644066 task_exit.go:204] [ 595: 600] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.370564 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.370589 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.370605 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.370757 644066 task_exit.go:204] [ 595: 595] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.370873 644066 task_signals.go:470] [ 6: 21] Notified of signal 23 D0713 05:18:02.370957 644066 task_signals.go:220] [ 6: 21] Signal 23: delivering to handler D0713 05:18:02.371366 644066 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.372696 644066 syscalls.go:262] [ 601: 601] Allocating stack with size of 8388608 bytes D0713 05:18:02.372819 644066 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.374805 644066 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.374871 644066 usertrap_amd64.go:106] [ 601: 601] Map a usertrap vma at 62000 D0713 05:18:02.375015 644066 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc000f88c30 1 D0713 05:18:02.375062 644066 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:02.375442 644066 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.375472 644066 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc000f88c30 2 D0713 05:18:02.375482 644066 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:02.376151 644066 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.376181 644066 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc000f88c30 3 D0713 05:18:02.376194 644066 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:02.382316 644066 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.382348 644066 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc000f88c30 4 D0713 05:18:02.382360 644066 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:02.383566 644066 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.383597 644066 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc000f88c30 5 D0713 05:18:02.383609 644066 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:02.383673 644066 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.383683 644066 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc000f88c30 6 D0713 05:18:02.383692 644066 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:02.383922 644066 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.383948 644066 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc000f88c30 7 D0713 05:18:02.383962 644066 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:02.384110 644066 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.384133 644066 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc000f88c30 8 D0713 05:18:02.384143 644066 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:02.384280 644066 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.384304 644066 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc000f88c30 9 D0713 05:18:02.384313 644066 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:02.384354 644066 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.384364 644066 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc000f88c30 10 D0713 05:18:02.384372 644066 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:02.392182 644066 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.392206 644066 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc000f88c30 11 D0713 05:18:02.392215 644066 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:02.394775 644066 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.394805 644066 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc000f88c30 12 D0713 05:18:02.394817 644066 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:02.394839 644066 usertrap_amd64.go:212] [ 601: 602] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.394846 644066 usertrap_amd64.go:122] [ 601: 602] Allocate a new trap: 0xc000f88c30 13 D0713 05:18:02.394854 644066 usertrap_amd64.go:225] [ 601: 602] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:02.394870 644066 task_signals.go:470] [ 601: 601] Notified of signal 23 D0713 05:18:02.394966 644066 task_signals.go:220] [ 601: 601] Signal 23: delivering to handler D0713 05:18:02.403339 644066 usertrap_amd64.go:212] [ 601: 601] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.403372 644066 usertrap_amd64.go:122] [ 601: 601] Allocate a new trap: 0xc000f88c30 14 D0713 05:18:02.403382 644066 usertrap_amd64.go:225] [ 601: 601] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:02.403460 644066 task_exit.go:204] [ 601: 601] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.403497 644066 task_exit.go:204] [ 601: 601] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.403532 644066 task_signals.go:204] [ 601: 604] Signal 601, PID: 604, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.403517 644066 task_signals.go:204] [ 601: 602] Signal 601, PID: 602, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.403544 644066 task_signals.go:204] [ 601: 603] Signal 601, PID: 603, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.403548 644066 task_exit.go:204] [ 601: 604] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.403595 644066 task_exit.go:204] [ 601: 604] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.403605 644066 task_exit.go:204] [ 601: 604] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.403623 644066 task_exit.go:204] [ 601: 602] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.403633 644066 task_exit.go:204] [ 601: 602] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.403639 644066 task_exit.go:204] [ 601: 602] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.403652 644066 task_exit.go:204] [ 601: 603] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.403700 644066 task_exit.go:204] [ 601: 603] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.403708 644066 task_exit.go:204] [ 601: 603] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.403731 644066 task_signals.go:204] [ 601: 605] Signal 601, PID: 605, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.403741 644066 task_exit.go:204] [ 601: 605] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.405148 644066 task_exit.go:204] [ 601: 605] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.405182 644066 task_exit.go:204] [ 601: 605] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.405198 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.405235 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.405252 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.405323 644066 task_exit.go:204] [ 601: 601] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.407741 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.409381 644066 syscalls.go:262] [ 606: 606] Allocating stack with size of 8388608 bytes D0713 05:18:02.409489 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.413825 644066 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.413888 644066 usertrap_amd64.go:106] [ 606: 606] Map a usertrap vma at 61000 D0713 05:18:02.414009 644066 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc000d93770 1 D0713 05:18:02.414046 644066 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:02.414494 644066 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.414510 644066 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc000d93770 2 D0713 05:18:02.414522 644066 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:02.415879 644066 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.415914 644066 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc000d93770 3 D0713 05:18:02.415928 644066 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:02.422401 644066 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.422443 644066 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc000d93770 4 D0713 05:18:02.422459 644066 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:02.423715 644066 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.423757 644066 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc000d93770 5 D0713 05:18:02.423773 644066 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:02.423833 644066 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.423838 644066 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc000d93770 6 D0713 05:18:02.423843 644066 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:02.424222 644066 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.424239 644066 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc000d93770 7 D0713 05:18:02.424248 644066 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:02.424459 644066 usertrap_amd64.go:212] [ 606: 607] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.424490 644066 usertrap_amd64.go:122] [ 606: 607] Allocate a new trap: 0xc000d93770 8 D0713 05:18:02.424505 644066 usertrap_amd64.go:225] [ 606: 607] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:02.424743 644066 usertrap_amd64.go:212] [ 606: 608] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.424772 644066 usertrap_amd64.go:122] [ 606: 608] Allocate a new trap: 0xc000d93770 9 D0713 05:18:02.424783 644066 usertrap_amd64.go:225] [ 606: 608] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:02.425105 644066 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:02.425136 644066 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc000d93770 10 D0713 05:18:02.425147 644066 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b6e0 trap addr 61320 ([184 24 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:02.425180 644066 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.425216 644066 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc000d93770 11 D0713 05:18:02.425231 644066 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46b57c trap addr 61370 ([184 202 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:02.433382 644066 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.433423 644066 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc000d93770 12 D0713 05:18:02.433436 644066 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:02.435965 644066 usertrap_amd64.go:212] [ 606: 607] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.436023 644066 usertrap_amd64.go:122] [ 606: 607] Allocate a new trap: 0xc000d93770 13 D0713 05:18:02.436043 644066 usertrap_amd64.go:225] [ 606: 607] Apply the binary patch addr 46b020 trap addr 61410 ([184 39 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:02.436065 644066 usertrap_amd64.go:212] [ 606: 607] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.436073 644066 usertrap_amd64.go:122] [ 606: 607] Allocate a new trap: 0xc000d93770 14 D0713 05:18:02.436081 644066 usertrap_amd64.go:225] [ 606: 607] Apply the binary patch addr 46b04f trap addr 61460 ([184 234 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:02.436132 644066 task_signals.go:470] [ 606: 606] Notified of signal 23 D0713 05:18:02.436219 644066 task_signals.go:220] [ 606: 606] Signal 23: delivering to handler I0713 05:18:02.445501 644066 compat.go:120] Unsupported syscall ioperm(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioperm for more information. D0713 05:18:02.445664 644066 usertrap_amd64.go:212] [ 606: 606] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.445702 644066 usertrap_amd64.go:122] [ 606: 606] Allocate a new trap: 0xc000d93770 15 D0713 05:18:02.445721 644066 usertrap_amd64.go:225] [ 606: 606] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 05:18:02.445804 644066 task_exit.go:204] [ 606: 606] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.445859 644066 task_signals.go:204] [ 606: 607] Signal 606, PID: 607, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.445883 644066 task_exit.go:204] [ 606: 606] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.445918 644066 task_signals.go:204] [ 606: 610] Signal 606, PID: 610, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.445945 644066 task_exit.go:204] [ 606: 610] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.445917 644066 task_signals.go:204] [ 606: 608] Signal 606, PID: 608, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.445956 644066 task_exit.go:204] [ 606: 607] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.445989 644066 task_exit.go:204] [ 606: 607] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.445942 644066 task_signals.go:204] [ 606: 609] Signal 606, PID: 609, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.445998 644066 task_exit.go:204] [ 606: 607] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.446011 644066 task_exit.go:204] [ 606: 609] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.446035 644066 task_exit.go:204] [ 606: 609] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.446087 644066 task_exit.go:204] [ 606: 609] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.446105 644066 task_exit.go:204] [ 606: 610] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.446111 644066 task_exit.go:204] [ 606: 610] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.446122 644066 task_exit.go:204] [ 606: 608] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.447404 644066 task_exit.go:204] [ 606: 608] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.447442 644066 task_exit.go:204] [ 606: 608] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.447465 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.447501 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.447510 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.447601 644066 task_exit.go:204] [ 606: 606] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.448635 644066 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.450146 644066 syscalls.go:262] [ 611: 611] Allocating stack with size of 8388608 bytes D0713 05:18:02.450252 644066 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.451062 644066 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.451097 644066 usertrap_amd64.go:106] [ 611: 611] Map a usertrap vma at 68000 D0713 05:18:02.451150 644066 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc000d93860 1 D0713 05:18:02.451171 644066 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:02.451474 644066 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.451498 644066 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc000d93860 2 D0713 05:18:02.451509 644066 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:02.451986 644066 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.452005 644066 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc000d93860 3 D0713 05:18:02.452016 644066 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:02.457707 644066 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.457744 644066 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc000d93860 4 D0713 05:18:02.457760 644066 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:02.459016 644066 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.459034 644066 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc000d93860 5 D0713 05:18:02.459046 644066 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:02.459124 644066 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.459141 644066 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc000d93860 6 D0713 05:18:02.459152 644066 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:02.459621 644066 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.459641 644066 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc000d93860 7 D0713 05:18:02.459655 644066 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:02.459845 644066 usertrap_amd64.go:212] [ 611: 612] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.459872 644066 usertrap_amd64.go:122] [ 611: 612] Allocate a new trap: 0xc000d93860 8 D0713 05:18:02.459883 644066 usertrap_amd64.go:225] [ 611: 612] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:02.460121 644066 usertrap_amd64.go:212] [ 611: 612] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.460140 644066 usertrap_amd64.go:122] [ 611: 612] Allocate a new trap: 0xc000d93860 9 D0713 05:18:02.460151 644066 usertrap_amd64.go:225] [ 611: 612] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:02.460164 644066 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.460172 644066 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc000d93860 10 D0713 05:18:02.460181 644066 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:02.460326 644066 usertrap_amd64.go:212] [ 611: 614] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:02.460350 644066 usertrap_amd64.go:122] [ 611: 614] Allocate a new trap: 0xc000d93860 11 D0713 05:18:02.460359 644066 usertrap_amd64.go:225] [ 611: 614] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:02.460727 644066 usertrap_amd64.go:212] [ 611: 612] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.460751 644066 usertrap_amd64.go:122] [ 611: 612] Allocate a new trap: 0xc000d93860 12 D0713 05:18:02.460761 644066 usertrap_amd64.go:225] [ 611: 612] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:02.460830 644066 usertrap_amd64.go:212] [ 611: 612] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.460847 644066 usertrap_amd64.go:122] [ 611: 612] Allocate a new trap: 0xc000d93860 13 D0713 05:18:02.460856 644066 usertrap_amd64.go:225] [ 611: 612] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:02.460888 644066 task_signals.go:470] [ 611: 611] Notified of signal 23 D0713 05:18:02.460991 644066 task_signals.go:220] [ 611: 611] Signal 23: delivering to handler D0713 05:18:02.467961 644066 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.467987 