] 0 697650 4467 18 69632 0 0 exe [11501073.170972] [ 697651] 0 697651 4145 20 28672 0 0 exe [11501073.179452] [ 697653] 0 697653 4133 18 28672 0 0 exe [11501073.187944] [ 697654] 0 697654 4151 21 28672 0 0 exe [11501073.196433] [ 697652] 0 697652 105692 71130 790528 0 0 exe [11501073.204930] [ 697655] 0 697655 4485 21 69632 0 0 exe [11501073.213429] [ 697656] 0 697656 4133 18 28672 0 0 exe [11501073.221928] [ 697657] 0 697657 4151 21 28672 0 0 exe [11501073.230406] [ 697658] 0 697658 4145 20 28672 0 0 exe [11501073.238880] [ 697659] 0 697659 4133 25 28672 0 0 exe [11501073.247354] [ 697660] 0 697660 4151 21 28672 0 0 exe [11501073.255830] [ 697661] 0 697661 4133 18 28672 0 0 exe [11501073.264322] [ 697662] 0 697662 4133 18 28672 0 0 exe [11501073.272796] [ 697663] 0 697663 4494 16 57344 0 0 exe [11501073.281278] [ 697664] 0 697664 4151 21 28672 0 0 exe [11501073.289756] [ 697665] 0 697665 4485 21 69632 0 0 exe [11501073.298231] [ 697666] 0 697666 4151 21 28672 0 0 exe [11501073.306709] [ 697667] 0 697667 4133 25 28672 0 0 exe [11501073.315211] [ 697668] 0 697668 4151 21 28672 0 0 exe [11501073.323808] [ 697669] 0 697669 4151 21 28672 0 0 exe [11501073.332296] [ 697670] 0 697670 4151 21 28672 0 0 exe [11501073.340782] [ 697671] 0 697671 4494 16 57344 0 0 exe [11501073.349261] [ 697672] 0 697672 4151 21 28672 0 0 exe [11501073.357739] [ 697673] 0 697673 4151 21 28672 0 0 exe [11501073.366213] [ 697674] 0 697674 4133 18 28672 0 0 exe [11501073.374697] [ 697675] 0 697675 4145 20 28672 0 0 exe [11501073.383164] [ 697676] 0 697676 4133 18 28672 0 0 exe [11501073.391638] [ 697677] 0 697677 4151 21 28672 0 0 exe [11501073.400190] [ 697678] 0 697678 4133 18 28672 0 0 exe [11501073.408745] [ 697680] 0 697680 4157 22 36864 0 0 exe [11501073.417245] [ 697684] 0 697684 4145 20 28672 0 0 exe [11501073.425715] [ 697687] 0 697687 105692 71130 790528 0 0 exe [11501073.434217] [ 697688] 0 697688 105692 71130 790528 0 0 exe [11501073.442694] [ 697689] 0 697689 4145 20 28672 0 0 exe [11501073.451172] [ 697690] 0 697690 105692 71130 790528 0 0 exe [11501073.459663] [ 697692] 0 697692 4151 21 28672 0 0 exe [11501073.468150] [ 697700] 0 697700 4151 21 28672 0 0 exe [11501073.476637] [ 697742] 0 697742 105692 71130 790528 0 0 exe [11501073.485125] [ 697746] 0 697746 105692 71130 790528 0 0 exe [11501073.493610] [ 697748] 0 697748 105692 71130 790528 0 0 exe [11501073.502092] [ 697788] 0 697788 4151 21 28672 0 0 exe [11501073.510575] [ 697800] 0 697800 105692 71130 790528 0 0 exe [11501073.519068] [ 697809] 0 697809 4157 22 36864 0 0 exe [11501073.527557] [ 697894] 0 697894 105692 71130 790528 0 0 exe [11501073.536044] [ 698176] 0 698176 4157 22 28672 0 0 exe [11501073.544529] [ 698330] 0 698330 4151 21 28672 0 0 exe [11501073.553011] [ 698352] 0 698352 105692 71130 790528 0 0 exe [11501073.561491] [ 698353] 0 698353 105692 71130 790528 0 0 exe [11501073.569970] [ 698375] 0 698375 4151 21 28672 0 0 exe [11501073.578473] [ 698376] 0 698376 105692 71130 790528 0 0 exe [11501073.586972] [ 698399] 0 698399 105692 71130 790528 0 0 exe [11501073.595471] [ 698401] 0 698401 104233 69238 839680 0 0 exe [11501073.603956] [ 698403] 0 698403 104233 69238 839680 0 0 exe [11501073.612454] [ 698415] 0 698415 105692 71130 790528 0 0 exe [11501073.620946] [ 698431] 0 698431 104233 69238 839680 0 0 exe [11501073.629448] [ 698432] 0 698432 104233 69238 839680 0 0 exe [11501073.637929] [ 698457] 0 698457 4133 16 28672 0 0 exe [11501073.646407] [ 698458] 0 698458 4133 16 28672 0 0 exe [11501073.654885] [ 698459] 0 698459 6351 20 98304 0 0 exe [11501073.663360] [ 698461] 0 698461 6351 20 98304 0 0 exe [11501073.671837] [ 698462] 0 698462 4145 20 28672 0 0 exe [11501073.680324] [ 698463] 0 698463 4145 20 28672 0 0 exe [11501073.688814] [ 698464] 0 698464 4133 16 28672 0 0 exe [11501073.697833] [ 698465] 0 698465 4133 16 28672 0 0 exe [11501073.706327] [ 698466] 0 698466 4133 16 28672 0 0 exe [11501073.714821] [ 698467] 0 698467 4133 16 28672 0 0 exe [11501073.723308] [ 698468] 0 698468 4133 16 28672 0 0 exe [11501073.731791] [ 698469] 0 698469 4133 16 28672 0 0 exe [11501073.740362] [ 698470] 0 698470 4133 16 28672 0 0 exe [11501073.748854] [ 698471] 0 698471 4133 16 28672 0 0 exe [11501073.757338] [ 698472] 0 698472 4133 16 28672 0 0 exe [11501073.765805] [ 698473] 0 698473 4133 16 28672 0 0 exe [11501073.774359] [ 698475] 0 698475 6351 20 98304 0 0 exe [11501073.782842] [ 698476] 0 698476 4145 20 28672 0 0 exe [11501073.791325] [ 698480] 0 698480 105692 71130 790528 0 0 exe [11501073.799786] [ 698489] 0 698489 6351 20 98304 0 0 exe [11501073.808273] [ 698516] 0 698516 4145 20 28672 0 0 exe [11501073.816743] [ 698857] 0 698857 103587 69076 823296 0 0 exe [11501073.825219] [ 698871] 0 698871 103587 69076 823296 0 0 exe [11501073.833698] [ 698957] 0 698957 6284 21 94208 0 0 exe [11501073.842185] [ 699027] 0 699027 4506 18 57344 0 0 exe [11501073.850754] [ 699028] 0 699028 4506 18 57344 0 0 exe [11501073.859245] [ 699031] 0 699031 4485 21 69632 0 0 exe [11501073.867705] [ 699035] 0 699035 4485 21 69632 0 0 exe [11501073.876184] [ 699064] 0 699064 4151 21 28672 0 0 exe [11501073.884654] [ 699115] 0 699115 415237 9183 417792 0 0 image [11501073.893298] [ 699116] 0 699116 4485 21 69632 0 0 exe [11501073.901769] [ 699133] 0 699133 470472 10223 442368 0 0 exe [11501073.910239] [ 699134] 0 699134 900916 18177 794624 0 0 exe [11501073.918702] [ 699187] 0 699187 4133 17 28672 0 0 exe [11501073.927168] [ 699190] 0 699190 4133 17 28672 0 0 exe [11501073.935629] [ 699203] 0 699203 32774 2866 253952 0 0 exe [11501073.944100] [ 699204] 0 699204 32774 2866 253952 0 0 exe [11501073.952569] [ 699208] 0 699208 32774 2866 253952 0 0 exe [11501073.961063] [ 699209] 0 699209 32774 2866 253952 0 0 exe [11501073.969540] [ 699210] 0 699210 32774 2866 253952 0 0 exe [11501073.978100] [ 699224] 0 699224 470440 9076 442368 0 0 image [11501073.986744] [ 699235] 0 699235 23048 7202 233472 0 0 exe [11501073.995210] [ 699236] 0 699236 23048 7202 233472 0 0 exe [11501074.003668] [ 699237] 0 699237 23048 7202 233472 0 0 exe [11501074.012134] [ 699240] 0 699240 23048 7202 233472 0 0 exe [11501074.020622] [ 699241] 0 699241 23048 7202 233472 0 0 exe [11501074.029618] [ 699244] 0 699244 23048 7202 233472 0 0 exe [11501074.038080] [ 699245] 0 699245 23048 7202 233472 0 0 exe [11501074.046544] [ 699253] 0 699253 4345 18 81920 0 0 exe [11501074.055011] [ 699254] 0 699254 4345 18 81920 0 0 exe [11501074.063563] [ 699260] 0 699260 4653 18 86016 0 0 exe [11501074.072031] [ 699262] 0 699262 4653 18 86016 0 0 exe [11501074.080495] [ 699357] 0 699357 6107 19 94208 0 0 exe [11501074.088965] [ 699358] 0 699358 6107 19 94208 0 0 exe [11501074.097441] [ 699359] 0 699359 4151 21 36864 0 0 exe [11501074.105901] [ 699363] 0 699363 6107 19 94208 0 0 exe [11501074.114362] [ 699381] 0 699381 452167 10237 421888 0 0 image [11501074.122998] [ 699389] 0 699389 433446 9942 421888 0 0 image [11501074.131719] [ 699421] 0 699421 433414 9787 425984 0 0 exe [11501074.140196] [ 699422] 0 699422 949114 19896 831488 0 0 exe [11501074.148662] [ 699435] 0 699435 18543 6580 212992 0 0 exe [11501074.157149] [ 699485] 0 699485 539 1 49152 0 0 exe [11501074.165708] [ 699496] 0 699496 602 1 61440 0 0 exe [11501074.174280] [ 699507] 0 699507 1 1 12288 0 0 exe [11501074.183458] [ 699515] 0 699515 37102 20194 368640 0 0 exe [11501074.191928] [ 699517] 0 699517 37102 20194 368640 0 0 exe [11501074.200393] [ 699518] 0 699518 37102 20194 368640 0 0 exe [11501074.208856] [ 699533] 0 699533 28300 2799 237568 0 0 exe [11501074.217325] [ 699546] 0 699546 1 1 12288 0 0 exe [11501074.225875] [ 699705] 0 699705 4151 21 28672 0 0 exe [11501074.234353] [ 699710] 0 699710 4151 21 28672 0 0 exe [11501074.244208] [ 699802] 0 699802 4151 21 28672 0 0 exe [11501074.252763] [ 699819] 0 699819 103587 69076 823296 0 0 exe [11501074.261247] [ 699822] 0 699822 4151 21 28672 0 0 exe [11501074.269723] [ 699824] 0 699824 4151 21 28672 0 0 exe [11501074.278198] [ 699858] 0 699858 4157 22 36864 0 0 exe [11501074.286674] [ 699966] 0 699966 4157 22 28672 0 0 exe [11501074.295148] [ 699967] 0 699967 4151 21 28672 0 0 exe [11501074.303616] [ 699968] 0 699968 4151 21 28672 0 0 exe [11501074.312083] [ 699972] 0 699972 4151 21 28672 0 0 exe [11501074.320552] [ 700153] 0 700153 4169 24 28672 0 0 exe [11501074.329029] [ 700235] 0 700235 4163 23 28672 0 0 exe [11501074.337492] [ 700396] 0 700396 4151 21 28672 0 0 exe [11501074.345987] [ 700397] 0 700397 4151 21 28672 0 0 exe [11501074.354450] [ 700422] 0 700422 4151 21 28672 0 0 exe [11501074.362915] [ 700546] 0 700546 1 1 12288 0 0 exe [11501074.371382] [ 700548] 0 700548 1 1 12288 0 0 exe [11501074.379851] [ 700556] 0 700556 1 1 12288 0 0 exe [11501074.388325] [ 700558] 0 700558 1 1 12288 0 0 exe [11501074.396796] [ 700564] 0 700564 1 1 12288 0 0 exe [11501074.405901] [ 700722] 0 700722 4157 22 28672 0 0 exe [11501074.414366] [ 700723] 0 700723 4157 22 28672 0 0 exe [11501074.422828] [ 700753] 0 700753 4151 19 28672 0 0 exe [11501074.431307] [ 701152] 0 701152 4157 22 28672 0 0 exe [11501074.439771] [ 701201] 0 701201 4157 22 28672 0 0 exe [11501074.448323] [ 701214] 0 701214 4151 21 28672 0 0 exe [11501074.456788] [ 701237] 0 701237 4151 21 28672 0 0 exe [11501074.465261] [ 701455] 0 701455 4163 23 28672 0 0 exe [11501074.473726] [ 701527] 0 701527 88839 52103 778240 0 0 exe [11501074.482203] [ 701529] 0 701529 88839 52103 778240 0 0 exe [11501074.490669] [ 701530] 0 701530 88839 52103 778240 0 0 exe [11501074.499166] [ 702117] 0 702117 4545 21 81920 0 0 exe [11501074.507653] [ 702193] 0 702193 4157 22 28672 0 0 exe [11501074.516119] [ 702215] 0 702215 4145 20 28672 0 0 exe [11501074.524598] [ 702249] 0 702249 4145 20 28672 0 0 exe [11501074.533064] [ 702372] 0 702372 4151 21 28672 0 0 exe [11501074.541536] [ 702375] 0 702375 4151 21 28672 0 0 exe [11501074.550002] [ 702376] 0 702376 4151 21 28672 0 0 exe [11501074.558463] [ 702387] 0 702387 4151 21 28672 0 0 exe [11501074.566929] [ 702436] 0 702436 4145 20 36864 0 0 exe [11501074.575391] [ 702438] 0 702438 4145 20 36864 0 0 exe [11501074.584030] [ 702528] 0 702528 4151 21 28672 0 0 exe [11501074.592500] [ 703105] 0 703105 4157 22 28672 0 0 exe [11501074.600976] [ 703107] 0 703107 4151 21 28672 0 0 exe [11501074.610231] [ 703110] 0 703110 4151 21 28672 0 0 exe [11501074.618708] [ 703111] 0 703111 4151 21 28672 0 0 exe [11501074.627257] [ 703112] 0 703112 4151 21 28672 0 0 exe [11501074.635813] [ 703160] 0 703160 4302 22 73728 0 0 exe [11501074.644275] [ 703168] 0 703168 4163 23 28672 0 0 exe [11501074.652748] [ 703170] 0 703170 4163 23 28672 0 0 exe [11501074.661218] [ 703185] 0 703185 4157 22 28672 0 0 exe [11501074.669686] [ 703349] 65534 703349 1 1 12288 0 0 exe [11501074.678152] [ 703392] 0 703392 4545 21 81920 0 0 exe [11501074.686633] [ 703465] 0 703465 4551 22 81920 0 0 exe [11501074.695143] [ 703466] 0 703466 4551 22 81920 0 0 exe [11501074.703687] [ 703474] 0 703474 4151 21 28672 0 0 exe [11501074.712280] [ 703483] 0 703483 4551 22 81920 0 0 exe [11501074.720767] [ 703492] 0 703492 4157 22 28672 0 0 exe [11501074.729255] [ 703500] 0 703500 4302 22 73728 0 0 exe [11501074.737721] [ 703643] 0 703643 105692 71130 790528 0 0 exe [11501074.746186] [ 703644] 0 703644 105692 71130 790528 0 0 exe [11501074.754648] [ 703645] 0 703645 105692 71130 790528 0 0 exe [11501074.763119] [ 703646] 0 703646 105692 71130 790528 0 0 exe [11501074.771605] [ 703724] 0 703724 4551 22 81920 0 0 exe [11501074.780768] [ 703827] 0 703827 4545 21 81920 0 0 exe [11501074.789252] [ 703887] 0 703887 36822 20338 352256 0 0 exe [11501074.797718] [ 704040] 0 704040 4163 23 28672 0 0 exe [11501074.806651] [ 704065] 0 704065 4151 21 36864 0 0 exe [11501074.815133] [ 704067] 0 704067 4151 21 36864 0 0 exe [11501074.823625] [ 704078] 0 704078 4151 21 36864 0 0 exe [11501074.832115] [ 704112] 0 704112 4151 21 36864 0 0 exe [11501074.840582] [ 704113] 0 704113 4151 21 36864 0 0 exe [11501074.849047] [ 704140] 0 704140 104233 69238 839680 0 0 exe [11501074.857529] [ 704178] 0 704178 4145 20 36864 0 0 exe [11501074.866000] [ 704179] 0 704179 4145 20 36864 0 0 exe [11501074.874468] [ 704291] 0 704291 4151 21 28672 0 0 exe [11501074.882949] [ 704292] 0 704292 4151 21 28672 0 0 exe [11501074.891417] [ 704295] 0 704295 4151 21 28672 0 0 exe [11501074.899896] [ 704361] 0 704361 4145 20 36864 0 0 exe [11501074.908364] [ 704362] 0 704362 4145 20 36864 0 0 exe [11501074.916843] [ 704426] 0 704426 4151 21 36864 0 0 exe [11501074.925320] [ 704430] 0 704430 4163 23 28672 0 0 exe [11501074.933795] [ 704490] 0 704490 4145 20 36864 0 0 exe [11501074.942351] [ 704491] 0 704491 4145 20 36864 0 0 exe [11501074.950819] [ 704492] 0 704492 4151 21 36864 0 0 exe [11501074.959315] [ 704494] 0 704494 1 1 12288 0 0 exe [11501074.967791] [ 704572] 0 704572 4212 21 53248 0 0 exe [11501074.976264] [ 704573] 0 704573 4212 21 53248 0 0 exe [11501074.984738] [ 704575] 0 704575 4151 21 36864 0 0 exe [11501074.993220] [ 704576] 0 704576 4151 21 36864 0 0 exe [11501075.001683] [ 704577] 0 704577 4212 21 53248 0 0 exe [11501075.010148] [ 704578] 0 704578 4539 20 81920 0 0 exe [11501075.018633] [ 704580] 0 704580 4151 21 36864 0 0 exe [11501075.027108] [ 704581] 0 704581 4151 21 36864 0 0 exe [11501075.035667] [ 704585] 0 704585 4559 21 73728 0 0 exe [11501075.044137] [ 704586] 0 704586 4559 21 73728 0 0 exe [11501075.052617] [ 704768] 0 704768 4151 21 36864 0 0 exe [11501075.061089] [ 704936] 0 704936 4139 19 36864 0 0 exe [11501075.069554] [ 704939] 0 704939 4151 21 36864 0 0 exe [11501075.078104] [ 704950] 0 704950 4163 23 28672 0 0 exe [11501075.086574] [ 705275] 0 705275 103587 69076 823296 0 0 exe [11501075.095037] [ 705276] 0 705276 103587 69076 823296 0 0 exe [11501075.103498] [ 705277] 0 705277 103587 69076 823296 0 0 exe [11501075.111968] [ 705324] 0 705324 4151 21 36864 0 0 exe [11501075.120435] [ 705328] 0 705328 48587 44044 438272 0 0 exe [11501075.128918] [ 705329] 0 705329 48587 44044 438272 0 0 exe [11501075.137479] [ 705330] 0 705330 48587 44044 438272 0 0 exe [11501075.145964] [ 705359] 65534 705359 1 1 12288 0 0 exe [11501075.154439] [ 705371] 0 705371 4175 25 28672 0 0 exe [11501075.162901] [ 705372] 0 705372 4175 25 