644066 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc000d93860 14 D0713 05:18:02.467996 644066 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46af29 trap addr 68460 ([184 37 1 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:02.472113 644066 task_signals.go:470] [ 611: 611] Notified of signal 23 D0713 05:18:02.472211 644066 task_signals.go:220] [ 611: 611] Signal 23: delivering to handler I0713 05:18:02.478999 644066 compat.go:120] Unsupported syscall iopl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/iopl for more information. D0713 05:18:02.479096 644066 usertrap_amd64.go:212] [ 611: 611] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.479110 644066 usertrap_amd64.go:122] [ 611: 611] Allocate a new trap: 0xc000d93860 15 D0713 05:18:02.479123 644066 usertrap_amd64.go:225] [ 611: 611] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 05:18:02.479172 644066 task_exit.go:204] [ 611: 611] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.479200 644066 task_exit.go:204] [ 611: 611] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.479227 644066 task_signals.go:204] [ 611: 612] Signal 611, PID: 612, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.479241 644066 task_exit.go:204] [ 611: 612] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.479248 644066 task_exit.go:204] [ 611: 612] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.479254 644066 task_exit.go:204] [ 611: 612] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.479273 644066 task_signals.go:204] [ 611: 613] Signal 611, PID: 613, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.479300 644066 task_exit.go:204] [ 611: 613] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.479312 644066 task_exit.go:204] [ 611: 613] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.479317 644066 task_exit.go:204] [ 611: 613] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.479336 644066 task_signals.go:204] [ 611: 614] Signal 611, PID: 614, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.479345 644066 task_exit.go:204] [ 611: 614] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.479352 644066 task_exit.go:204] [ 611: 614] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.479357 644066 task_exit.go:204] [ 611: 614] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.479369 644066 task_signals.go:204] [ 611: 615] Signal 611, PID: 615, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.479377 644066 task_exit.go:204] [ 611: 615] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.480631 644066 task_exit.go:204] [ 611: 615] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.480674 644066 task_exit.go:204] [ 611: 615] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.480690 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.480730 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.480786 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.481080 644066 task_exit.go:204] [ 611: 611] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.482006 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.483424 644066 syscalls.go:262] [ 616: 616] Allocating stack with size of 8388608 bytes D0713 05:18:02.483520 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.484563 644066 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.484598 644066 usertrap_amd64.go:106] [ 616: 616] Map a usertrap vma at 64000 D0713 05:18:02.484723 644066 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc000f890e0 1 D0713 05:18:02.484749 644066 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:02.485146 644066 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.485174 644066 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc000f890e0 2 D0713 05:18:02.485187 644066 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:02.485714 644066 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.485743 644066 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc000f890e0 3 D0713 05:18:02.485754 644066 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:02.491622 644066 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.491654 644066 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc000f890e0 4 D0713 05:18:02.491667 644066 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:02.492831 644066 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.492857 644066 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc000f890e0 5 D0713 05:18:02.492866 644066 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:02.492908 644066 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.492913 644066 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc000f890e0 6 D0713 05:18:02.492918 644066 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:02.493197 644066 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.493222 644066 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc000f890e0 7 D0713 05:18:02.493236 644066 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:02.493368 644066 usertrap_amd64.go:212] [ 616: 617] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.493392 644066 usertrap_amd64.go:122] [ 616: 617] Allocate a new trap: 0xc000f890e0 8 D0713 05:18:02.493402 644066 usertrap_amd64.go:225] [ 616: 617] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:02.493612 644066 usertrap_amd64.go:212] [ 616: 617] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.493658 644066 usertrap_amd64.go:122] [ 616: 617] Allocate a new trap: 0xc000f890e0 9 D0713 05:18:02.493676 644066 usertrap_amd64.go:225] [ 616: 617] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:02.493688 644066 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.493694 644066 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc000f890e0 10 D0713 05:18:02.493710 644066 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:02.493836 644066 usertrap_amd64.go:212] [ 616: 619] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:02.493869 644066 usertrap_amd64.go:122] [ 616: 619] Allocate a new trap: 0xc000f890e0 11 D0713 05:18:02.493880 644066 usertrap_amd64.go:225] [ 616: 619] Apply the binary patch addr 46b6e0 trap addr 64370 ([184 24 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:02.494334 644066 usertrap_amd64.go:212] [ 616: 617] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.494360 644066 usertrap_amd64.go:122] [ 616: 617] Allocate a new trap: 0xc000f890e0 12 D0713 05:18:02.494430 644066 usertrap_amd64.go:225] [ 616: 617] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:02.494464 644066 usertrap_amd64.go:212] [ 616: 617] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.494473 644066 usertrap_amd64.go:122] [ 616: 617] Allocate a new trap: 0xc000f890e0 13 D0713 05:18:02.494483 644066 usertrap_amd64.go:225] [ 616: 617] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:02.494528 644066 task_signals.go:470] [ 616: 616] Notified of signal 23 D0713 05:18:02.494593 644066 task_signals.go:220] [ 616: 616] Signal 23: delivering to handler D0713 05:18:02.500699 644066 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.500724 644066 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc000f890e0 14 D0713 05:18:02.500735 644066 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 46af29 trap addr 64460 ([184 37 1 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:02.504821 644066 task_signals.go:470] [ 616: 616] Notified of signal 23 D0713 05:18:02.504861 644066 task_signals.go:220] [ 616: 616] Signal 23: delivering to handler I0713 05:18:02.511662 644066 compat.go:120] Unsupported syscall ioprio_get(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_get for more information. D0713 05:18:02.511718 644066 usertrap_amd64.go:212] [ 616: 616] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.511730 644066 usertrap_amd64.go:122] [ 616: 616] Allocate a new trap: 0xc000f890e0 15 D0713 05:18:02.511741 644066 usertrap_amd64.go:225] [ 616: 616] Apply the binary patch addr 46ae44 trap addr 644b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 68 6 0]) D0713 05:18:02.511776 644066 task_exit.go:204] [ 616: 616] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.511804 644066 task_signals.go:204] [ 616: 619] Signal 616, PID: 619, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.511804 644066 task_signals.go:204] [ 616: 620] Signal 616, PID: 620, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.511824 644066 task_signals.go:204] [ 616: 617] Signal 616, PID: 617, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.511844 644066 task_exit.go:204] [ 616: 616] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.511897 644066 task_exit.go:204] [ 616: 619] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.511893 644066 task_signals.go:204] [ 616: 618] Signal 616, PID: 618, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.511920 644066 task_exit.go:204] [ 616: 618] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.511931 644066 task_exit.go:204] [ 616: 618] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.511938 644066 task_exit.go:204] [ 616: 618] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.511956 644066 task_exit.go:204] [ 616: 619] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.511971 644066 task_exit.go:204] [ 616: 619] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.511980 644066 task_exit.go:204] [ 616: 617] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.511988 644066 task_exit.go:204] [ 616: 617] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.512002 644066 task_exit.go:204] [ 616: 617] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.512020 644066 task_exit.go:204] [ 616: 620] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.513157 644066 task_exit.go:204] [ 616: 620] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.513179 644066 task_exit.go:204] [ 616: 620] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.513193 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.513239 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.513361 644066 task_exit.go:204] [ 616: 616] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.513425 644066 task_signals.go:470] [ 6: 19] Notified of signal 23 D0713 05:18:02.513456 644066 task_signals.go:220] [ 6: 19] Signal 23: delivering to handler D0713 05:18:02.513978 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.515531 644066 syscalls.go:262] [ 621: 621] Allocating stack with size of 8388608 bytes D0713 05:18:02.515632 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.516844 644066 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.516886 644066 usertrap_amd64.go:106] [ 621: 621] Map a usertrap vma at 65000 D0713 05:18:02.517094 644066 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0007fb1a0 1 D0713 05:18:02.517130 644066 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:02.517442 644066 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.517464 644066 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0007fb1a0 2 D0713 05:18:02.517472 644066 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:02.518307 644066 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.518335 644066 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0007fb1a0 3 D0713 05:18:02.518346 644066 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:02.525316 644066 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.525346 644066 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0007fb1a0 4 D0713 05:18:02.525358 644066 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:02.526595 644066 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.526624 644066 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0007fb1a0 5 D0713 05:18:02.526636 644066 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:02.526686 644066 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.526695 644066 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0007fb1a0 6 D0713 05:18:02.526703 644066 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:02.526963 644066 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.526987 644066 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0007fb1a0 7 D0713 05:18:02.527000 644066 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:02.527213 644066 usertrap_amd64.go:212] [ 621: 622] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.527237 644066 usertrap_amd64.go:122] [ 621: 622] Allocate a new trap: 0xc0007fb1a0 8 D0713 05:18:02.527248 644066 usertrap_amd64.go:225] [ 621: 622] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:02.527377 644066 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.527410 644066 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0007fb1a0 9 D0713 05:18:02.527421 644066 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:02.527487 644066 usertrap_amd64.go:212] [ 621: 622] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.527511 644066 usertrap_amd64.go:122] [ 621: 622] Allocate a new trap: 0xc0007fb1a0 10 D0713 05:18:02.527522 644066 usertrap_amd64.go:225] [ 621: 622] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:02.535972 644066 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.536002 644066 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0007fb1a0 11 D0713 05:18:02.536017 644066 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:02.539381 644066 usertrap_amd64.go:212] [ 621: 622] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.539451 644066 usertrap_amd64.go:122] [ 621: 622] Allocate a new trap: 0xc0007fb1a0 12 D0713 05:18:02.539475 644066 usertrap_amd64.go:225] [ 621: 622] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:02.539549 644066 usertrap_amd64.go:212] [ 621: 622] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.539569 644066 usertrap_amd64.go:122] [ 621: 622] Allocate a new trap: 0xc0007fb1a0 13 D0713 05:18:02.539580 644066 usertrap_amd64.go:225] [ 621: 622] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:02.539626 644066 task_signals.go:470] [ 621: 621] Notified of signal 23 D0713 05:18:02.539890 644066 task_signals.go:220] [ 621: 621] Signal 23: delivering to handler I0713 05:18:02.548160 644066 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0713 05:18:02.548315 644066 usertrap_amd64.go:212] [ 621: 621] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.548341 644066 usertrap_amd64.go:122] [ 621: 621] Allocate a new trap: 0xc0007fb1a0 14 D0713 05:18:02.548354 644066 usertrap_amd64.go:225] [ 621: 621] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:02.548466 644066 task_exit.go:204] [ 621: 621] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.548507 644066 task_signals.go:204] [ 621: 622] Signal 621, PID: 622, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.548508 644066 task_signals.go:204] [ 621: 623] Signal 621, PID: 623, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.548528 644066 task_signals.go:204] [ 621: 624] Signal 621, PID: 624, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.548538 644066 task_exit.go:204] [ 621: 623] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.548549 644066 task_signals.go:204] [ 621: 625] Signal 621, PID: 625, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.548561 644066 task_exit.go:204] [ 621: 623] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.548567 644066 task_exit.go:204] [ 621: 623] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.548584 644066 task_exit.go:204] [ 621: 621] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.548594 644066 task_exit.go:204] [ 621: 622] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.548600 644066 task_exit.go:204] [ 621: 622] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.548604 644066 task_exit.go:204] [ 621: 622] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.548610 644066 task_exit.go:204] [ 621: 624] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.548615 644066 task_exit.go:204] [ 621: 624] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.548619 644066 task_exit.go:204] [ 621: 624] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.548625 644066 task_exit.go:204] [ 621: 625] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.550067 644066 task_exit.go:204] [ 621: 625] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.550096 644066 task_exit.go:204] [ 621: 625] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.550108 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.550131 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:02.550138 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.550275 644066 task_exit.go:204] [ 621: 621] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.551035 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.552892 644066 syscalls.go:262] [ 626: 626] Allocating stack with size of 8388608 bytes D0713 05:18:02.553241 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.555357 644066 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.555405 644066 usertrap_amd64.go:106] [ 626: 626] Map a usertrap vma at 67000 D0713 05:18:02.555489 644066 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000f899e0 1 D0713 05:18:02.555521 644066 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:02.555720 644066 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.555737 644066 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000f899e0 2 D0713 05:18:02.555748 644066 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:02.556151 644066 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.556175 644066 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000f899e0 3 D0713 05:18:02.556190 644066 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:02.562378 644066 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.562409 644066 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000f899e0 4 D0713 05:18:02.562428 644066 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:02.563724 644066 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.563822 644066 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000f899e0 5 D0713 05:18:02.563842 644066 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:02.563930 644066 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.563949 644066 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000f899e0 6 D0713 05:18:02.563957 644066 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:02.564629 644066 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.564666 644066 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000f899e0 7 D0713 05:18:02.564679 644066 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:02.564833 644066 usertrap_amd64.go:212] [ 626: 627] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.564859 644066 usertrap_amd64.go:122] [ 626: 627] Allocate a new trap: 0xc000f899e0 8 D0713 05:18:02.564873 644066 usertrap_amd64.go:225] [ 626: 627] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:02.565102 644066 usertrap_amd64.go:212] [ 626: 627] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.565126 644066 usertrap_amd64.go:122] [ 626: 627] Allocate a new trap: 0xc000f899e0 9 D0713 05:18:02.565139 644066 usertrap_amd64.go:225] [ 626: 627] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:02.565389 644066 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.565418 644066 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000f899e0 10 D0713 05:18:02.565447 644066 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:02.573562 644066 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.573598 644066 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000f899e0 11 D0713 05:18:02.573610 644066 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:02.576205 644066 usertrap_amd64.go:212] [ 626: 627] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.576323 644066 usertrap_amd64.go:122] [ 626: 627] Allocate a new trap: 0xc000f899e0 12 D0713 05:18:02.576346 644066 usertrap_amd64.go:225] [ 626: 627] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:02.576389 644066 usertrap_amd64.go:212] [ 626: 627] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.576397 644066 usertrap_amd64.go:122] [ 626: 627] Allocate a new trap: 0xc000f899e0 13 D0713 05:18:02.576405 644066 usertrap_amd64.go:225] [ 626: 627] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:02.576520 644066 task_signals.go:470] [ 626: 626] Notified of signal 23 D0713 05:18:02.576611 644066 task_signals.go:220] [ 626: 626] Signal 23: delivering to handler I0713 05:18:02.584812 644066 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0713 05:18:02.584897 644066 usertrap_amd64.go:212] [ 626: 626] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.584931 644066 usertrap_amd64.go:122] [ 626: 626] Allocate a new trap: 0xc000f899e0 14 D0713 05:18:02.585000 644066 usertrap_amd64.go:225] [ 626: 626] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:02.585059 644066 task_exit.go:204] [ 626: 626] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.585083 644066 task_exit.go:204] [ 626: 626] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.585086 644066 task_signals.go:204] [ 626: 628] Signal 626, PID: 628, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.585111 644066 task_exit.go:204] [ 626: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.585108 644066 task_signals.go:204] [ 626: 630] Signal 626, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.585125 644066 task_signals.go:204] [ 626: 627] Signal 626, PID: 627, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.585136 644066 task_exit.go:204] [ 626: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.585152 644066 task_exit.go:204] [ 626: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.585165 644066 task_exit.go:204] [ 626: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.585173 644066 task_exit.go:204] [ 626: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.585163 644066 task_signals.go:204] [ 626: 629] Signal 626, PID: 629, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.585177 644066 task_exit.go:204] [ 626: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.585196 644066 task_exit.go:204] [ 626: 627] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.585222 644066 task_exit.go:204] [ 626: 627] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.585240 644066 task_exit.go:204] [ 626: 627] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.585249 644066 task_exit.go:204] [ 626: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.586513 644066 task_exit.go:204] [ 626: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.586542 644066 task_exit.go:204] [ 626: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.586558 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.588477 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:02.588529 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.588748 644066 task_exit.go:204] [ 626: 626] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.589370 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.590967 644066 syscalls.go:262] [ 631: 631] Allocating stack with size of 8388608 bytes D0713 05:18:02.591109 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.592373 644066 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.592427 644066 usertrap_amd64.go:106] [ 631: 631] Map a usertrap vma at 65000 D0713 05:18:02.592543 644066 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc000b09590 1 D0713 05:18:02.592584 644066 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:02.592992 644066 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.593019 644066 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc000b09590 2 D0713 05:18:02.593030 644066 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:02.593959 644066 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.593986 644066 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc000b09590 3 D0713 05:18:02.593994 644066 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:02.601506 644066 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.601541 644066 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc000b09590 4 D0713 05:18:02.601554 644066 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:02.603013 644066 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.603051 644066 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc000b09590 5 D0713 05:18:02.603085 644066 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:02.603143 644066 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.603151 644066 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc000b09590 6 D0713 05:18:02.603157 644066 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:02.603357 644066 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.603380 644066 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc000b09590 7 D0713 05:18:02.603390 644066 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:02.603688 644066 usertrap_amd64.go:212] [ 631: 632] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.603724 644066 usertrap_amd64.go:122] [ 631: 632] Allocate a new trap: 0xc000b09590 8 D0713 05:18:02.603743 644066 usertrap_amd64.go:225] [ 631: 632] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:02.604054 644066 usertrap_amd64.go:212] [ 631: 632] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.604102 644066 usertrap_amd64.go:122] [ 631: 632] Allocate a new trap: 0xc000b09590 9 D0713 05:18:02.604117 644066 usertrap_amd64.go:225] [ 631: 632] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:02.604229 644066 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.604254 644066 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc000b09590 10 D0713 05:18:02.604266 644066 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:02.604878 644066 usertrap_amd64.go:212] [ 631: 632] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.604904 644066 usertrap_amd64.go:122] [ 631: 632] Allocate a new trap: 0xc000b09590 11 D0713 05:18:02.604914 644066 usertrap_amd64.go:225] [ 631: 632] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:02.605049 644066 usertrap_amd64.go:212] [ 631: 632] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.605061 644066 usertrap_amd64.go:122] [ 631: 632] Allocate a new trap: 0xc000b09590 12 D0713 05:18:02.605069 644066 usertrap_amd64.go:225] [ 631: 632] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:02.605144 644066 task_signals.go:470] [ 631: 631] Notified of signal 23 D0713 05:18:02.605176 644066 task_signals.go:220] [ 631: 631] Signal 23: delivering to handler D0713 05:18:02.615550 644066 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.615595 644066 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc000b09590 13 D0713 05:18:02.615613 644066 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:02.615722 644066 task_signals.go:470] [ 631: 631] Notified of signal 23 D0713 05:18:02.615787 644066 task_signals.go:220] [ 631: 631] Signal 23: delivering to handler D0713 05:18:02.626570 644066 task_signals.go:470] [ 631: 631] Notified of signal 23 D0713 05:18:02.626903 644066 task_signals.go:220] [ 631: 631] Signal 23: delivering to handler I0713 05:18:02.627323 644066 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0713 05:18:02.627394 644066 usertrap_amd64.go:212] [ 631: 631] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.627406 644066 usertrap_amd64.go:122] [ 631: 631] Allocate a new trap: 0xc000b09590 14 D0713 05:18:02.627420 644066 usertrap_amd64.go:225] [ 631: 631] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:02.627486 644066 task_exit.go:204] [ 631: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.627511 644066 task_exit.go:204] [ 631: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.627535 644066 task_signals.go:204] [ 631: 634] Signal 631, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.627543 644066 task_exit.go:204] [ 631: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.627550 644066 task_exit.go:204] [ 631: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.627554 644066 task_exit.go:204] [ 631: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.627571 644066 task_signals.go:204] [ 631: 633] Signal 631, PID: 633, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.627572 644066 task_signals.go:204] [ 631: 635] Signal 631, PID: 635, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.627597 644066 task_exit.go:204] [ 631: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.627625 644066 task_signals.go:204] [ 631: 632] Signal 631, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.627662 644066 task_exit.go:204] [ 631: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.627677 644066 task_exit.go:204] [ 631: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.627691 644066 task_exit.go:204] [ 631: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.627697 644066 task_exit.go:204] [ 631: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.627700 644066 task_exit.go:204] [ 631: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.627740 644066 task_exit.go:204] [ 631: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.629084 644066 task_exit.go:204] [ 631: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.629116 644066 task_exit.go:204] [ 631: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.629139 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.629207 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:02.629227 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.629507 644066 task_exit.go:204] [ 631: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.629964 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.631676 644066 syscalls.go:262] [ 636: 636] Allocating stack with size of 8388608 bytes D0713 05:18:02.631800 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.633270 644066 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.633314 644066 usertrap_amd64.go:106] [ 636: 636] Map a usertrap vma at 60000 D0713 05:18:02.633426 644066 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc001786330 1 D0713 05:18:02.633491 644066 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:02.633942 644066 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.633967 644066 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc001786330 2 D0713 05:18:02.633980 644066 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:02.635599 644066 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.635627 644066 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc001786330 3 D0713 05:18:02.635642 644066 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:02.641565 644066 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.641628 644066 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc001786330 4 D0713 05:18:02.641646 644066 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:02.642888 644066 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.642923 644066 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc001786330 5 D0713 05:18:02.642949 644066 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:02.643020 644066 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.643040 644066 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc001786330 6 D0713 05:18:02.643049 644066 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:02.643408 644066 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.643426 644066 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc001786330 7 D0713 05:18:02.643435 644066 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:02.643706 644066 usertrap_amd64.go:212] [ 636: 637] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.643736 644066 usertrap_amd64.go:122] [ 636: 637] Allocate a new trap: 0xc001786330 8 D0713 05:18:02.643747 644066 usertrap_amd64.go:225] [ 636: 637] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:02.643944 644066 usertrap_amd64.go:212] [ 636: 637] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.643972 644066 usertrap_amd64.go:122] [ 636: 637] Allocate a new trap: 0xc001786330 9 D0713 05:18:02.643984 644066 usertrap_amd64.go:225] [ 636: 637] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:02.644008 644066 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.644024 644066 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc001786330 10 D0713 05:18:02.644032 644066 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:02.644857 644066 usertrap_amd64.go:212] [ 636: 637] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.644887 644066 usertrap_amd64.go:122] [ 636: 637] Allocate a new trap: 0xc001786330 11 D0713 05:18:02.644898 644066 usertrap_amd64.go:225] [ 636: 637] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:02.645212 644066 usertrap_amd64.go:212] [ 636: 637] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.645239 644066 usertrap_amd64.go:122] [ 636: 637] Allocate a new trap: 0xc001786330 12 D0713 05:18:02.645249 644066 usertrap_amd64.go:225] [ 636: 637] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:02.645610 644066 task_signals.go:470] [ 636: 636] Notified of signal 23 D0713 05:18:02.645805 644066 task_signals.go:220] [ 636: 636] Signal 23: delivering to handler D0713 05:18:02.653788 644066 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.653823 644066 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc001786330 13 D0713 05:18:02.653834 644066 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:02.656431 644066 task_signals.go:470] [ 636: 636] Notified of signal 23 D0713 05:18:02.656566 644066 task_signals.go:220] [ 636: 636] Signal 23: delivering to handler D0713 05:18:02.665116 644066 usertrap_amd64.go:212] [ 636: 636] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.665157 644066 usertrap_amd64.go:122] [ 636: 636] Allocate a new trap: 0xc001786330 14 D0713 05:18:02.665170 644066 usertrap_amd64.go:225] [ 636: 636] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:02.665240 644066 task_exit.go:204] [ 636: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.665273 644066 task_exit.go:204] [ 636: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.665294 644066 task_signals.go:204] [ 636: 638] Signal 636, PID: 638, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.665309 644066 task_exit.go:204] [ 636: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.665316 644066 task_exit.go:204] [ 636: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.665307 644066 task_signals.go:204] [ 636: 639] Signal 636, PID: 639, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.665321 644066 task_exit.go:204] [ 636: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.665341 644066 task_exit.go:204] [ 636: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.665295 644066 task_signals.go:204] [ 636: 640] Signal 636, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.665344 644066 task_signals.go:204] [ 636: 637] Signal 636, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.665349 644066 task_exit.go:204] [ 636: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.665381 644066 task_exit.go:204] [ 636: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.665457 644066 