28672 0 0 exe [11501075.171360] [ 705392] 0 705392 4151 21 36864 0 0 exe [11501075.179831] [ 705600] 0 705600 4151 21 36864 0 0 exe [11501075.188306] [ 705604] 0 705604 103587 69076 823296 0 0 exe [11501075.196773] [ 705605] 0 705605 103587 69076 823296 0 0 exe [11501075.205246] [ 705791] 0 705791 48587 44044 438272 0 0 exe [11501075.213839] [ 705792] 0 705792 48587 44044 438272 0 0 exe [11501075.222311] [ 705804] 0 705804 4151 21 28672 0 0 exe [11501075.230772] [ 705812] 0 705812 1 1 12288 0 0 exe [11501075.239250] [ 705845] 0 705845 4157 22 28672 0 0 exe [11501075.247712] [ 705846] 0 705846 4145 18 28672 0 0 exe [11501075.256198] [ 705847] 0 705847 4157 22 28672 0 0 exe [11501075.264674] [ 705848] 0 705848 4133 16 28672 0 0 exe [11501075.273237] [ 705849] 0 705849 4133 16 28672 0 0 exe [11501075.281707] [ 705850] 0 705850 4133 16 28672 0 0 exe [11501075.290179] [ 705852] 0 705852 4145 18 28672 0 0 exe [11501075.298651] [ 705851] 0 705851 4133 16 28672 0 0 exe [11501075.307127] [ 705853] 0 705853 4133 16 28672 0 0 exe [11501075.315604] [ 705854] 0 705854 4133 16 28672 0 0 exe [11501075.324068] [ 705856] 0 705856 4133 16 28672 0 0 exe [11501075.332531] [ 705855] 0 705855 4133 16 28672 0 0 exe [11501075.340992] [ 705857] 0 705857 4133 16 28672 0 0 exe [11501075.349515] [ 705858] 0 705858 4133 16 28672 0 0 exe [11501075.358010] [ 705859] 0 705859 4133 16 28672 0 0 exe [11501075.366582] [ 705860] 0 705860 4133 16 28672 0 0 exe [11501075.375147] [ 705861] 0 705861 4133 16 28672 0 0 exe [11501075.383617] [ 705864] 0 705864 4133 16 28672 0 0 exe [11501075.392115] [ 705862] 0 705862 4133 16 28672 0 0 exe [11501075.400598] [ 705863] 0 705863 4145 18 28672 0 0 exe [11501075.409068] [ 705865] 0 705865 4133 16 28672 0 0 exe [11501075.417621] [ 705866] 0 705866 4157 22 28672 0 0 exe [11501075.426078] [ 705867] 0 705867 4133 16 28672 0 0 exe [11501075.434542] [ 705868] 0 705868 4133 16 28672 0 0 exe [11501075.443000] [ 705869] 0 705869 4133 16 28672 0 0 exe [11501075.451497] [ 705870] 0 705870 4133 16 28672 0 0 exe [11501075.460054] [ 705871] 0 705871 4157 22 28672 0 0 exe [11501075.468528] [ 705872] 0 705872 4145 18 28672 0 0 exe [11501075.477007] [ 705873] 0 705873 4133 16 28672 0 0 exe [11501075.485482] [ 705874] 0 705874 4133 16 28672 0 0 exe [11501075.493944] [ 705875] 0 705875 4133 16 28672 0 0 exe [11501075.502500] [ 705876] 0 705876 4133 16 28672 0 0 exe [11501075.511057] [ 705877] 0 705877 4133 16 28672 0 0 exe [11501075.519615] [ 705878] 0 705878 4157 22 28672 0 0 exe [11501075.528081] [ 705879] 0 705879 4133 16 28672 0 0 exe [11501075.536553] [ 705880] 0 705880 4157 22 28672 0 0 exe [11501075.545019] [ 705881] 0 705881 4133 16 28672 0 0 exe [11501075.553489] [ 705882] 0 705882 4133 16 28672 0 0 exe [11501075.561959] [ 705883] 0 705883 4133 16 28672 0 0 exe [11501075.570422] [ 705884] 0 705884 4133 16 28672 0 0 exe [11501075.578897] [ 705885] 0 705885 4133 16 28672 0 0 exe [11501075.587374] [ 705886] 0 705886 4133 16 28672 0 0 exe [11501075.595834] [ 705887] 0 705887 4163 23 28672 0 0 exe [11501075.604297] [ 705888] 0 705888 4133 16 28672 0 0 exe [11501075.612760] [ 705889] 0 705889 4133 16 28672 0 0 exe [11501075.621229] [ 705890] 0 705890 4133 16 28672 0 0 exe [11501075.629697] [ 705891] 0 705891 4133 16 28672 0 0 exe [11501075.638189] [ 705892] 0 705892 4133 16 28672 0 0 exe [11501075.646648] [ 705893] 0 705893 4133 16 28672 0 0 exe [11501075.655108] [ 705894] 0 705894 4133 16 28672 0 0 exe [11501075.663568] [ 705895] 0 705895 4163 23 28672 0 0 exe [11501075.672037] [ 705896] 0 705896 4133 16 28672 0 0 exe [11501075.680508] [ 705897] 0 705897 4133 16 28672 0 0 exe [11501075.688999] [ 705898] 0 705898 4133 16 28672 0 0 exe [11501075.697569] [ 705899] 0 705899 4133 16 28672 0 0 exe [11501075.706040] [ 705900] 0 705900 4133 16 28672 0 0 exe [11501075.714504] [ 705901] 0 705901 4133 16 28672 0 0 exe [11501075.722963] [ 705903] 0 705903 4133 16 28672 0 0 exe [11501075.731426] [ 705902] 0 705902 4133 16 28672 0 0 exe [11501075.739896] [ 705904] 0 705904 4133 16 28672 0 0 exe [11501075.748453] [ 705905] 0 705905 4133 16 28672 0 0 exe [11501075.757000] [ 705906] 0 705906 4133 16 28672 0 0 exe [11501075.765475] [ 705907] 0 705907 4133 16 28672 0 0 exe [11501075.773941] [ 705908] 0 705908 4163 23 28672 0 0 exe [11501075.782405] [ 705910] 0 705910 4163 23 28672 0 0 exe [11501075.790867] [ 705909] 0 705909 4169 24 28672 0 0 exe [11501075.799331] [ 705911] 0 705911 4133 16 28672 0 0 exe [11501075.807797] [ 705912] 0 705912 6981 22 98304 0 0 exe [11501075.816262] [ 705913] 0 705913 4133 16 28672 0 0 exe [11501075.824735] [ 705914] 0 705914 4133 16 28672 0 0 exe [11501075.833215] [ 705915] 0 705915 4133 16 28672 0 0 exe [11501075.841684] [ 705916] 0 705916 6981 22 98304 0 0 exe [11501075.850158] [ 705917] 0 705917 4169 24 28672 0 0 exe [11501075.858626] [ 705918] 0 705918 4133 16 28672 0 0 exe [11501075.867086] [ 705919] 0 705919 4157 22 28672 0 0 exe [11501075.875551] [ 705920] 0 705920 4163 23 28672 0 0 exe [11501075.884047] [ 705921] 0 705921 4157 22 28672 0 0 exe [11501075.892515] [ 705923] 0 705923 4163 23 28672 0 0 exe [11501075.900985] [ 705924] 0 705924 4157 22 28672 0 0 exe [11501075.909481] [ 705925] 0 705925 4163 23 28672 0 0 exe [11501075.917945] [ 705926] 0 705926 4157 22 28672 0 0 exe [11501075.926411] [ 705943] 0 705943 4157 22 28672 0 0 exe [11501075.934875] [ 705972] 0 705972 4163 23 28672 0 0 exe [11501075.943333] [ 705973] 0 705973 4163 23 28672 0 0 exe [11501075.951886] [ 705974] 0 705974 4163 23 28672 0 0 exe [11501075.960346] [ 705975] 0 705975 4163 23 28672 0 0 exe [11501075.968896] [ 705976] 0 705976 4157 22 28672 0 0 exe [11501075.977367] [ 705978] 0 705978 4157 22 28672 0 0 exe [11501075.985836] [ 706024] 0 706024 4163 23 28672 0 0 exe [11501075.994306] [ 706108] 0 706108 4169 24 28672 0 0 exe [11501076.002780] [ 706121] 0 706121 4151 21 36864 0 0 exe [11501076.011260] [ 706122] 0 706122 4151 21 36864 0 0 exe [11501076.019735] [ 706125] 0 706125 4151 21 36864 0 0 exe [11501076.028198] [ 706126] 0 706126 4151 21 36864 0 0 exe [11501076.036743] [ 706127] 0 706127 4151 21 36864 0 0 exe [11501076.045212] [ 706131] 0 706131 4169 24 28672 0 0 exe [11501076.053680] [ 706164] 0 706164 4169 24 28672 0 0 exe [11501076.062152] [ 706165] 0 706165 4169 24 28672 0 0 exe [11501076.070702] [ 706166] 0 706166 4169 24 28672 0 0 exe [11501076.079177] [ 706167] 0 706167 4151 21 28672 0 0 exe [11501076.087640] [ 706175] 0 706175 4151 21 28672 0 0 exe [11501076.096108] [ 706176] 0 706176 4559 21 53248 0 0 exe [11501076.104580] [ 706213] 0 706213 4139 19 28672 0 0 exe [11501076.113044] [ 706295] 0 706295 4163 23 28672 0 0 exe [11501076.121521] [ 706311] 0 706311 4485 21 69632 0 0 exe [11501076.130006] [ 706390] 0 706390 4145 20 28672 0 0 exe [11501076.138476] [ 706403] 0 706403 4163 23 28672 0 0 exe [11501076.146937] [ 706418] 0 706418 6806 23 98304 0 0 exe [11501076.155417] [ 706419] 0 706419 6806 23 98304 0 0 exe [11501076.163883] [ 706452] 0 706452 4139 19 28672 0 0 exe [11501076.172357] [ 706453] 0 706453 4151 21 28672 0 0 exe [11501076.180828] [ 706454] 0 706454 4151 21 28672 0 0 exe [11501076.189296] [ 706471] 0 706471 4551 22 81920 0 0 exe [11501076.197760] [ 706472] 0 706472 4151 21 28672 0 0 exe [11501076.206224] [ 706474] 0 706474 4151 21 28672 0 0 exe [11501076.214685] [ 706478] 0 706478 4151 21 28672 0 0 exe [11501076.223157] [ 706523] 0 706523 4145 20 28672 0 0 exe [11501076.231641] [ 706524] 0 706524 4145 20 28672 0 0 exe [11501076.240106] [ 706700] 0 706700 4163 23 28672 0 0 exe [11501076.248571] [ 706810] 0 706810 4151 21 28672 0 0 exe [11501076.257045] [ 706812] 0 706812 4163 23 28672 0 0 exe [11501076.265519] [ 706834] 0 706834 4151 21 28672 0 0 exe [11501076.273979] [ 706835] 0 706835 4151 21 28672 0 0 exe [11501076.282441] [ 706851] 0 706851 4157 22 36864 0 0 exe [11501076.290900] [ 706852] 0 706852 4157 22 36864 0 0 exe [11501076.299455] [ 706856] 0 706856 4151 21 28672 0 0 exe [11501076.308007] [ 706857] 0 706857 4157 22 36864 0 0 exe [11501076.316475] [ 706927] 0 706927 4145 19 36864 0 0 exe [11501076.324941] [ 706928] 0 706928 4151 21 36864 0 0 exe [11501076.333508] [ 706985] 0 706985 4151 21 36864 0 0 exe [11501076.341995] [ 707090] 0 707090 4151 21 28672 0 0 exe [11501076.350447] rcu: INFO: rcu_sched self-detected stall on CPU [11501076.350450] rcu: 24-....: (2449 ticks this GP) idle=fd2/1/0x4000000000000000 softirq=1207888855/1207888855 fqs=2415 [11501076.350453] (t=5250 jiffies g=2095195277 q=7476) [11501076.350455] NMI backtrace for cpu 24 [11501076.350457] CPU: 24 PID: 653819 Comm: exe Tainted: G L 5.9.0-0.bpo.5-cloud-amd64 #1 Debian 5.9.15-1~bpo10+1 [11501076.350458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [11501076.350458] Call Trace: [11501076.350461] [11501076.350467] dump_stack+0x6d/0x88 [11501076.350469] nmi_cpu_backtrace.cold.8+0x13/0x50 [11501076.350471] ? lapic_can_unplug_cpu+0x80/0x80 [11501076.350473] nmi_trigger_cpumask_backtrace+0xf9/0x100 [11501076.350476] rcu_dump_cpu_stacks+0xab/0xd9 [11501076.350477] rcu_sched_clock_irq.cold.94+0x109/0x365 [11501076.350480] ? trigger_load_balance+0x5c/0x220 [11501076.350482] ? tick_sched_do_timer+0x60/0x60 [11501076.350483] update_process_times+0x24/0x50 [11501076.350485] tick_sched_handle.isra.22+0x1f/0x60 [11501076.350486] tick_sched_timer+0x65/0x80 [11501076.350487] __hrtimer_run_queues+0x100/0x280 [11501076.350488] hrtimer_interrupt+0x100/0x220 [11501076.350490] __sysvec_apic_timer_interrupt+0x5d/0xf0 [11501076.350492] asm_call_irq_on_stack+0x12/0x20 [11501076.350493] [11501076.350495] sysvec_apic_timer_interrupt+0x73/0x80 [11501076.350496] asm_sysvec_apic_timer_interrupt+0x12/0x20 [11501076.350498] RIP: 0010:console_unlock+0x369/0x4d0 [11501076.350500] Code: 85 ed fc ff ff e9 4a ff ff ff 89 ea 48 c7 c6 80 a8 a1 b1 4c 89 f7 e8 f6 c0 92 00 e9 8c fe ff ff e8 dc 23 00 00 4c 89 ff 57 9d <0f> 1f 44 00 00 8b 04 24 85 c0 0f 84 fc fc ff ff e8 32 b8 71 00 e9 [11501076.350500] RSP: 0018:ffffad7905b67a30 EFLAGS: 00000247 [11501076.350502] RAX: 0000000000000001 RBX: ffffffffb153bf20 RCX: 0000000000000000 [11501076.350502] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000247 [11501076.350503] RBP: 000000000000005f R08: 0720072007200720 R09: 0720072007200720 [11501076.350503] R10: 0720072007200720 R11: 0720072007200720 R12: ffffffffb1a1b490 [11501076.350504] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000247 [11501076.350506] vprintk_emit+0x184/0x290 [11501076.350507] printk+0x58/0x6f [11501076.350510] dump_task+0x114/0x130 [11501076.350512] dump_header+0x160/0x1d8 [11501076.350513] oom_kill_process.cold.36+0xb/0x10 [11501076.350514] out_of_memory+0x1a8/0x4d0 [11501076.350516] __alloc_pages_slowpath.constprop.111+0xbeb/0xcd0 [11501076.350518] __alloc_pages_nodemask+0x2de/0x310 [11501076.350520] alloc_pages_vma+0x74/0x1e0 [11501076.350522] wp_page_copy+0x47d/0x7a0 [11501076.350524] handle_mm_fault+0x5ff/0x1660 [11501076.350526] exc_page_fault+0x290/0x550 [11501076.350527] ? asm_exc_page_fault+0x8/0x30 [11501076.350528] asm_exc_page_fault+0x1e/0x30 [11501076.350529] RIP: 0033:0x26fb438 [11501076.350534] Code: Unable to access opcode bytes at RIP 0x26fb40e. [11501076.350535] RSP: 002b:00007f77c6ffd230 EFLAGS: 00010246 [11501076.350536] RAX: 00002185f0acb000 RBX: 0000000003ffe010 RCX: 0000000000000000 [11501076.350536] RDX: 000000000dc7cbff RSI: 00002185f0acb000 RDI: 00007f7cabdda700 [11501076.350536] RBP: 000000c00116b190 R08: 00000000017e8810 R09: 00000000000000cb [11501076.350537] R10: 000000000dc7cb00 R11: 00007f7ac4f51e38 R12: 000000c00116b158 [11501076.350537] R13: 000000c01f586000 R14: 000000c000df2000 R15: 000000c00116c000 [11501076.668628] [ 707250] 0 707250 396868 9679 413696 0 0 image [11501076.677280] [ 707270] 0 707270 435846 9512 442368 0 0 exe [11501076.685749] [ 707272] 0 707272 1380297 96934 2056192 0 0 exe [11501076.694212] [ 707303] 0 707303 4157 22 28672 0 0 exe [11501076.702683] [ 707325] 0 707325 1 0 12288 0 0 exe [11501076.711152] [ 707346] 0 707346 28785 3128 237568 0 0 exe [11501076.719623] [ 707568] 0 707568 4145 20 28672 0 0 exe [11501076.728095] [ 707569] 0 707569 4145 20 28672 0 0 exe [11501076.736558] [ 707570] 0 707570 4151 21 28672 0 0 exe [11501076.745027] [ 707582] 0 707582 4151 21 28672 0 0 exe [11501076.753595] [ 707589] 0 707589 4151 21 28672 0 0 exe [11501076.762064] [ 707590] 0 707590 4151 21 28672 0 0 exe [11501076.770534] [ 707605] 0 707605 4151 21 28672 0 0 exe [11501076.779000] [ 707622] 0 707622 4151 19 28672 0 0 exe [11501076.787476] [ 707623] 0 707623 4151 19 28672 0 0 exe [11501076.795949] [ 707625] 0 707625 4151 21 28672 0 0 exe [11501076.804413] [ 707626] 0 707626 4151 21 28672 0 0 exe [11501076.812891] [ 707629] 0 707629 4145 20 28672 0 0 exe [11501076.821363] [ 707639] 0 707639 4145 20 28672 0 0 exe [11501076.829825] [ 707642] 0 707642 4157 22 28672 0 0 exe [11501076.838296] [ 707645] 0 707645 4163 23 28672 0 0 exe [11501076.846756] [ 707647] 0 707647 4157 22 28672 0 0 exe [11501076.855229] [ 707673] 0 707673 104233 69238 839680 0 0 exe [11501076.863696] [ 707674] 0 707674 104233 69238 839680 0 0 exe [11501076.872171] [ 707737] 0 707737 4151 21 36864 0 0 exe [11501076.880728] [ 707767] 0 707767 4139 18 36864 0 0 exe [11501076.889203] [ 707865] 0 707865 104233 69238 839680 0 0 exe [11501076.897678] [ 707880] 0 707880 4163 23 28672 0 0 exe [11501076.906152] [ 707892] 0 707892 4145 20 28672 0 0 exe [11501076.914626] [ 707894] 0 707894 4151 21 28672 0 0 exe [11501076.923091] [ 707895] 0 707895 4151 21 28672 0 0 exe [11501076.931553] [ 707918] 0 707918 4151 21 36864 0 0 exe [11501076.940018] [ 707932] 0 707932 4151 21 28672 0 0 exe [11501076.948489] [ 707945] 0 707945 104233 69238 839680 0 0 exe [11501076.956950] [ 707946] 0 707946 4169 24 28672 0 0 exe [11501076.965435] [ 708048] 0 708048 103587 69076 823296 0 0 exe [11501076.973908] [ 708050] 0 708050 378371 9362 405504 0 0 image [11501076.982563] [ 708062] 0 708062 396517 8802 405504 0 0 image [11501076.991315] [ 708073] 0 708073 454343 9223 462848 0 0 exe [11501076.999779] [ 708074] 0 708074 892728 23414 802816 0 0 exe [11501077.008256] [ 708087] 0 708087 21927 8234 204800 0 0 exe [11501077.016718] [ 708127] 0 708127 886 1 53248 0 0 