task_exit.go:204] [ 636: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.665519 644066 task_exit.go:204] [ 636: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.665527 644066 task_exit.go:204] [ 636: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.665544 644066 task_exit.go:204] [ 636: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.666968 644066 task_exit.go:204] [ 636: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.666990 644066 task_exit.go:204] [ 636: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.667014 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.667115 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:02.667128 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.669143 644066 task_exit.go:204] [ 636: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.670080 644066 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.671616 644066 syscalls.go:262] [ 641: 641] Allocating stack with size of 8388608 bytes D0713 05:18:02.671802 644066 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.673068 644066 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.673109 644066 usertrap_amd64.go:106] [ 641: 641] Map a usertrap vma at 68000 D0713 05:18:02.673237 644066 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc0018e0780 1 D0713 05:18:02.673267 644066 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:02.673737 644066 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.673771 644066 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc0018e0780 2 D0713 05:18:02.673784 644066 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:02.674577 644066 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.674602 644066 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc0018e0780 3 D0713 05:18:02.674615 644066 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:02.681308 644066 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.681341 644066 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc0018e0780 4 D0713 05:18:02.681353 644066 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:02.682664 644066 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.682694 644066 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc0018e0780 5 D0713 05:18:02.682752 644066 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:02.682917 644066 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.682954 644066 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc0018e0780 6 D0713 05:18:02.682967 644066 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:02.683449 644066 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.683470 644066 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc0018e0780 7 D0713 05:18:02.683476 644066 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:02.683674 644066 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.683698 644066 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc0018e0780 8 D0713 05:18:02.683708 644066 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:02.683910 644066 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.683941 644066 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc0018e0780 9 D0713 05:18:02.683967 644066 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:02.684042 644066 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.684061 644066 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc0018e0780 10 D0713 05:18:02.684071 644066 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:02.692035 644066 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.692063 644066 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc0018e0780 11 D0713 05:18:02.692073 644066 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:02.694766 644066 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.694796 644066 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc0018e0780 12 D0713 05:18:02.694810 644066 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:02.694869 644066 usertrap_amd64.go:212] [ 641: 642] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.694879 644066 usertrap_amd64.go:122] [ 641: 642] Allocate a new trap: 0xc0018e0780 13 D0713 05:18:02.694888 644066 usertrap_amd64.go:225] [ 641: 642] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:02.694907 644066 task_signals.go:470] [ 641: 641] Notified of signal 23 D0713 05:18:02.694987 644066 task_signals.go:220] [ 641: 641] Signal 23: delivering to handler I0713 05:18:02.702580 644066 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0713 05:18:02.702656 644066 usertrap_amd64.go:212] [ 641: 641] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.702665 644066 usertrap_amd64.go:122] [ 641: 641] Allocate a new trap: 0xc0018e0780 14 D0713 05:18:02.702674 644066 usertrap_amd64.go:225] [ 641: 641] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:02.702705 644066 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.702738 644066 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.702750 644066 task_signals.go:204] [ 641: 643] Signal 641, PID: 643, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.702802 644066 task_signals.go:204] [ 641: 645] Signal 641, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.702827 644066 task_exit.go:204] [ 641: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.702849 644066 task_exit.go:204] [ 641: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.702869 644066 task_exit.go:204] [ 641: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.702887 644066 task_signals.go:204] [ 641: 644] Signal 641, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.702898 644066 task_exit.go:204] [ 641: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.702906 644066 task_exit.go:204] [ 641: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.702920 644066 task_exit.go:204] [ 641: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.702938 644066 task_signals.go:204] [ 641: 642] Signal 641, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.702950 644066 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.702963 644066 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.702970 644066 task_exit.go:204] [ 641: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.702981 644066 task_exit.go:204] [ 641: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.704108 644066 task_exit.go:204] [ 641: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.704190 644066 task_exit.go:204] [ 641: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.704227 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.704279 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.704301 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.704481 644066 task_exit.go:204] [ 641: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.705181 644066 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.706658 644066 syscalls.go:262] [ 646: 646] Allocating stack with size of 8388608 bytes D0713 05:18:02.706809 644066 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.707736 644066 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.707822 644066 usertrap_amd64.go:106] [ 646: 646] Map a usertrap vma at 65000 D0713 05:18:02.707935 644066 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc0018e0bd0 1 D0713 05:18:02.707960 644066 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:02.708422 644066 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.708443 644066 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc0018e0bd0 2 D0713 05:18:02.708454 644066 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:02.708771 644066 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.708793 644066 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc0018e0bd0 3 D0713 05:18:02.708802 644066 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:02.715057 644066 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.715083 644066 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc0018e0bd0 4 D0713 05:18:02.715092 644066 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:02.717325 644066 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.717352 644066 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc0018e0bd0 5 D0713 05:18:02.717362 644066 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:02.717409 644066 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.717420 644066 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc0018e0bd0 6 D0713 05:18:02.717427 644066 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:02.717587 644066 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.717619 644066 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc0018e0bd0 7 D0713 05:18:02.717624 644066 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:02.717762 644066 usertrap_amd64.go:212] [ 646: 647] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.717776 644066 usertrap_amd64.go:122] [ 646: 647] Allocate a new trap: 0xc0018e0bd0 8 D0713 05:18:02.717785 644066 usertrap_amd64.go:225] [ 646: 647] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:02.717978 644066 usertrap_amd64.go:212] [ 646: 647] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.718003 644066 usertrap_amd64.go:122] [ 646: 647] Allocate a new trap: 0xc0018e0bd0 9 D0713 05:18:02.718014 644066 usertrap_amd64.go:225] [ 646: 647] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:02.718094 644066 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.718124 644066 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc0018e0bd0 10 D0713 05:18:02.718140 644066 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:02.725752 644066 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.725788 644066 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc0018e0bd0 11 D0713 05:18:02.725798 644066 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:02.728750 644066 usertrap_amd64.go:212] [ 646: 647] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.728775 644066 usertrap_amd64.go:122] [ 646: 647] Allocate a new trap: 0xc0018e0bd0 12 D0713 05:18:02.728785 644066 usertrap_amd64.go:225] [ 646: 647] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:02.728798 644066 usertrap_amd64.go:212] [ 646: 647] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.728802 644066 usertrap_amd64.go:122] [ 646: 647] Allocate a new trap: 0xc0018e0bd0 13 D0713 05:18:02.728808 644066 usertrap_amd64.go:225] [ 646: 647] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:02.728838 644066 task_signals.go:470] [ 646: 646] Notified of signal 23 D0713 05:18:02.729885 644066 task_signals.go:220] [ 646: 646] Signal 23: delivering to handler I0713 05:18:02.737090 644066 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0713 05:18:02.737219 644066 usertrap_amd64.go:212] [ 646: 646] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.737231 644066 usertrap_amd64.go:122] [ 646: 646] Allocate a new trap: 0xc0018e0bd0 14 D0713 05:18:02.737241 644066 usertrap_amd64.go:225] [ 646: 646] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:02.737300 644066 task_exit.go:204] [ 646: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.737336 644066 task_exit.go:204] [ 646: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.737368 644066 task_signals.go:204] [ 646: 649] Signal 646, PID: 649, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.737360 644066 task_signals.go:204] [ 646: 647] Signal 646, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.737389 644066 task_exit.go:204] [ 646: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.737430 644066 task_signals.go:204] [ 646: 648] Signal 646, PID: 648, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.737462 644066 task_signals.go:204] [ 646: 650] Signal 646, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.737491 644066 task_exit.go:204] [ 646: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.737508 644066 task_exit.go:204] [ 646: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.737530 644066 task_exit.go:204] [ 646: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.737575 644066 task_exit.go:204] [ 646: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.737589 644066 task_exit.go:204] [ 646: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.737637 644066 task_exit.go:204] [ 646: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.737646 644066 task_exit.go:204] [ 646: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.737652 644066 task_exit.go:204] [ 646: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.737661 644066 task_exit.go:204] [ 646: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.738997 644066 task_exit.go:204] [ 646: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.739039 644066 task_exit.go:204] [ 646: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.739057 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.739102 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.739132 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.739236 644066 task_exit.go:204] [ 646: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.739837 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.741053 644066 syscalls.go:262] [ 651: 651] Allocating stack with size of 8388608 bytes D0713 05:18:02.741264 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.743536 644066 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.743584 644066 usertrap_amd64.go:106] [ 651: 651] Map a usertrap vma at 63000 D0713 05:18:02.744114 644066 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001786570 1 D0713 05:18:02.744149 644066 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:02.745082 644066 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.745104 644066 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001786570 2 D0713 05:18:02.745111 644066 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:02.745832 644066 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.745860 644066 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001786570 3 D0713 05:18:02.745870 644066 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:02.752123 644066 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.752162 644066 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001786570 4 D0713 05:18:02.752175 644066 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:02.753443 644066 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.753474 644066 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001786570 5 D0713 05:18:02.753485 644066 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:02.753618 644066 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.753634 644066 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001786570 6 D0713 05:18:02.753643 644066 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:02.754450 644066 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.754479 644066 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001786570 7 D0713 05:18:02.754488 644066 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:02.754688 644066 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.754700 644066 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc001786570 8 D0713 05:18:02.754710 644066 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:02.754872 644066 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.754889 644066 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc001786570 9 D0713 05:18:02.754897 644066 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:02.754961 644066 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.754979 644066 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001786570 10 D0713 05:18:02.754988 644066 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:02.763090 644066 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.763118 644066 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001786570 11 D0713 05:18:02.763130 644066 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:02.765801 644066 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.767928 644066 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc001786570 12 D0713 05:18:02.767965 644066 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:02.768091 644066 usertrap_amd64.go:212] [ 651: 652] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.768119 644066 usertrap_amd64.go:122] [ 651: 652] Allocate a new trap: 0xc001786570 13 D0713 05:18:02.768131 644066 usertrap_amd64.go:225] [ 651: 652] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:02.768200 644066 task_signals.go:470] [ 651: 651] Notified of signal 23 D0713 05:18:02.768331 644066 task_signals.go:220] [ 651: 651] Signal 23: delivering to handler I0713 05:18:02.774355 644066 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0713 05:18:02.774514 644066 usertrap_amd64.go:212] [ 651: 651] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.774568 644066 usertrap_amd64.go:122] [ 651: 651] Allocate a new trap: 0xc001786570 14 D0713 05:18:02.774581 644066 usertrap_amd64.go:225] [ 651: 651] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:02.774729 644066 task_exit.go:204] [ 651: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.774888 644066 task_exit.go:204] [ 651: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.775034 644066 task_signals.go:204] [ 651: 653] Signal 651, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.775125 644066 task_signals.go:204] [ 651: 652] Signal 651, PID: 652, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.775156 644066 task_exit.go:204] [ 651: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.775167 644066 