exe [11501077.025191] [ 708153] 0 708153 914 1 65536 0 0 exe [11501077.033670] [ 708157] 0 708157 1 1 12288 0 0 exe [11501077.042136] [ 708163] 0 708163 4151 21 28672 0 0 exe [11501077.050601] [ 708172] 0 708172 28483 2806 233472 0 0 exe [11501077.059067] [ 708195] 0 708195 165 1 36864 0 0 exe [11501077.067543] [ 708316] 0 708316 395081 7855 389120 0 0 image [11501077.076185] [ 708322] 0 708322 358183 6893 372736 0 0 image [11501077.084822] [ 708344] 0 708344 415658 7492 421888 0 0 exe [11501077.093295] [ 708346] 0 708346 452492 8686 430080 0 0 exe [11501077.101762] [ 708347] 0 708347 1773053 207081 3670016 0 0 exe [11501077.110242] [ 708350] 0 708350 3679765 380667 14757888 0 0 exe [11501077.118713] [ 708402] 0 708402 1 1 12288 0 0 exe [11501077.127180] [ 708403] 0 708403 1 1 12288 0 0 exe [11501077.135644] [ 708430] 0 708430 28329 2852 237568 0 0 exe [11501077.144115] [ 708434] 0 708434 28208 3241 237568 0 0 exe [11501077.152585] [ 708477] 0 708477 4157 22 28672 0 0 exe [11501077.161049] [ 708479] 0 708479 4157 22 28672 0 0 exe [11501077.169537] [ 708494] 0 708494 357607 5946 356352 0 0 image [11501077.178188] [ 708497] 0 708497 339174 5911 344064 0 0 image [11501077.186828] [ 708521] 0 708521 40122 11821 315392 0 0 exe [11501077.195389] [ 708525] 0 708525 123232 88652 905216 0 0 exe [11501077.203860] [ 708571] 0 708571 620 1 49152 0 0 exe [11501077.212326] [ 708582] 0 708582 507 1 49152 0 0 exe [11501077.220792] [ 708640] 0 708640 578 114 49152 0 0 exe [11501077.229266] [ 708648] 0 708648 570 1 61440 0 0 exe [11501077.237729] [ 708654] 0 708654 606 1 57344 0 0 exe [11501077.246192] [ 708656] 0 708656 722 1 45056 0 0 exe [11501077.254656] [ 708667] 0 708667 785 1 57344 0 0 exe [11501077.263135] [ 708679] 0 708679 400 1 53248 0 0 exe [11501077.271603] [ 708696] 0 708696 457 1 65536 0 0 exe [11501077.280069] [ 708704] 0 708704 4157 22 36864 0 0 exe [11501077.288549] [ 708754] 0 708754 1 1 12288 0 0 exe [11501077.297017] [ 708755] 0 708755 1 1 12288 0 0 exe [11501077.305496] [ 708765] 0 708765 1 1 12288 0 0 exe [11501077.313994] [ 708816] 0 708816 1 1 12288 0 0 exe [11501077.322459] [ 709163] 0 709163 4157 22 36864 0 0 exe [11501077.330923] [ 709215] 0 709215 4151 21 28672 0 0 exe [11501077.339385] [ 709233] 0 709233 403 129 53248 0 0 exe [11501077.347869] [ 709237] 0 709237 683 1 61440 0 0 exe [11501077.356334] [ 709242] 0 709242 4151 21 28672 0 0 exe [11501077.364799] [ 709241] 0 709241 455 1 65536 0 0 exe [11501077.373276] [ 709244] 0 709244 551 1 53248 0 0 exe [11501077.381742] [ 709255] 0 709255 614 1 65536 0 0 exe [11501077.390219] [ 709264] 0 709264 418 1 53248 0 0 exe [11501077.398713] [ 709276] 0 709276 422 1 65536 0 0 exe [11501077.407236] [ 709296] 0 709296 1 1 12288 0 0 exe [11501077.415731] [ 709307] 0 709307 2260 1 77824 0 0 exe [11501077.424214] [ 709318] 0 709318 210 1 40960 0 0 exe [11501077.432685] [ 709322] 0 709322 1 1 12288 0 0 exe [11501077.441163] [ 709602] 0 709602 1 1 12288 0 0 exe [11501077.449638] [ 709612] 0 709612 1 1 12288 0 0 exe [11501077.458115] [ 709762] 0 709762 1 1 12288 0 0 exe [11501077.466588] [ 709787] 0 709787 1 1 12288 0 0 exe [11501077.475062] [ 709954] 0 709954 4151 21 36864 0 0 exe [11501077.483567] [ 709955] 0 709955 4151 21 36864 0 0 exe [11501077.492063] [ 709965] 0 709965 4151 21 36864 0 0 exe [11501077.500534] [ 710095] 0 710095 4157 22 28672 0 0 exe [11501077.509024] [ 710098] 0 710098 4485 21 69632 0 0 exe [11501077.517502] [ 710106] 0 710106 7905 22 98304 0 0 exe [11501077.525976] [ 710107] 0 710107 7905 22 98304 0 0 exe [11501077.534456] [ 710108] 0 710108 7905 22 98304 0 0 exe [11501077.542942] [ 710118] 0 710118 7905 22 98304 0 0 exe [11501077.551414] [ 710124] 0 710124 4163 23 28672 0 0 exe [11501077.559888] [ 710211] 0 710211 4151 21 36864 0 0 exe [11501077.569058] [ 710214] 0 710214 4151 21 36864 0 0 exe [11501077.577557] [ 710215] 0 710215 4151 21 36864 0 0 exe [11501077.586030] [ 710282] 0 710282 4151 21 28672 0 0 exe [11501077.594506] [ 710439] 0 710439 4157 22 28672 0 0 exe [11501077.602999] [ 710529] 0 710529 4151 21 36864 0 0 exe [11501077.611487] [ 710537] 0 710537 4151 21 36864 0 0 exe [11501077.620074] [ 710680] 0 710680 4133 16 28672 0 0 exe [11501077.628566] [ 710681] 0 710681 4133 16 28672 0 0 exe [11501077.637050] [ 710682] 0 710682 4133 16 28672 0 0 exe [11501077.645531] [ 710683] 0 710683 4133 16 28672 0 0 exe [11501077.654005] [ 710684] 0 710684 14637 9744 167936 0 0 exe [11501077.662481] [ 710685] 0 710685 14637 9744 167936 0 0 exe [11501077.670979] [ 710686] 0 710686 4133 16 28672 0 0 exe [11501077.679484] [ 710687] 0 710687 4133 16 28672 0 0 exe [11501077.687979] [ 710688] 0 710688 4133 16 28672 0 0 exe [11501077.696461] [ 710689] 0 710689 4133 16 28672 0 0 exe [11501077.704949] [ 710690] 0 710690 4139 19 28672 0 0 exe [11501077.713432] [ 710691] 0 710691 4139 19 28672 0 0 exe [11501077.721910] [ 710693] 0 710693 4133 16 28672 0 0 exe [11501077.730391] [ 710694] 0 710694 4133 16 28672 0 0 exe [11501077.738976] [ 710701] 0 710701 4133 16 28672 0 0 exe [11501077.747472] [ 710702] 0 710702 4133 16 28672 0 0 exe [11501077.755953] [ 710703] 0 710703 4133 16 28672 0 0 exe [11501077.764419] [ 710704] 0 710704 4133 16 28672 0 0 exe [11501077.772881] [ 710710] 0 710710 14637 9744 167936 0 0 exe [11501077.781361] [ 710716] 0 710716 4151 21 28672 0 0 exe [11501077.789831] [ 710719] 0 710719 4151 21 28672 0 0 exe [11501077.798295] [ 710722] 0 710722 4139 19 28672 0 0 exe [11501077.806759] [ 710723] 0 710723 4151 21 28672 0 0 exe [11501077.815220] [ 710725] 0 710725 4151 21 28672 0 0 exe [11501077.823678] [ 710727] 0 710727 4151 21 28672 0 0 exe [11501077.832144] [ 710728] 0 710728 4151 21 28672 0 0 exe [11501077.840607] [ 710729] 0 710729 4151 21 28672 0 0 exe [11501077.849085] [ 710745] 0 710745 14637 9744 167936 0 0 exe [11501077.857553] [ 710750] 0 710750 6981 22 98304 0 0 exe [11501077.866036] [ 710751] 0 710751 6981 22 98304 0 0 exe [11501077.874585] [ 710752] 0 710752 6981 22 98304 0 0 exe [11501077.883138] [ 710761] 0 710761 4157 22 36864 0 0 exe [11501077.891604] [ 710767] 0 710767 1 1 12288 0 0 exe [11501077.900084] [ 710849] 0 710849 1 1 12288 0 0 exe [11501077.908637] [ 710856] 0 710856 1 1 12288 0 0 exe [11501077.917110] [ 710946] 0 710946 6981 22 98304 0 0 exe [11501077.925580] [ 710997] 0 710997 4151 21 36864 0 0 exe [11501077.934065] [ 710999] 0 710999 1 1 12288 0 0 exe [11501077.942538] [ 711023] 0 711023 4157 22 28672 0 0 exe [11501077.951010] [ 711077] 0 711077 1 1 12288 0 0 exe [11501077.959471] [ 711147] 0 711147 4151 21 28672 0 0 exe [11501077.968033] [ 711197] 0 711197 36822 20338 352256 0 0 exe [11501077.976535] [ 711198] 0 711198 36822 20338 352256 0 0 exe [11501077.985004] [ 711257] 0 711257 1 1 12288 0 0 exe [11501077.993479] [ 711295] 0 711295 1 1 12288 0 0 exe [11501078.001940] [ 711299] 0 711299 1 1 12288 0 0 exe [11501078.010413] [ 711468] 0 711468 4145 19 36864 0 0 exe [11501078.018974] [ 711470] 0 711470 4151 21 36864 0 0 exe [11501078.027438] [ 711471] 0 711471 4151 21 36864 0 0 exe [11501078.035905] [ 711473] 0 711473 4151 21 36864 0 0 exe [11501078.044376] [ 711688] 0 711688 4539 20 81920 0 0 exe [11501078.052849] [ 711708] 0 711708 4133 16 36864 0 0 exe [11501078.061405] [ 711709] 0 711709 4133 16 36864 0 0 exe [11501078.069878] [ 711710] 0 711710 4133 16 36864 0 0 exe [11501078.080285] [ 711711] 0 711711 4133 16 36864 0 0 exe [11501078.088750] [ 711712] 0 711712 4133 16 36864 0 0 exe [11501078.097402] [ 711713] 0 711713 4133 16 36864 0 0 exe [11501078.106045] [ 711714] 0 711714 4133 16 36864 0 0 exe [11501078.114517] [ 711715] 0 711715 4133 16 36864 0 0 exe [11501078.122985] [ 711716] 0 711716 4133 16 36864 0 0 exe [11501078.131445] [ 711717] 0 711717 4133 16 36864 0 0 exe [11501078.139919] [ 711718] 0 711718 4139 18 36864 0 0 exe [11501078.148381] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=ci-gvisor-ptrace-2-race-0,mems_allowed=0-1,global_oom,task_memcg=/docker/565b2f6324c19684ac99270c00af3806c11bcfb36671d1672e739869b03c459b/ci-gvisor-ptrace-2-race-0,task=exe,pid=596070,uid=0 [11501078.172528] Out of memory: Killed process 596070 (exe) total-vm:230162228kB, anon-rss:60273056kB, file-rss:0kB, shmem-rss:106204kB, UID:0 pgtables:195412kB oom_score_adj:0 [11501080.296157] oom_reaper: reaped process 596070 (exe), now anon-rss:0kB, file-rss:0kB, shmem-rss:106436kB [11501754.366140] exe[658529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0ebe0640a cs:33 sp:7f48a95abee8 ax:12 si:ffffffffff600000 di:55f0ebe72ff2 [11501754.484555] exe[660406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0ebe0640a cs:33 sp:7f48a95abee8 ax:12 si:ffffffffff600000 di:55f0ebe72ff2 [11501754.484870] exe[661164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0ebe0640a cs:33 sp:7f48a958aee8 ax:12 si:ffffffffff600000 di:55f0ebe72ff2 [11501755.194372] exe[692806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0ebe0640a cs:33 sp:7f48a95abee8 ax:12 si:ffffffffff600000 di:55f0ebe72ff2 [11503371.018999] exe[758686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579f6a874b1 cs:33 sp:7f97aded2568 ax:8 si:1 di:7f97aded2660 [11503371.923508] exe[737086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579f6a874b1 cs:33 sp:7f97ade6f568 ax:8 si:1 di:7f97ade6f660 [11503372.768376] exe[736664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579f6a874b1 cs:33 sp:7f97ade6f568 ax:8 si:1 di:7f97ade6f660 [11504288.268234] exe[777225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a63aa40a cs:33 sp:7fcf032cdee8 ax:12 si:ffffffffff600000 di:5605a6416ff2 [11504288.352122] exe[777223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a63aa40a cs:33 sp:7fcf032cdee8 ax:12 si:ffffffffff600000 di:5605a6416ff2 [11504288.441650] exe[757296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605a63aa40a cs:33 sp:7fcf032cdee8 ax:12 si:ffffffffff600000 di:5605a6416ff2 [11504621.904716] exe[796211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a8b65f839 cs:33 sp:7fe406e47858 ax:0 si:556a8b6b8062 di:ffffffffff600000 [11504621.981614] exe[789723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a8b65f839 cs:33 sp:7fe406e47858 ax:0 si:556a8b6b8062 di:ffffffffff600000 [11504622.759237] exe[789731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a8b65f839 cs:33 sp:7fe406e47858 ax:0 si:556a8b6b8062 di:ffffffffff600000 [11505491.464933] exe[789883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ae662839 cs:33 sp:7f98c11fe858 ax:0 si:5577ae6bb070 di:ffffffffff600000 [11505491.548172] exe[790005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ae662839 cs:33 sp:7f98c11fe858 ax:0 si:5577ae6bb070 di:ffffffffff600000 [11505491.715580] exe[811352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577ae662839 cs:33 sp:7f98c11dd858 ax:0 si:5577ae6bb070 di:ffffffffff600000 [11505659.151999] exe[815668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2acc6cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000000 [11505659.318085] exe[815803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2acc6cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000000 [11505660.228695] exe[821101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2acc6cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000000 [11505660.235992] exe[821890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2acc6cb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000000 [11510253.600538] exe[911074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fc7b05839 cs:33 sp:7fca74b5c858 ax:0 si:556fc7b5e070 di:ffffffffff600000 [11510253.709137] exe[902857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fc7b05839 cs:33 sp:7fca74b3b858 ax:0 si:556fc7b5e070 di:ffffffffff600000 [11510254.348250] exe[906187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fc7b05839 cs:33 sp:7fca74b3b858 ax:0 si:556fc7b5e070 di:ffffffffff600000 [11510872.370401] exe[926145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e64934e40a cs:33 sp:7f1300575ee8 ax:12 si:ffffffffff600000 di:55e6493baff2 [11510872.771766] exe[927833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e64934e40a cs:33 sp:7f1300554ee8 ax:12 si:ffffffffff600000 di:55e6493baff2 [11510872.943204] exe[926192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e64934e40a cs:33 sp:7f1300575ee8 ax:12 si:ffffffffff600000 di:55e6493baff2 [11510999.751958] exe[907967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55921bb2c839 cs:33 sp:7ee9e2bd0ee8 ax:0 si:20000040 di:ffffffffff600000 [11510999.924400] exe[911510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55921bb2c839 cs:33 sp:7ee9e2bd0ee8 ax:0 si:20000040 di:ffffffffff600000 [11511000.076264] exe[911511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55921bb2c839 cs:33 sp:7ee9e2bd0ee8 ax:0 si:20000040 di:ffffffffff600000 [11511000.111989] exe[906693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55921bb2c839 cs:33 sp:7ee9e2bafee8 ax:0 si:20000040 di:ffffffffff600000 [11512793.987365] exe[921191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff9e082839 cs:33 sp:7ec550b7b858 ax:0 si:55ff9e0db097 di:ffffffffff600000 [11512794.087920] exe[939206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff9e082839 cs:33 sp:7ec550b7b858 ax:0 si:55ff9e0db097 di:ffffffffff600000 [11512794.151767] exe[977517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff9e082839 cs:33 sp:7ec550b7b858 ax:0 si:55ff9e0db097 di:ffffffffff600000 [11512794.176921] exe[939173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff9e082839 cs:33 sp:7ec550b5a858 ax:0 si:55ff9e0db097 di:ffffffffff600000 [11512860.478683] exe[969874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99aa8d40a cs:33 sp:7f5d2ed36ee8 ax:12 si:ffffffffff600000 di:55c99aaf9ff2 [11512860.552871] exe[971457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99aa8d40a cs:33 sp:7f5d2ed36ee8 ax:12 si:ffffffffff600000 di:55c99aaf9ff2 [11512860.552998] exe[969984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99aa8d40a cs:33 sp:7f5d2ed15ee8 ax:12 si:ffffffffff600000 di:55c99aaf9ff2 [11512861.309913] exe[974643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c99aa8d40a cs:33 sp:7f5d2ed36ee8 ax:12 si:ffffffffff600000 di:55c99aaf9ff2 [11514238.765640] exe[7460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8fcf7ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:880000 [11514239.374632] exe[8458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8fcf7ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:880000 [11514239.858057] exe[7505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e8fcf7ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:880000 [11514512.814000] exe[24936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55749d87e40a cs:33 sp:7f96337ceee8 ax:12 si:ffffffffff600000 di:55749d8eaff2 [11514512.907921] exe[14037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55749d87e40a cs:33 sp:7f96337adee8 ax:12 si:ffffffffff600000 di:55749d8eaff2 [11519731.203430] exe[126925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b194892839 cs:33 sp:7f53da6b4ee8 ax:0 si:20000040 di:ffffffffff600000 [11519731.310875] exe[114263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b194892839 cs:33 sp:7f53da6d5ee8 ax:0 si:20000040 di:ffffffffff600000 [11519731.434356] exe[121514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b194892839 cs:33 sp:7f53da6d5ee8 ax:0 si:20000040 di:ffffffffff600000 [11521050.468050] exe[151789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625ad3ea839 cs:33 sp:7ee0cbc79858 ax:0 si:5625ad443070 di:ffffffffff600000 [11521050.816659] exe[133675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ab731d839 cs:33 sp:7fed37c89858 ax:0 si:563ab7376070 di:ffffffffff600000 [11521052.876932] exe[141940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b57d7c6839 cs:33 sp:7f2517e8c858 ax:0 si:55b57d81f070 di:ffffffffff600000 [11521121.894560] exe[100247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce8262c839 cs:33 sp:7f1da29be858 ax:0 si:55ce82685070 di:ffffffffff600000 [11521206.393726] exe[151927] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9551b3839 cs:33 sp:7f6d018cf858 ax:0 si:55a95520c070 di:ffffffffff600000 [11521270.937146] exe[10392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602a7eaa839 cs:33 sp:7f1eda4ec858 ax:0 si:5602a7f03070 di:ffffffffff600000 [11521312.507336] exe[94102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559003f50839 cs:33 sp:7ecb85515858 ax:0 si:559003fa9070 di:ffffffffff600000 [11521338.796759] exe[135964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652b64f6839 cs:33 sp:7f039f6b2858 ax:0 si:5652b654f070 di:ffffffffff600000 [11521380.843392] exe[153631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5597f964f839 cs:33 sp:7f1b8c470858 ax:0 si:5597f96a8070 di:ffffffffff600000 [11521402.164539] exe[123385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564167cd3839 cs:33 sp:7f53bfc2d858 ax:0 si:564167d2c070 di:ffffffffff600000 [11521536.814608] exe[137784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbf1a99839 cs:33 sp:7f2687496858 ax:0 si:55fbf1af2070 di:ffffffffff600000 [11521559.707748] exe[24637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac56ec7839 cs:33 sp:7fa4065d9858 ax:0 si:55ac56f20070 di:ffffffffff600000 [11521590.176758] exe[158447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb7147b839 cs:33 sp:7ec6cb761858 ax:0 si:55bb714d4070 di:ffffffffff600000 [11521594.000222] exe[161804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f46f158839 cs:33 sp:7efa4c19b858 ax:0 si:55f46f1b1070 di:ffffffffff600000 [11521881.436012] exe[129233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd3112e839 cs:33 sp:7f28838b1858 ax:0 si:55cd31187070 di:ffffffffff600000 [11524364.008585] exe[152947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4fd8840a cs:33 sp:7f08c41e0ee8 ax:12 si:ffffffffff600000 di:55ff4fdf4ff2 [11524364.122496] exe[197700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4fd8840a cs:33 sp:7f08c41bfee8 ax:12 si:ffffffffff600000 di:55ff4fdf4ff2 [11524364.207832] exe[153660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff4fd8840a cs:33 sp:7f08c41e0ee8 ax:12 si:ffffffffff600000 di:55ff4fdf4ff2 [11524365.144861] exe[153371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.224043] exe[152947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.310128] exe[227186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.397432] exe[197824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.453863] exe[153103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.545041] exe[197814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524365.661035] exe[156974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c38140a cs:33 sp:7fb269c87ee8 ax:12 si:ffffffffff600000 di:559d9c3edff2 [11524920.849310] warn_bad_vsyscall: 19 callbacks suppressed [11524920.849313] exe[203744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606b02df839 cs:33 sp:7ed9619e0858 ax:0 si:5606b0338097 di:ffffffffff600000 [11524920.918033] exe[203744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606b02df839 cs:33 sp:7ed9619e0858 ax:0 si:5606b0338097 di:ffffffffff600000 [11524920.978520] exe[170729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606b02df839 cs:33 sp:7ed9619e0858 ax:0 si:5606b0338097 di:ffffffffff600000 [11525389.297293] exe[263491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611ec858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525389.468776] exe[259136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611cb858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.090532] exe[258957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.118945] exe[258957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.145809] exe[261647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.173946] exe[259136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.202267] exe[258957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.229742] exe[259136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.259408] exe[261647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525390.293727] exe[261647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640d92d0839 cs:33 sp:7eba611aa858 ax:0 si:5640d9329062 di:ffffffffff600000 [11525474.213328] warn_bad_vsyscall: 25 callbacks suppressed [11525474.213332] exe[239910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573c08b3839 cs:33 sp:7fd11bd8f858 ax:0 si:5573c090c070 di:ffffffffff600000 [11525726.382681] exe[230121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628e7c28839 cs:33 sp:7fba457dd858 ax:0 si:5628e7c81062 di:ffffffffff600000 [11525726.530717] exe[227463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628e7c28839 cs:33 sp:7fba457bc858 ax:0 si:5628e7c81062 di:ffffffffff600000 [11525726.669907] exe[224897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628e7c28839 cs:33 sp:7fba457bc858 ax:0 si:5628e7c81062 di:ffffffffff600000 [11527490.905451] exe[307905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a768d240a cs:33 sp:7ff691eefee8 ax:12 si:ffffffffff600000 di:556a7693eff2 [11527491.013246] exe[279055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a768d240a cs:33 sp:7ff691eefee8 ax:12 si:ffffffffff600000 di:556a7693eff2 [11527491.323215] exe[279641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a768d240a cs:33 sp:7ff691eceee8 ax:12 si:ffffffffff600000 di:556a7693eff2 [11527491.323359] exe[281180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a768d240a cs:33 sp:7ff691eefee8 ax:12 si:ffffffffff600000 di:556a7693eff2 [11528321.013618] exe[319222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56286cd9e40a cs:33 sp:7f0f570c0ee8 ax:12 si:ffffffffff600000 di:56286ce0aff2 [11528321.105322] exe[306490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56286cd9e40a cs:33 sp:7f0f570c0ee8 ax:12 si:ffffffffff600000 di:56286ce0aff2 [11528321.195354] exe[300252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56286cd9e40a cs:33 sp:7f0f570c0ee8 ax:12 si:ffffffffff600000 di:56286ce0aff2 [11528335.989506] exe[243987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587dff27839 cs:33 sp:7ea176eea858 ax:0 si:5587dff80062 di:ffffffffff600000 [11528341.019150] exe[313012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587dff27839 cs:33 sp:7ea176f2c858 ax:0 si:5587dff80062 di:ffffffffff600000 [11528341.259617] exe[313021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587dff27839 cs:33 sp:7ea176f0b858 ax:0 si:5587dff80062 di:ffffffffff600000 [11528341.290134] exe[313019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587dff27839 cs:33 sp:7ea176e24858 ax:0 si:5587dff80062 di:ffffffffff600000 [11530649.105531] exe[352415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911097 di:ffffffffff600000 [11530649.266359] exe[342771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911097 di:ffffffffff600000 [11530649.374392] exe[347653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911097 di:ffffffffff600000 [11530650.194492] exe[348004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.279713] exe[342938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.354752] exe[346626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.419998] exe[347627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.485322] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.555924] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530650.631477] exe[347076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.124495] warn_bad_vsyscall: 319 callbacks suppressed [11530654.124499] exe[346814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.173782] exe[342708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.217687] exe[350761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.256534] exe[346763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.301738] exe[342711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.358451] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.421216] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.468018] exe[346814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.513829] exe[350761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530654.559543] exe[342712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530659.371355] warn_bad_vsyscall: 277 callbacks suppressed [11530659.371358] exe[343333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530659.693220] exe[343104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.085260] exe[347627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.158793] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.193093] exe[343104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f7e858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.299243] exe[360483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.334869] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.427124] exe[342702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.530670] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.552515] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530664.410846] warn_bad_vsyscall: 191 callbacks suppressed [11530664.410850] exe[347076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.517388] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.614182] exe[343158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.693391] exe[346626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.880133] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530665.104198] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.164041] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.189874] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.263975] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.325499] exe[343333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11531647.091724] warn_bad_vsyscall: 119 callbacks suppressed [11531647.091728] exe[342711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.193212] exe[342712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.268456] exe[342979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.288424] exe[342975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.308161] exe[342944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.334261] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.355824] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.376295] exe[342993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.396210] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.417266] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11532345.155341] warn_bad_vsyscall: 25 callbacks suppressed [11532345.155345] exe[382188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.269530] exe[382766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.386757] exe[382474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532767.935456] exe[384598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.011945] exe[342758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.091418] exe[363806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11534667.144948] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.236329] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.267961] exe[403010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.372458] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.408027] exe[400419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534894.914638] exe[383063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beadbee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.957554] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.977138] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.997745] exe[383054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.019118] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.038723] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.059007] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.079097] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.098979] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.118890] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11535893.406581] warn_bad_vsyscall: 25 callbacks suppressed [11535893.406585] exe[518174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.458729] exe[498396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.521164] exe[517163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.575499] exe[517648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11536070.313225] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.380260] exe[515339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.442300] exe[515436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.505325] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536370.456183] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.586537] exe[514004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53fbc858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.694198] exe[527281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.737448] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11537650.136338] exe[430654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537650.412774] exe[548543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537651.379743] exe[544871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11539350.089743] exe[592292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fee1a62839 cs:33 sp:7f3bb8f66858 ax:0 si:55fee1abb062 di:ffffffffff600000 [11539649.231607] exe[597310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.290920] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.347494] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539977.040247] exe[600851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622cbba1839 cs:33 sp:7ef62f826858 ax:0 si:5622cbbfa070 di:ffffffffff600000 [11540511.026519] exe[600753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605abe9b839 cs:33 sp:7ea0b2c49858 ax:0 si:5605abef4062 di:ffffffffff600000 [11540577.627218] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.675057] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.720870] exe[580996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb450858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11541137.236749] exe[631001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8df4a8839 cs:33 sp:7ec367e7b858 ax:0 si:55d8df501070 di:ffffffffff600000 [11541804.084586] exe[636938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.009172] exe[573192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.193016] exe[624964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11542822.267208] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.447533] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.599315] exe[608247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.654857] exe[608085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff2b858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542974.046947] exe[681952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11542975.617308] exe[681959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdb6b73839 cs:33 sp:7ea1e721f858 ax:0 si:55bdb6bcc070 di:ffffffffff600000 [11543003.003275] exe[680745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f039ea839 cs:33 sp:7f52e9f8c858 ax:0 si:560f03a43070 di:ffffffffff600000 [11543004.857028] exe[674098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11543241.124326] exe[653510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543241.246077] exe[670164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543242.057149] exe[665681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543265.859323] exe[669905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.014563] exe[673318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.109923] exe[655556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.226266] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.340307] exe[666615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.438645] exe[653578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.550820] exe[653447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.639930] exe[668546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543527.564952] exe[682036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85dfee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.843021] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.872086] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.901814] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.928287] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.960260] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.001419] exe[686062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.037270] exe[686072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.072724] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.101714] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11544123.311129] warn_bad_vsyscall: 43 callbacks suppressed [11544123.311132] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.485832] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.545188] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.727586] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544124.057735] exe[696402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.305506] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.507382] exe[669629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.623230] exe[695057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.735692] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.863236] exe[665545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544128.352152] warn_bad_vsyscall: 20 callbacks suppressed [11544128.352155] exe[671775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544128.511425] exe[696712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.375128] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.536371] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.698008] exe[653586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.893888] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.031510] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.130359] exe[673044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.235880] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.352844] exe[672186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.353612] warn_bad_vsyscall: 24 callbacks suppressed [11544133.353615] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.473154] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.609419] exe[668533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.901016] exe[696718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.174452] exe[666489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.475583] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.623602] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.772637] exe[696477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.888566] exe[670834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.988750] exe[697893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544138.414937] warn_bad_vsyscall: 63 callbacks suppressed [11544138.414941] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.523964] exe[680995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.625852] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.629193] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.773793] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.889988] exe[671086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.995711] exe[656008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.279460] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.285732] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.852350] exe[702011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.530343] warn_bad_vsyscall: 21 callbacks suppressed [11544143.530346] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.650402] exe[651695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.841742] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.870995] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.902268] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.948343] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.989607] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.024048] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.054902] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.087224] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544148.632017] warn_bad_vsyscall: 172 callbacks suppressed [11544148.632020] exe[669150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.794259] exe[668957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.989109] exe[668900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.994476] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.214390] exe[700441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.375421] exe[677325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.743745] exe[651266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.292722] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.474228] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.637207] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544153.658144] warn_bad_vsyscall: 27 callbacks suppressed [11544153.658148] exe[653423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.777426] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.903906] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.947438] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.109460] exe[660365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.158525] exe[653490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.258820] exe[651422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.391447] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.603018] exe[653409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.651409] exe[653440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544158.817051] warn_bad_vsyscall: 88 callbacks suppressed [11544158.817054] exe[694623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.075950] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.301459] exe[696410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.392503] exe[694615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.536699] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.643218] exe[693490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.745653] exe[687494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.834437] exe[669163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544159.940422] exe[693510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544160.043187] exe[673283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.101141] warn_bad_vsyscall: 21 callbacks suppressed [11544164.101144] exe[668876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.241344] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.416813] exe[696415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.572347] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.661162] exe[700444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.764040] exe[665928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.860384] exe[665956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.967054] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.069729] exe[696446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.167820] exe[667801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.171621] warn_bad_vsyscall: 29 callbacks suppressed [11544169.171624] exe[666533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.209223] exe[694404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.345652] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.449276] exe[666863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.579999] exe[652022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.628929] exe[681862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.748025] exe[694768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.754710] exe[651361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544170.115853] exe[695045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544170.211267] exe[694614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544487.006009] warn_bad_vsyscall: 7 callbacks suppressed [11544487.006013] exe[698657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56475d423839 cs:33 sp:7f017362b858 ax:0 si:56475d47c070 di:ffffffffff600000 [11544487.270484] exe[700399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563181efe839 cs:33 sp:7ebe85da1858 ax:0 si:563181f57070 di:ffffffffff600000 [11544511.054844] exe[643613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55671700d839 cs:33 sp:7fda3ebc7858 ax:0 si:556717066070 di:ffffffffff600000 [11544534.538680] exe[711402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650b2e68839 cs:33 sp:7ed2418f9858 ax:0 si:5650b2ec1070 di:ffffffffff600000 [11544541.236335] exe[714082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec31b7839 cs:33 sp:7f29fcf9d858 ax:0 si:563ec3210070 di:ffffffffff600000 [11544549.596877] exe[709232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85df858 ax:0 si:55f2a8264070 di:ffffffffff600000 [11544550.342713] exe[712067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd4032839 cs:33 sp:7fe3bd6b3858 ax:0 si:564cd408b070 di:ffffffffff600000 [11544636.437853] exe[540397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df21791839 cs:33 sp:7f199a286858 ax:0 si:55df217ea070 di:ffffffffff600000 [11544650.761105] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.648325] exe[680729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.692536] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.806399] exe[654057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544684.382904] exe[599414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f284d4839 cs:33 sp:7f961e482858 ax:0 si:556f2852d070 di:ffffffffff600000 [11544687.601444] exe[605347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557bb1bb839 cs:33 sp:7eccd13f5858 ax:0 si:5557bb214070 di:ffffffffff600000 [11545051.986254] exe[681960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11545064.270053] exe[698660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b51fb0839 cs:33 sp:7f9c7caaf858 ax:0 si:560b52009070 di:ffffffffff600000 [11545068.988305] exe[688573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564928b3b839 cs:33 sp:7ff955622858 ax:0 si:564928b94070 di:ffffffffff600000 [11545109.002939] exe[700093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11545257.023788] exe[699969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858858 