task_signals.go:204] [ 651: 655] Signal 651, PID: 655, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.775192 644066 task_exit.go:204] [ 651: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.775326 644066 task_signals.go:204] [ 651: 654] Signal 651, PID: 654, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.775391 644066 task_exit.go:204] [ 651: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.777027 644066 task_exit.go:204] [ 651: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.777053 644066 task_exit.go:204] [ 651: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.777077 644066 task_exit.go:204] [ 651: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.777210 644066 task_exit.go:204] [ 651: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.777306 644066 task_exit.go:204] [ 651: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.777338 644066 task_exit.go:204] [ 651: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.777346 644066 task_exit.go:204] [ 651: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.778543 644066 task_exit.go:204] [ 651: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.778578 644066 task_exit.go:204] [ 651: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.778593 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.778621 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.778646 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.778833 644066 task_exit.go:204] [ 651: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.779016 644066 task_signals.go:470] [ 6: 10] Notified of signal 23 D0713 05:18:02.779135 644066 task_signals.go:220] [ 6: 10] Signal 23: delivering to handler D0713 05:18:02.779458 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.781515 644066 syscalls.go:262] [ 656: 656] Allocating stack with size of 8388608 bytes D0713 05:18:02.781735 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.783003 644066 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.783053 644066 usertrap_amd64.go:106] [ 656: 656] Map a usertrap vma at 68000 D0713 05:18:02.783163 644066 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0007fbec0 1 D0713 05:18:02.783196 644066 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:02.783528 644066 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.783567 644066 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0007fbec0 2 D0713 05:18:02.783584 644066 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:02.784651 644066 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.784682 644066 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0007fbec0 3 D0713 05:18:02.784696 644066 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:02.793322 644066 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.795954 644066 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0007fbec0 4 D0713 05:18:02.796055 644066 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:02.797536 644066 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.797566 644066 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0007fbec0 5 D0713 05:18:02.797578 644066 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:02.797639 644066 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.797651 644066 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0007fbec0 6 D0713 05:18:02.797658 644066 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:02.797877 644066 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.797895 644066 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0007fbec0 7 D0713 05:18:02.797903 644066 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:02.798080 644066 usertrap_amd64.go:212] [ 656: 657] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.798103 644066 usertrap_amd64.go:122] [ 656: 657] Allocate a new trap: 0xc0007fbec0 8 D0713 05:18:02.798113 644066 usertrap_amd64.go:225] [ 656: 657] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:02.798183 644066 usertrap_amd64.go:212] [ 656: 657] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.798267 644066 usertrap_amd64.go:122] [ 656: 657] Allocate a new trap: 0xc0007fbec0 9 D0713 05:18:02.798336 644066 usertrap_amd64.go:225] [ 656: 657] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:02.798433 644066 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.798462 644066 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0007fbec0 10 D0713 05:18:02.798476 644066 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:02.798774 644066 usertrap_amd64.go:212] [ 656: 659] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:02.798800 644066 usertrap_amd64.go:122] [ 656: 659] Allocate a new trap: 0xc0007fbec0 11 D0713 05:18:02.798811 644066 usertrap_amd64.go:225] [ 656: 659] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:02.807513 644066 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.807555 644066 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0007fbec0 12 D0713 05:18:02.807579 644066 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:02.810211 644066 usertrap_amd64.go:212] [ 656: 657] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.810244 644066 usertrap_amd64.go:122] [ 656: 657] Allocate a new trap: 0xc0007fbec0 13 D0713 05:18:02.810258 644066 usertrap_amd64.go:225] [ 656: 657] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:02.810333 644066 usertrap_amd64.go:212] [ 656: 657] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.810372 644066 usertrap_amd64.go:122] [ 656: 657] Allocate a new trap: 0xc0007fbec0 14 D0713 05:18:02.810390 644066 usertrap_amd64.go:225] [ 656: 657] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:02.810502 644066 task_signals.go:470] [ 656: 656] Notified of signal 23 D0713 05:18:02.810611 644066 task_signals.go:220] [ 656: 656] Signal 23: delivering to handler D0713 05:18:02.818272 644066 usertrap_amd64.go:212] [ 656: 656] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.818324 644066 usertrap_amd64.go:122] [ 656: 656] Allocate a new trap: 0xc0007fbec0 15 D0713 05:18:02.818353 644066 usertrap_amd64.go:225] [ 656: 656] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 05:18:02.818466 644066 task_exit.go:204] [ 656: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.818516 644066 task_exit.go:204] [ 656: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.818554 644066 task_signals.go:204] [ 656: 658] Signal 656, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.818573 644066 task_exit.go:204] [ 656: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.818593 644066 task_exit.go:204] [ 656: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.818600 644066 task_exit.go:204] [ 656: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.818620 644066 task_signals.go:204] [ 656: 657] Signal 656, PID: 657, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.818643 644066 task_exit.go:204] [ 656: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.818652 644066 task_exit.go:204] [ 656: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.818659 644066 task_exit.go:204] [ 656: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.818673 644066 task_signals.go:204] [ 656: 659] Signal 656, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.818694 644066 task_exit.go:204] [ 656: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.818701 644066 task_exit.go:204] [ 656: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.818706 644066 task_exit.go:204] [ 656: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.818720 644066 task_signals.go:204] [ 656: 660] Signal 656, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.818729 644066 task_exit.go:204] [ 656: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.820226 644066 task_exit.go:204] [ 656: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.820313 644066 task_exit.go:204] [ 656: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.820373 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.820447 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.820486 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.820752 644066 task_exit.go:204] [ 656: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.821608 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.823026 644066 syscalls.go:262] [ 661: 661] Allocating stack with size of 8388608 bytes D0713 05:18:02.823185 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.824387 644066 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.824518 644066 usertrap_amd64.go:106] [ 661: 661] Map a usertrap vma at 65000 D0713 05:18:02.824681 644066 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc0007fa1b0 1 D0713 05:18:02.824737 644066 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:02.825131 644066 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.825153 644066 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc0007fa1b0 2 D0713 05:18:02.825162 644066 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:02.825702 644066 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.825729 644066 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc0007fa1b0 3 D0713 05:18:02.825741 644066 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:02.832306 644066 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.832342 644066 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc0007fa1b0 4 D0713 05:18:02.832355 644066 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:02.833500 644066 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.833523 644066 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc0007fa1b0 5 D0713 05:18:02.833530 644066 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:02.833558 644066 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.833562 644066 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc0007fa1b0 6 D0713 05:18:02.833567 644066 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:02.833750 644066 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.833764 644066 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc0007fa1b0 7 D0713 05:18:02.833775 644066 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:02.833849 644066 usertrap_amd64.go:212] [ 661: 662] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.833864 644066 usertrap_amd64.go:122] [ 661: 662] Allocate a new trap: 0xc0007fa1b0 8 D0713 05:18:02.833874 644066 usertrap_amd64.go:225] [ 661: 662] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:02.834049 644066 usertrap_amd64.go:212] [ 661: 662] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:02.834069 644066 usertrap_amd64.go:122] [ 661: 662] Allocate a new trap: 0xc0007fa1b0 9 D0713 05:18:02.834078 644066 usertrap_amd64.go:225] [ 661: 662] Apply the binary patch addr 46b6e0 trap addr 652d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:02.834264 644066 usertrap_amd64.go:212] [ 661: 662] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.834466 644066 usertrap_amd64.go:122] [ 661: 662] Allocate a new trap: 0xc0007fa1b0 10 D0713 05:18:02.834526 644066 usertrap_amd64.go:225] [ 661: 662] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:02.834696 644066 usertrap_amd64.go:212] [ 661: 662] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.834788 644066 usertrap_amd64.go:122] [ 661: 662] Allocate a new trap: 0xc0007fa1b0 11 D0713 05:18:02.834874 644066 usertrap_amd64.go:225] [ 661: 662] Apply the binary patch addr 46af76 trap addr 65370 ([184 35 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:02.841975 644066 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.842009 644066 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc0007fa1b0 12 D0713 05:18:02.842023 644066 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46af29 trap addr 653c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:02.845212 644066 usertrap_amd64.go:212] [ 661: 662] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.845246 644066 usertrap_amd64.go:122] [ 661: 662] Allocate a new trap: 0xc0007fa1b0 13 D0713 05:18:02.845260 644066 usertrap_amd64.go:225] [ 661: 662] Apply the binary patch addr 46b020 trap addr 65410 ([184 39 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:02.845453 644066 usertrap_amd64.go:212] [ 661: 662] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.845467 644066 usertrap_amd64.go:122] [ 661: 662] Allocate a new trap: 0xc0007fa1b0 14 D0713 05:18:02.845478 644066 usertrap_amd64.go:225] [ 661: 662] Apply the binary patch addr 46b04f trap addr 65460 ([184 234 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:02.845551 644066 task_signals.go:470] [ 661: 661] Notified of signal 23 D0713 05:18:02.845691 644066 task_signals.go:220] [ 661: 661] Signal 23: delivering to handler D0713 05:18:02.853305 644066 usertrap_amd64.go:212] [ 661: 661] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.853331 644066 usertrap_amd64.go:122] [ 661: 661] Allocate a new trap: 0xc0007fa1b0 15 D0713 05:18:02.853343 644066 usertrap_amd64.go:225] [ 661: 661] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 05:18:02.853436 644066 task_exit.go:204] [ 661: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.853466 644066 task_exit.go:204] [ 661: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.853494 644066 task_signals.go:204] [ 661: 663] Signal 661, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.853530 644066 task_signals.go:204] [ 661: 666] Signal 661, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.853513 644066 task_signals.go:204] [ 661: 665] Signal 661, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.853555 644066 task_exit.go:204] [ 661: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.853572 644066 task_signals.go:204] [ 661: 662] Signal 661, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.853592 644066 task_exit.go:204] [ 661: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.853600 644066 task_exit.go:204] [ 661: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.853605 644066 task_signals.go:204] [ 661: 664] Signal 661, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.853615 644066 task_exit.go:204] [ 661: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.853646 644066 task_exit.go:204] [ 661: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.853671 644066 task_exit.go:204] [ 661: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.853692 644066 task_exit.go:204] [ 661: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.853705 644066 task_exit.go:204] [ 661: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.853712 644066 task_exit.go:204] [ 661: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.853725 644066 task_exit.go:204] [ 661: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.853765 644066 task_exit.go:204] [ 661: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.853771 644066 task_exit.go:204] [ 661: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.853783 644066 task_exit.go:204] [ 661: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.855056 644066 task_exit.go:204] [ 661: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.855092 644066 task_exit.go:204] [ 661: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.855108 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.855161 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.855180 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.855272 644066 task_exit.go:204] [ 661: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.855862 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.857644 644066 syscalls.go:262] [ 667: 667] Allocating stack with size of 8388608 bytes D0713 05:18:02.857750 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.859323 644066 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.859364 644066 usertrap_amd64.go:106] [ 667: 667] Map a usertrap vma at 65000 D0713 05:18:02.859488 644066 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0001e2900 1 D0713 05:18:02.859524 644066 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:02.859990 644066 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.860019 644066 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0001e2900 2 D0713 05:18:02.860031 644066 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:02.860691 644066 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.860720 644066 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0001e2900 3 D0713 05:18:02.860731 644066 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:02.863171 644066 sampler.go:191] Time: Adjusting syscall overhead down to 588 D0713 05:18:02.863237 644066 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0713 05:18:02.867261 644066 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.867282 644066 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0001e2900 4 D0713 05:18:02.867295 644066 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:02.870252 644066 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.870357 644066 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0001e2900 5 D0713 05:18:02.870435 644066 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:02.870605 644066 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.870626 644066 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0001e2900 6 D0713 05:18:02.870637 644066 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:02.871146 644066 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.871207 644066 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0001e2900 7 D0713 05:18:02.871270 644066 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:02.871513 644066 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.871534 644066 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc0001e2900 8 D0713 05:18:02.871545 644066 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:02.871786 644066 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.871813 644066 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc0001e2900 9 D0713 05:18:02.871824 644066 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:02.871870 644066 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.871892 644066 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0001e2900 10 D0713 05:18:02.871901 644066 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:02.879881 644066 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.879905 644066 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0001e2900 11 D0713 05:18:02.879914 644066 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:02.883457 644066 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.883554 644066 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc0001e2900 12 D0713 05:18:02.883610 644066 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:02.885003 644066 usertrap_amd64.go:212] [ 667: 668] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.885060 644066 usertrap_amd64.go:122] [ 667: 668] Allocate a new trap: 0xc0001e2900 13 D0713 05:18:02.885080 644066 usertrap_amd64.go:225] [ 667: 668] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:02.885200 644066 task_signals.go:470] [ 667: 667] Notified of signal 23 D0713 05:18:02.885489 644066 task_signals.go:220] [ 667: 667] Signal 23: delivering to handler D0713 05:18:02.891722 644066 usertrap_amd64.go:212] [ 667: 667] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.891756 644066 usertrap_amd64.go:122] [ 667: 667] Allocate a new trap: 0xc0001e2900 14 D0713 05:18:02.891773 644066 usertrap_amd64.go:225] [ 667: 667] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:02.891830 644066 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.891894 644066 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.891926 644066 task_signals.go:204] [ 667: 670] Signal 667, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.891925 644066 task_signals.go:204] [ 667: 669] Signal 667, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.891942 644066 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.891957 644066 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.891963 644066 task_exit.go:204] [ 667: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.891976 644066 task_signals.go:204] [ 667: 671] Signal 667, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.891986 644066 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.891997 644066 task_signals.go:204] [ 667: 668] Signal 667, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.892007 644066 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.892010 644066 task_exit.go:204] [ 667: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.892018 644066 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.892024 644066 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.892028 644066 task_exit.go:204] [ 667: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.892036 644066 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.893400 644066 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.893504 644066 task_exit.go:204] [ 667: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.893575 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.893693 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.893752 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.893797 644066 task_exit.go:204] [ 667: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.894892 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.896454 644066 syscalls.go:262] [ 672: 672] Allocating stack with size of 8388608 bytes D0713 05:18:02.896628 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.898181 644066 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.898216 644066 usertrap_amd64.go:106] [ 672: 672] Map a usertrap vma at 62000 D0713 05:18:02.898305 644066 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0007fa300 1 D0713 05:18:02.898353 644066 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:02.898719 644066 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.898738 644066 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0007fa300 2 D0713 05:18:02.898745 644066 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:02.899339 644066 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.899364 644066 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0007fa300 3 D0713 05:18:02.899376 644066 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:02.905966 644066 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.906012 644066 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0007fa300 4 D0713 05:18:02.906030 644066 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:02.907320 644066 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.907357 644066 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0007fa300 5 D0713 05:18:02.907372 644066 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:02.907477 644066 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.907498 644066 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0007fa300 6 D0713 05:18:02.907507 644066 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:02.908016 644066 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.908045 644066 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0007fa300 7 D0713 05:18:02.908065 644066 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:02.908548 644066 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.908686 644066 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc0007fa300 8 D0713 05:18:02.908748 644066 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:02.909068 644066 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.909148 644066 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc0007fa300 9 D0713 05:18:02.909201 644066 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:02.909785 644066 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.909820 644066 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc0007fa300 10 D0713 05:18:02.909835 644066 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46b020 trap addr 62320 ([184 39 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:02.909935 644066 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.909960 644066 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0007fa300 11 D0713 05:18:02.909972 644066 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46b57c trap addr 62370 ([184 202 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:02.909987 644066 usertrap_amd64.go:212] [ 672: 673] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.909995 644066 usertrap_amd64.go:122] [ 672: 673] Allocate a new trap: 0xc0007fa300 12 D0713 05:18:02.910004 644066 usertrap_amd64.go:225] [ 672: 673] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:02.910065 644066 task_signals.go:470] [ 672: 672] Notified of signal 23 D0713 05:18:02.910120 644066 task_signals.go:220] [ 672: 672] Signal 23: delivering to handler D0713 05:18:02.918255 644066 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.918286 644066 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0007fa300 13 D0713 05:18:02.918299 644066 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:02.922788 644066 task_signals.go:470] [ 672: 672] Notified of signal 23 D0713 05:18:02.922883 644066 task_signals.go:220] [ 672: 672] Signal 23: delivering to handler D0713 05:18:02.930136 644066 usertrap_amd64.go:212] [ 672: 672] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.930174 644066 usertrap_amd64.go:122] [ 672: 672] Allocate a new trap: 0xc0007fa300 14 D0713 05:18:02.930192 644066 usertrap_amd64.go:225] [ 672: 672] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:02.930252 644066 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.930279 644066 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.930325 644066 task_signals.go:204] [ 672: 673] Signal 672, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.930345 644066 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.930364 644066 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.930370 644066 task_exit.go:204] [ 672: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.930395 644066 task_signals.go:204] [ 672: 674] Signal 672, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.930406 644066 task_exit.go:204] [ 672: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.930414 644066 task_exit.go:204] [ 672: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.930420 644066 task_exit.go:204] [ 672: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.930448 644066 task_signals.go:204] [ 672: 675] Signal 672, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.930467 644066 task_exit.go:204] [ 672: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.930474 644066 task_exit.go:204] [ 672: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.930479 644066 task_exit.go:204] [ 672: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.930497 644066 task_signals.go:204] [ 672: 676] Signal 672, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.930506 644066 task_exit.go:204] [ 672: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.931822 644066 task_exit.go:204] [ 672: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.931849 644066 task_exit.go:204] [ 672: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.931866 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.932677 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:02.932706 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.932897 644066 task_exit.go:204] [ 672: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.933604 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.935324 644066 syscalls.go:262] [ 677: 677] Allocating stack with size of 8388608 bytes D0713 05:18:02.935467 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.936871 644066 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.936918 644066 usertrap_amd64.go:106] [ 677: 677] Map a usertrap vma at 68000 D0713 05:18:02.937052 644066 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001786600 1 D0713 05:18:02.937105 644066 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:02.937492 644066 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.937519 644066 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001786600 2 D0713 05:18:02.937531 644066 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:02.938205 644066 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.938234 644066 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001786600 3 D0713 05:18:02.938246 644066 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:02.945545 644066 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.945577 644066 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001786600 4 D0713 05:18:02.945588 644066 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:02.946854 644066 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.946907 644066 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001786600 5 D0713 05:18:02.946924 644066 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:02.946989 644066 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.947008 644066 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001786600 6 D0713 05:18:02.947016 644066 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:02.947264 644066 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.947296 644066 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001786600 7 D0713 05:18:02.947310 644066 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:02.947531 644066 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.947549 644066 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc001786600 8 D0713 05:18:02.947561 644066 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:02.947822 644066 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.947845 644066 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001786600 9 D0713 05:18:02.947856 644066 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:02.947886 644066 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.947894 644066 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc001786600 10 D0713 05:18:02.947902 644066 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:02.956588 644066 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.956627 644066 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001786600 11 D0713 05:18:02.956640 644066 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:02.959191 644066 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.959247 644066 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc001786600 12 D0713 05:18:02.959265 644066 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:02.959295 644066 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.959328 644066 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc001786600 13 D0713 05:18:02.959336 644066 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:02.959376 644066 task_signals.go:470] [ 677: 677] Notified of signal 23 D0713 05:18:02.959512 644066 task_signals.go:220] [ 677: 677] Signal 23: delivering to handler D0713 05:18:02.969949 644066 task_signals.go:470] [ 677: 677] Notified of signal 23 D0713 05:18:02.970084 644066 task_signals.go:220] [ 677: 677] Signal 23: delivering to handler D0713 05:18:02.970489 644066 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:02.970525 644066 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc001786600 14 D0713 05:18:02.970546 644066 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:02.970688 644066 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.970732 644066 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.970768 644066 task_signals.go:204] [ 677: 679] Signal 677, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.970791 644066 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.970801 644066 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.970808 644066 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.970804 644066 task_signals.go:204] [ 677: 678] Signal 677, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.970833 644066 task_signals.go:204] [ 677: 680] Signal 677, PID: 680, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:02.970848 644066 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.970882 644066 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.970892 644066 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.970909 644066 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:02.972238 644066 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:02.972263 644066 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.972285 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:02.972323 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:02.972366 644066 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:02.973059 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.974387 644066 syscalls.go:262] [ 681: 681] Allocating stack with size of 8388608 bytes D0713 05:18:02.974518 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:02.976203 644066 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:02.976246 644066 usertrap_amd64.go:106] [ 681: 681] Map a usertrap vma at 6a000 D0713 05:18:02.976392 644066 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc000b08b40 1 D0713 05:18:02.976438 644066 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:02.976793 644066 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:02.976820 644066 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc000b08b40 2 D0713 05:18:02.976832 644066 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:02.977592 644066 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:02.977622 644066 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc000b08b40 3 D0713 05:18:02.977631 644066 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:02.984086 644066 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:02.984113 644066 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc000b08b40 4 D0713 05:18:02.984123 644066 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:02.985470 644066 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:02.985493 644066 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc000b08b40 5 D0713 05:18:02.985502 644066 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:02.985608 644066 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46b214:sysno 13 D0713 05:18:02.985630 644066 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc000b08b40 6 D0713 05:18:02.985639 644066 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:02.985945 644066 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:02.986011 644066 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc000b08b40 7 D0713 05:18:02.986028 644066 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:02.986267 644066 usertrap_amd64.go:212] [ 681: 682] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:02.986299 644066 usertrap_amd64.go:122] [ 681: 682] Allocate a new trap: 0xc000b08b40 8 D0713 05:18:02.986335 644066 usertrap_amd64.go:225] [ 681: 682] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:02.986475 644066 usertrap_amd64.go:212] [ 681: 682] Found the pattern at ip 