ax:0 si:56468e7be070 di:ffffffffff600000 [11545310.043985] exe[730419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079858 ax:0 si:559d6ffcd070 di:ffffffffff600000 [11545747.024880] exe[668885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.207869] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.208393] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.369587] exe[698981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.086072] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.276578] exe[655585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.440844] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.661991] exe[651380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.864051] exe[691659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.032545] exe[669495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.180256] exe[668971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.327971] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.464233] exe[653467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.608138] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.724053] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.821867] exe[673278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545752.940728] exe[695059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.257832] exe[690707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.288251] exe[694599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.081142] warn_bad_vsyscall: 180 callbacks suppressed [11545757.081146] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.214468] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.680818] exe[660360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545757.976248] exe[669152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.152711] exe[673009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db06858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.411760] exe[666512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.527446] exe[666632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.650734] exe[670178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.653643] exe[696363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.792891] exe[666858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.314186] warn_bad_vsyscall: 20 callbacks suppressed [11545762.314189] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.467684] exe[670066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.649946] exe[673641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.943504] exe[660379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.043408] exe[669128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.327908] exe[669526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.366578] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.522288] exe[669522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.352902] exe[696365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.927217] exe[668856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.329883] warn_bad_vsyscall: 19 callbacks suppressed [11545767.329886] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.356567] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.513570] exe[697884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.562772] exe[670199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.711961] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.846666] exe[673281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.887751] exe[673284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.020071] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.057366] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.194079] exe[677299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545895.545245] warn_bad_vsyscall: 20 callbacks suppressed [11545895.545249] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.697993] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.785536] exe[721585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c837ee8 ax:0 si:200001c0 di:ffffffffff600000 [11546263.751083] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.760352] exe[750487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cd5eee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.909919] exe[733995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546785.957834] exe[722877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546786.864503] exe[719747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546787.823769] exe[718998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11547088.502200] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.547606] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.594335] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.508654] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.559999] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.608707] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.659695] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.718362] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.781423] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.831867] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.888097] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.977889] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547100.030632] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547104.513495] warn_bad_vsyscall: 291 callbacks suppressed [11547104.513499] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.539086] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.559309] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.578791] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.599547] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.620080] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.640504] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.659820] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.679561] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.700181] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547109.524219] warn_bad_vsyscall: 177 callbacks suppressed [11547109.524223] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.571444] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.623374] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.666991] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.687953] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.739406] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.781901] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.828639] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.849421] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.897272] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.703281] warn_bad_vsyscall: 176 callbacks suppressed [11547226.703285] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.750753] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.799595] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.236010] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.275452] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.317150] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.312120] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.354274] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.397972] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.426494] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.481647] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.534048] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547286.183628] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.224975] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.249969] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.292623] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547292.084095] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.127160] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.168264] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.584508] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.638463] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.658311] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.678417] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.699893] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.719994] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.740570] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.761543] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.782276] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.803395] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.755488] warn_bad_vsyscall: 32 callbacks suppressed [11547304.755491] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.820801] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.870285] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547305.231833] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.080890] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.932040] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.868022] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.927403] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.983135] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547309.035076] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.512279] warn_bad_vsyscall: 3 callbacks suppressed [11547312.512283] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.573549] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.593042] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.613765] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.634451] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.654831] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.674844] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.695789] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.716034] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.735650] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.072811] warn_bad_vsyscall: 25 callbacks suppressed [11547323.072814] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.126130] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.168909] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.169422] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.577119] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.618137] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.659742] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.430811] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.470418] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.471364] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.540794] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.575387] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.234296] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.287869] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.341084] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.150024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.197367] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.613691] warn_bad_vsyscall: 1 callbacks suppressed [11547359.613695] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.673012] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.722811] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.747468] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.889779] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.945222] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.980565] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547371.026574] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547381.799394] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.864307] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.906009] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.933118] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547384.896734] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547384.942724] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547385.004823] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547394.986983] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.029433] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.072479] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.899409] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.945764] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.998894] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547402.412281] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.457209] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.458646] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539688] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539824] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547414.727517] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.524355] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.575392] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.624984] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.681183] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.722741] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.761925] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.879392] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.921135] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.960705] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.692664] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.746736] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.780646] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.157398] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.227524] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.267610] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.241019] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.314637] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.354549] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.400116] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.441352] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.461983] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.499263] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.711900] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.766945] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.815670] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.678890] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.727877] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.747719] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.767929] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.788113] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.807588] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.826881] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.107205] warn_bad_vsyscall: 