46af76:sysno 35 D0713 05:18:02.986537 644066 usertrap_amd64.go:122] [ 681: 682] Allocate a new trap: 0xc000b08b40 9 D0713 05:18:02.986552 644066 usertrap_amd64.go:225] [ 681: 682] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:02.986643 644066 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:02.986672 644066 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc000b08b40 10 D0713 05:18:02.986685 644066 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:02.987353 644066 usertrap_amd64.go:212] [ 681: 682] Found the pattern at ip 46b020:sysno 39 D0713 05:18:02.987384 644066 usertrap_amd64.go:122] [ 681: 682] Allocate a new trap: 0xc000b08b40 11 D0713 05:18:02.987403 644066 usertrap_amd64.go:225] [ 681: 682] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:02.987459 644066 usertrap_amd64.go:212] [ 681: 682] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:02.987490 644066 usertrap_amd64.go:122] [ 681: 682] Allocate a new trap: 0xc000b08b40 12 D0713 05:18:02.987504 644066 usertrap_amd64.go:225] [ 681: 682] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:02.987570 644066 task_signals.go:470] [ 681: 681] Notified of signal 23 D0713 05:18:02.987621 644066 task_signals.go:220] [ 681: 681] Signal 23: delivering to handler D0713 05:18:02.994701 644066 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46af29:sysno 293 D0713 05:18:02.994733 644066 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc000b08b40 13 D0713 05:18:02.994745 644066 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:02.997983 644066 task_signals.go:470] [ 681: 681] Notified of signal 23 D0713 05:18:02.998251 644066 task_signals.go:220] [ 681: 681] Signal 23: delivering to handler D0713 05:18:03.008183 644066 usertrap_amd64.go:212] [ 681: 681] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.008211 644066 usertrap_amd64.go:122] [ 681: 681] Allocate a new trap: 0xc000b08b40 14 D0713 05:18:03.008228 644066 usertrap_amd64.go:225] [ 681: 681] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:03.008297 644066 task_exit.go:204] [ 681: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.008319 644066 task_exit.go:204] [ 681: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.008335 644066 task_signals.go:204] [ 681: 683] Signal 681, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.008349 644066 task_signals.go:204] [ 681: 684] Signal 681, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.008365 644066 task_exit.go:204] [ 681: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.008365 644066 task_signals.go:204] [ 681: 685] Signal 681, PID: 685, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.008380 644066 task_signals.go:204] [ 681: 682] Signal 681, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.008381 644066 task_exit.go:204] [ 681: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.008394 644066 task_exit.go:204] [ 681: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.008411 644066 task_exit.go:204] [ 681: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.008418 644066 task_exit.go:204] [ 681: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.008421 644066 task_exit.go:204] [ 681: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.008429 644066 task_exit.go:204] [ 681: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.008435 644066 task_exit.go:204] [ 681: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.008444 644066 task_exit.go:204] [ 681: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.008453 644066 task_exit.go:204] [ 681: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.009885 644066 task_exit.go:204] [ 681: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.009921 644066 task_exit.go:204] [ 681: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.009943 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.009989 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.009999 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.010429 644066 task_exit.go:204] [ 681: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.011202 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.012464 644066 syscalls.go:262] [ 686: 686] Allocating stack with size of 8388608 bytes D0713 05:18:03.012705 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.015312 644066 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.015361 644066 usertrap_amd64.go:106] [ 686: 686] Map a usertrap vma at 66000 D0713 05:18:03.015528 644066 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc0018e0a50 1 D0713 05:18:03.015577 644066 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:03.015884 644066 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.015910 644066 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc0018e0a50 2 D0713 05:18:03.015919 644066 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:03.016408 644066 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.016437 644066 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc0018e0a50 3 D0713 05:18:03.016447 644066 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:03.024611 644066 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.024669 644066 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc0018e0a50 4 D0713 05:18:03.024700 644066 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:03.026233 644066 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.026264 644066 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc0018e0a50 5 D0713 05:18:03.026279 644066 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:03.026357 644066 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.026362 644066 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc0018e0a50 6 D0713 05:18:03.026368 644066 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:03.026783 644066 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.026792 644066 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc0018e0a50 7 D0713 05:18:03.026797 644066 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:03.026958 644066 usertrap_amd64.go:212] [ 686: 687] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.026990 644066 usertrap_amd64.go:122] [ 686: 687] Allocate a new trap: 0xc0018e0a50 8 D0713 05:18:03.027017 644066 usertrap_amd64.go:225] [ 686: 687] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:03.027149 644066 usertrap_amd64.go:212] [ 686: 687] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.027182 644066 usertrap_amd64.go:122] [ 686: 687] Allocate a new trap: 0xc0018e0a50 9 D0713 05:18:03.027198 644066 usertrap_amd64.go:225] [ 686: 687] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:03.027281 644066 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.027304 644066 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc0018e0a50 10 D0713 05:18:03.027314 644066 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:03.028204 644066 usertrap_amd64.go:212] [ 686: 687] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.028237 644066 usertrap_amd64.go:122] [ 686: 687] Allocate a new trap: 0xc0018e0a50 11 D0713 05:18:03.028249 644066 usertrap_amd64.go:225] [ 686: 687] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:03.028270 644066 usertrap_amd64.go:212] [ 686: 687] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.028277 644066 usertrap_amd64.go:122] [ 686: 687] Allocate a new trap: 0xc0018e0a50 12 D0713 05:18:03.028284 644066 usertrap_amd64.go:225] [ 686: 687] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:03.028310 644066 task_signals.go:470] [ 686: 686] Notified of signal 23 D0713 05:18:03.028399 644066 task_signals.go:220] [ 686: 686] Signal 23: delivering to handler D0713 05:18:03.036360 644066 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.036434 644066 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc0018e0a50 13 D0713 05:18:03.036458 644066 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:03.039692 644066 task_signals.go:470] [ 686: 686] Notified of signal 23 D0713 05:18:03.040796 644066 task_signals.go:220] [ 686: 686] Signal 23: delivering to handler D0713 05:18:03.049881 644066 usertrap_amd64.go:212] [ 686: 686] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.049926 644066 usertrap_amd64.go:122] [ 686: 686] Allocate a new trap: 0xc0018e0a50 14 D0713 05:18:03.049956 644066 usertrap_amd64.go:225] [ 686: 686] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:03.050029 644066 task_exit.go:204] [ 686: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.050057 644066 task_exit.go:204] [ 686: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.050073 644066 task_signals.go:204] [ 686: 688] Signal 686, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.050108 644066 task_exit.go:204] [ 686: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.050107 644066 task_signals.go:204] [ 686: 689] Signal 686, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.050118 644066 task_exit.go:204] [ 686: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.050133 644066 task_signals.go:204] [ 686: 687] Signal 686, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.050160 644066 task_signals.go:204] [ 686: 690] Signal 686, PID: 690, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.050186 644066 task_exit.go:204] [ 686: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.050196 644066 task_exit.go:204] [ 686: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.050210 644066 task_exit.go:204] [ 686: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.050217 644066 task_exit.go:204] [ 686: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.050227 644066 task_exit.go:204] [ 686: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.050235 644066 task_exit.go:204] [ 686: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.050241 644066 task_exit.go:204] [ 686: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.050253 644066 task_exit.go:204] [ 686: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.051710 644066 task_exit.go:204] [ 686: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.051755 644066 task_exit.go:204] [ 686: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.051783 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.051818 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.051917 644066 task_exit.go:204] [ 686: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.052637 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.054485 644066 syscalls.go:262] [ 691: 691] Allocating stack with size of 8388608 bytes D0713 05:18:03.054621 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.066298 644066 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.066368 644066 usertrap_amd64.go:106] [ 691: 691] Map a usertrap vma at 63000 D0713 05:18:03.066509 644066 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc000b08e10 1 D0713 05:18:03.066553 644066 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:03.066994 644066 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.067022 644066 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc000b08e10 2 D0713 05:18:03.067034 644066 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:03.067834 644066 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.067865 644066 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc000b08e10 3 D0713 05:18:03.067876 644066 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:03.075471 644066 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.075501 644066 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc000b08e10 4 D0713 05:18:03.075521 644066 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:03.076767 644066 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.076804 644066 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc000b08e10 5 D0713 05:18:03.076823 644066 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:03.076892 644066 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.076900 644066 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc000b08e10 6 D0713 05:18:03.076908 644066 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:03.077340 644066 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.077364 644066 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc000b08e10 7 D0713 05:18:03.077373 644066 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:03.077618 644066 usertrap_amd64.go:212] [ 691: 692] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.077642 644066 usertrap_amd64.go:122] [ 691: 692] Allocate a new trap: 0xc000b08e10 8 D0713 05:18:03.077652 644066 usertrap_amd64.go:225] [ 691: 692] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:03.077947 644066 usertrap_amd64.go:212] [ 691: 692] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.077978 644066 usertrap_amd64.go:122] [ 691: 692] Allocate a new trap: 0xc000b08e10 9 D0713 05:18:03.078004 644066 usertrap_amd64.go:225] [ 691: 692] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:03.078020 644066 usertrap_amd64.go:212] [ 691: 694] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.078028 644066 usertrap_amd64.go:122] [ 691: 694] Allocate a new trap: 0xc000b08e10 10 D0713 05:18:03.078038 644066 usertrap_amd64.go:225] [ 691: 694] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:03.085918 644066 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.085963 644066 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc000b08e10 11 D0713 05:18:03.085973 644066 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:03.088594 644066 usertrap_amd64.go:212] [ 691: 692] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.088632 644066 usertrap_amd64.go:122] [ 691: 692] Allocate a new trap: 0xc000b08e10 12 D0713 05:18:03.088647 644066 usertrap_amd64.go:225] [ 691: 692] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:03.088758 644066 usertrap_amd64.go:212] [ 691: 692] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.088769 644066 usertrap_amd64.go:122] [ 691: 692] Allocate a new trap: 0xc000b08e10 13 D0713 05:18:03.088780 644066 usertrap_amd64.go:225] [ 691: 692] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:03.088853 644066 task_signals.go:470] [ 691: 691] Notified of signal 23 D0713 05:18:03.088910 644066 task_signals.go:220] [ 691: 691] Signal 23: delivering to handler I0713 05:18:03.097055 644066 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0713 05:18:03.097152 644066 usertrap_amd64.go:212] [ 691: 691] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.097163 644066 usertrap_amd64.go:122] [ 691: 691] Allocate a new trap: 0xc000b08e10 14 D0713 05:18:03.097172 644066 usertrap_amd64.go:225] [ 691: 691] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:03.097243 644066 task_exit.go:204] [ 691: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.097277 644066 task_exit.go:204] [ 691: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.097333 644066 task_signals.go:204] [ 691: 693] Signal 691, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.097364 644066 task_signals.go:204] [ 691: 696] Signal 691, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.097406 644066 task_signals.go:204] [ 691: 694] Signal 691, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.097417 644066 task_exit.go:204] [ 691: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.097431 644066 task_signals.go:204] [ 691: 695] Signal 691, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.097456 644066 task_signals.go:204] [ 691: 692] Signal 691, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.097476 644066 task_exit.go:204] [ 691: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.097483 644066 task_exit.go:204] [ 691: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.097496 644066 task_exit.go:204] [ 691: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.097505 644066 task_exit.go:204] [ 691: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.097509 644066 task_exit.go:204] [ 691: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.097519 644066 task_exit.go:204] [ 691: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.097538 644066 task_exit.go:204] [ 691: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.097554 644066 task_exit.go:204] [ 691: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.097563 644066 task_exit.go:204] [ 691: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.097571 644066 task_exit.go:204] [ 691: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.097576 644066 task_exit.go:204] [ 691: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.097584 644066 task_exit.go:204] [ 691: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.098944 644066 task_exit.go:204] [ 691: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.098984 644066 task_exit.go:204] [ 691: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.099030 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.099079 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.099110 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.099268 644066 task_exit.go:204] [ 691: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.100112 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.101766 644066 syscalls.go:262] [ 697: 697] Allocating stack with size of 8388608 bytes D0713 05:18:03.102011 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.103130 644066 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.103171 644066 usertrap_amd64.go:106] [ 697: 697] Map a usertrap vma at 6a000 D0713 05:18:03.103305 644066 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc0018e0d80 1 D0713 05:18:03.103342 644066 