63 callbacks suppressed [11547478.107208] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.164816] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.204636] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.384520] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.441631] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.483337] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.658315] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547498.516799] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.368994] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.390429] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.411047] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.430939] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.452865] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.945209] warn_bad_vsyscall: 28 callbacks suppressed [11547504.945212] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.998022] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547505.038001] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.867524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.912298] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.955068] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.977045] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547536.142402] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.183582] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.217323] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.569508] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.614546] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.663836] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547538.951959] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.000244] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.081981] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.997217] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.887928] warn_bad_vsyscall: 69 callbacks suppressed [11547564.887932] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.979509] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.178943] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.229576] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.296841] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.055098] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.108833] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.156638] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.185291] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.306678] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.358066] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.406256] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.036059] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.086889] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.108968] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.156744] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.880353] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.931926] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.953668] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.989459] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.559099] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.600969] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.648685] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.670795] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.298350] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.336522] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.375194] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547619.302393] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.356222] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.395199] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547628.124097] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.175121] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.195646] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.242715] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.055190] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.102818] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.146651] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.408345] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.450251] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.489444] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.515277] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.494419] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.543322] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.564399] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.602948] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.605910] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.679150] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.726624] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547662.729392] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.772014] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.817232] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547666.997387] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.036554] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.076179] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.948193] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.996557] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.038514] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.039086] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547673.715197] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.774874] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.796267] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.836633] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547696.173266] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.232828] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.255864] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.294590] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.314254] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.335246] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.355631] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.376818] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.396933] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.417149] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.297493] warn_bad_vsyscall: 65 callbacks suppressed [11547715.297496] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.351733] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.396006] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.417741] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.369570] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.412168] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.433703] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.476531] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.185928] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.229580] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.267114] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.034535] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.079956] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.081096] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.142656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.827814] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.871810] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.895490] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.935407] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.937018] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.115105] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.155340] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.179243] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.226345] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.556996] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.594141] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.641491] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.738092] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.785040] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.827300] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.849354] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.631390] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.672124] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.713813] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.715026] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.110481] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.167223] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.188945] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.209538] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.229116] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.248124] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547785.250849] warn_bad_vsyscall: 39 callbacks suppressed [11547785.250853] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.017175] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.058414] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.098809] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.452423] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.491354] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.530741] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.157406] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.405882] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.569025] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.689830] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.730995] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.770001] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.771515] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547812.197802] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.267933] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.268869] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547813.941768] warn_bad_vsyscall: 5 callbacks suppressed [11547813.941772] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547813.985351] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.023826] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.283366] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.373377] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.430322] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.428583] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.479106] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.517226] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547821.217341] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.304135] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.358901] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.381326] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.403008] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.917629] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547822.010021] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.374491] warn_bad_vsyscall: 6 callbacks suppressed [11547838.374495] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.433268] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.487754] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.517159] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.542981] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.594031] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.633861] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547847.990984] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.047899] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.090172] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.278529] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.318322] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.357865] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.656438] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.696366] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.730899] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547851.240037] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.042222] warn_bad_vsyscall: 2 callbacks suppressed [11547866.042225] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.098981] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.161778] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.079020] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.130030] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.184976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.225662] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.268419] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.320362] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.047221] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.096888] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.137370] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.386318] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.432437] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.486510] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547884.683356] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.762816] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.813991] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.189876] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.254562] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.293397] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547903.407887] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.447383] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.470252] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.506155] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.721533] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.782550] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.820577] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.096045] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.142337] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.161621] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547911.216020] warn_bad_vsyscall: 64 callbacks suppressed [11547911.216024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.267332] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.307191] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547912.057581] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.095772] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.097086] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.157993] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547913.388972] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.423889] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.465344] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547924.521450] warn_bad_vsyscall: 5 callbacks suppressed [11547924.521454] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.577796] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.602125] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.641611] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.133391] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.194823] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.197273] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.263427] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.418619] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.475719] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.543133] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.125423] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.228337] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.688513] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.730652] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.766521] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.807188] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.851432] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.871960] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.914064] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.259541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.337004] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.398917] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.978258] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.026688] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.029306] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.092103] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.100263] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.144346] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.174814] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.211169] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.832995] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.876208] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.898352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.934693] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.414771] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.456497] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.496767] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.291929] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.329604] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.369969] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.372328] warn_bad_vsyscall: 3 callbacks suppressed [11547989.372332] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.421337] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.465823] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.485942] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.841813] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.890432] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.943125] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.261522] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.301370] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.342764] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.299293] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.345532] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.381167] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.818109] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.874942] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.929681] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548017.498804] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.546061] exe[755951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.589351] exe[755959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.635935] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dfd5ee8 ax:0 si:20000680 di:ffffffffff600000 [11548019.396684] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.444824] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.480770] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.067924] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.105876] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.106597] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.730218] warn_bad_vsyscall: 5 callbacks suppressed [11548023.730221] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.775332] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.815656] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.219256] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.300235] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.347676] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.947538] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.999970] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.040895] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.069553] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.004537] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.049080] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.113890] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.137352] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548077.206282] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.251934] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.274716] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.295013] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.315325] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.336012] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.357843] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.377872] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.398283] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.418613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548097.528517] warn_bad_vsyscall: 57 callbacks suppressed [11548097.528521] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.576429] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.633295] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.634854] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.133965] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.176503] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.214588] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.215240] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.412752] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.462777] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548104.996660] warn_bad_vsyscall: 1 callbacks suppressed [11548104.996663] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548105.850076] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548106.696238] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.157724] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.208597] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.261372] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.343202] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.382779] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.426112] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.403368] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.452789] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.499910] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.417742] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.522190] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.936100] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.988256] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.016505] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.070003] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.445818] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.511715] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.553978] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.286390] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.334009] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.375931] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548175.546300] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.589700] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.629037] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.651488] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548179.585264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.631159] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.650585] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.670448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.691290] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.711967] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.732380] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.752068] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.772801] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.793448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.872059] warn_bad_vsyscall: 61 callbacks suppressed [11548193.872063] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.952821] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.928684] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.996448] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548202.037007] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.156027] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.196959] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.219143] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.258912] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.281350] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.546657] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.589787] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.627425] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.699725] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.745535] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.788742] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.471018] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.514946] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.515574] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.585099] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.038187] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.079907] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.127070] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.182158] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.221914] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.242963] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.281592] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.367833] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.410279] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.431732] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.485658] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.287473] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.328228] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.378594] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.674482] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.723577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.769676] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.411340] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.454118] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.496501] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.637682] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.680537] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.717881] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.175744] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.244740] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.289491] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.347827] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.386962] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.432610] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.452510] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.472049] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.493392] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.514001] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.534326] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.555439] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.575831] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.591661] warn_bad_vsyscall: 28 callbacks suppressed [11548299.591664] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.716645] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.218082] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.333278] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.369844] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000