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:03.103608 644066 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.103642 644066 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc0018e0d80 2 D0713 05:18:03.103655 644066 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:03.104363 644066 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.104398 644066 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc0018e0d80 3 D0713 05:18:03.104412 644066 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:03.111290 644066 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.111327 644066 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc0018e0d80 4 D0713 05:18:03.111340 644066 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:03.112355 644066 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.112376 644066 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc0018e0d80 5 D0713 05:18:03.112384 644066 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:03.112420 644066 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.112425 644066 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc0018e0d80 6 D0713 05:18:03.112430 644066 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:03.112796 644066 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.112814 644066 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc0018e0d80 7 D0713 05:18:03.112823 644066 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:03.113104 644066 usertrap_amd64.go:212] [ 697: 698] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.113150 644066 usertrap_amd64.go:122] [ 697: 698] Allocate a new trap: 0xc0018e0d80 8 D0713 05:18:03.113172 644066 usertrap_amd64.go:225] [ 697: 698] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:03.113447 644066 usertrap_amd64.go:212] [ 697: 698] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:03.113476 644066 usertrap_amd64.go:122] [ 697: 698] Allocate a new trap: 0xc0018e0d80 9 D0713 05:18:03.113485 644066 usertrap_amd64.go:225] [ 697: 698] Apply the binary patch addr 46b6e0 trap addr 6a2d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:03.113539 644066 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.113549 644066 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc0018e0d80 10 D0713 05:18:03.113566 644066 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:03.113664 644066 usertrap_amd64.go:212] [ 697: 698] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.113699 644066 usertrap_amd64.go:122] [ 697: 698] Allocate a new trap: 0xc0018e0d80 11 D0713 05:18:03.113712 644066 usertrap_amd64.go:225] [ 697: 698] Apply the binary patch addr 46af76 trap addr 6a370 ([184 35 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:03.114291 644066 usertrap_amd64.go:212] [ 697: 698] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.114314 644066 usertrap_amd64.go:122] [ 697: 698] Allocate a new trap: 0xc0018e0d80 12 D0713 05:18:03.114324 644066 usertrap_amd64.go:225] [ 697: 698] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:03.114416 644066 usertrap_amd64.go:212] [ 697: 698] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.114452 644066 usertrap_amd64.go:122] [ 697: 698] Allocate a new trap: 0xc0018e0d80 13 D0713 05:18:03.114467 644066 usertrap_amd64.go:225] [ 697: 698] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:03.114511 644066 task_signals.go:470] [ 697: 697] Notified of signal 23 D0713 05:18:03.114591 644066 task_signals.go:220] [ 697: 697] Signal 23: delivering to handler D0713 05:18:03.121657 644066 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.121679 644066 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc0018e0d80 14 D0713 05:18:03.121693 644066 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46af29 trap addr 6a460 ([184 37 1 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:03.125754 644066 task_signals.go:470] [ 697: 697] Notified of signal 23 D0713 05:18:03.125808 644066 task_signals.go:220] [ 697: 697] Signal 23: delivering to handler D0713 05:18:03.133010 644066 usertrap_amd64.go:212] [ 697: 697] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.133097 644066 usertrap_amd64.go:122] [ 697: 697] Allocate a new trap: 0xc0018e0d80 15 D0713 05:18:03.133128 644066 usertrap_amd64.go:225] [ 697: 697] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 05:18:03.133222 644066 task_exit.go:204] [ 697: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.133258 644066 task_exit.go:204] [ 697: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.133302 644066 task_signals.go:204] [ 697: 699] Signal 697, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.133324 644066 task_signals.go:204] [ 697: 701] Signal 697, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.133339 644066 task_exit.go:204] [ 697: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.133330 644066 task_signals.go:204] [ 697: 700] Signal 697, PID: 700, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.133366 644066 task_signals.go:204] [ 697: 698] Signal 697, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.133384 644066 task_exit.go:204] [ 697: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.133403 644066 task_exit.go:204] [ 697: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.133429 644066 task_exit.go:204] [ 697: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.133447 644066 task_exit.go:204] [ 697: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.133454 644066 task_exit.go:204] [ 697: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.133467 644066 task_exit.go:204] [ 697: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.133484 644066 task_exit.go:204] [ 697: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.133504 644066 task_exit.go:204] [ 697: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.133540 644066 task_exit.go:204] [ 697: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.134782 644066 task_exit.go:204] [ 697: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.134833 644066 task_exit.go:204] [ 697: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.134846 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.134911 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.134925 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.135000 644066 task_exit.go:204] [ 697: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.136341 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.137990 644066 syscalls.go:262] [ 702: 702] Allocating stack with size of 8388608 bytes D0713 05:18:03.138107 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.139517 644066 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.139563 644066 usertrap_amd64.go:106] [ 702: 702] Map a usertrap vma at 64000 D0713 05:18:03.139645 644066 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0007fb770 1 D0713 05:18:03.139666 644066 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:03.139934 644066 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.139955 644066 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0007fb770 2 D0713 05:18:03.139962 644066 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:03.141016 644066 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.141057 644066 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0007fb770 3 D0713 05:18:03.141075 644066 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:03.148417 644066 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.148454 644066 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0007fb770 4 D0713 05:18:03.148468 644066 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:03.149725 644066 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.149762 644066 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0007fb770 5 D0713 05:18:03.149776 644066 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:03.149833 644066 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.149842 644066 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0007fb770 6 D0713 05:18:03.149857 644066 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:03.150322 644066 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.150363 644066 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0007fb770 7 D0713 05:18:03.150375 644066 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:03.150609 644066 usertrap_amd64.go:212] [ 702: 703] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.150636 644066 usertrap_amd64.go:122] [ 702: 703] Allocate a new trap: 0xc0007fb770 8 D0713 05:18:03.150651 644066 usertrap_amd64.go:225] [ 702: 703] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:03.150991 644066 usertrap_amd64.go:212] [ 702: 703] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.151064 644066 usertrap_amd64.go:122] [ 702: 703] Allocate a new trap: 0xc0007fb770 9 D0713 05:18:03.151088 644066 usertrap_amd64.go:225] [ 702: 703] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:03.151140 644066 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.151156 644066 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0007fb770 10 D0713 05:18:03.151197 644066 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:03.159333 644066 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.159364 644066 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0007fb770 11 D0713 05:18:03.159375 644066 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:03.161977 644066 usertrap_amd64.go:212] [ 702: 703] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.162012 644066 usertrap_amd64.go:122] [ 702: 703] Allocate a new trap: 0xc0007fb770 12 D0713 05:18:03.162026 644066 usertrap_amd64.go:225] [ 702: 703] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:03.162064 644066 usertrap_amd64.go:212] [ 702: 703] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.162082 644066 usertrap_amd64.go:122] [ 702: 703] Allocate a new trap: 0xc0007fb770 13 D0713 05:18:03.162100 644066 usertrap_amd64.go:225] [ 702: 703] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:03.162207 644066 task_signals.go:470] [ 702: 702] Notified of signal 23 D0713 05:18:03.162273 644066 task_signals.go:179] [ 702: 702] Restarting syscall 202: interrupted by signal 23 D0713 05:18:03.162287 644066 task_signals.go:220] [ 702: 702] Signal 23: delivering to handler D0713 05:18:03.170831 644066 usertrap_amd64.go:212] [ 702: 702] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.170867 644066 usertrap_amd64.go:122] [ 702: 702] Allocate a new trap: 0xc0007fb770 14 D0713 05:18:03.170880 644066 usertrap_amd64.go:225] [ 702: 702] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:03.170948 644066 task_exit.go:204] [ 702: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.170975 644066 task_exit.go:204] [ 702: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.171010 644066 task_signals.go:204] [ 702: 703] Signal 702, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.171038 644066 task_exit.go:204] [ 702: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.171050 644066 task_exit.go:204] [ 702: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.171072 644066 task_exit.go:204] [ 702: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.171097 644066 task_signals.go:204] [ 702: 704] Signal 702, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.171111 644066 task_exit.go:204] [ 702: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.171131 644066 task_exit.go:204] [ 702: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.171137 644066 task_exit.go:204] [ 702: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.171160 644066 task_signals.go:204] [ 702: 705] Signal 702, PID: 705, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.171181 644066 task_exit.go:204] [ 702: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.171193 644066 task_exit.go:204] [ 702: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.171201 644066 task_exit.go:204] [ 702: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.171236 644066 task_signals.go:204] [ 702: 706] Signal 702, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.171253 644066 task_exit.go:204] [ 702: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.172741 644066 task_exit.go:204] [ 702: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.172757 644066 task_exit.go:204] [ 702: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.172774 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.172826 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.173050 644066 task_exit.go:204] [ 702: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.173247 644066 task_signals.go:470] [ 6: 19] Notified of signal 23 D0713 05:18:03.173288 644066 task_signals.go:220] [ 6: 19] Signal 23: delivering to handler D0713 05:18:03.173972 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.175325 644066 syscalls.go:262] [ 707: 707] Allocating stack with size of 8388608 bytes D0713 05:18:03.175574 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.177242 644066 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.177284 644066 usertrap_amd64.go:106] [ 707: 707] Map a usertrap vma at 69000 D0713 05:18:03.177376 644066 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc0008f0cf0 1 D0713 05:18:03.177403 644066 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:03.177797 644066 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.177810 644066 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc0008f0cf0 2 D0713 05:18:03.177820 644066 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:03.179342 644066 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.179370 644066 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc0008f0cf0 3 D0713 05:18:03.179381 644066 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:03.186858 644066 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.186896 644066 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc0008f0cf0 4 D0713 05:18:03.186909 644066 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:03.188105 644066 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.188137 644066 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc0008f0cf0 5 D0713 05:18:03.188147 644066 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:03.188194 644066 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.188204 644066 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc0008f0cf0 6 D0713 05:18:03.188212 644066 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:03.188633 644066 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.188664 644066 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc0008f0cf0 7 D0713 05:18:03.188681 644066 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:03.188913 644066 usertrap_amd64.go:212] [ 707: 708] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.188994 644066 usertrap_amd64.go:122] [ 707: 708] Allocate a new trap: 0xc0008f0cf0 8 D0713 05:18:03.189016 644066 usertrap_amd64.go:225] [ 707: 708] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:03.189153 644066 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.189184 644066 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc0008f0cf0 9 D0713 05:18:03.189194 644066 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:03.189297 644066 usertrap_amd64.go:212] [ 707: 708] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.189318 644066 usertrap_amd64.go:122] [ 707: 708] Allocate a new trap: 0xc0008f0cf0 10 D0713 05:18:03.189327 644066 usertrap_amd64.go:225] [ 707: 708] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:03.189481 644066 usertrap_amd64.go:212] [ 707: 708] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.189507 644066 usertrap_amd64.go:122] [ 707: 708] Allocate a new trap: 0xc0008f0cf0 11 D0713 05:18:03.189518 644066 usertrap_amd64.go:225] [ 707: 708] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:03.189670 644066 usertrap_amd64.go:212] [ 707: 708] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.189693 644066 usertrap_amd64.go:122] [ 707: 708] Allocate a new trap: 0xc0008f0cf0 12 D0713 05:18:03.189704 644066 usertrap_amd64.go:225] [ 707: 708] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:03.189723 644066 task_signals.go:470] [ 707: 710] Notified of signal 23 D0713 05:18:03.189786 644066 task_signals.go:179] [ 707: 710] Restarting syscall 202: interrupted by signal 23 D0713 05:18:03.189798 644066 task_signals.go:220] [ 707: 710] Signal 23: delivering to handler D0713 05:18:03.190033 644066 task_signals.go:470] [ 707: 707] Notified of signal 23 D0713 05:18:03.190087 644066 task_signals.go:220] [ 707: 707] Signal 23: delivering to handler D0713 05:18:03.198123 644066 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.198154 644066 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc0008f0cf0 13 D0713 05:18:03.198167 644066 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:03.201368 644066 task_signals.go:470] [ 707: 707] Notified of signal 23 D0713 05:18:03.201415 644066 task_signals.go:220] [ 707: 707] Signal 23: delivering to handler D0713 05:18:03.211595 644066 usertrap_amd64.go:212] [ 707: 707] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.211702 644066 usertrap_amd64.go:122] [ 707: 707] Allocate a new trap: 0xc0008f0cf0 14 D0713 05:18:03.211725 644066 usertrap_amd64.go:225] [ 707: 707] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:03.211803 644066 task_exit.go:204] [ 707: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.211837 644066 task_exit.go:204] [ 707: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.211859 644066 task_signals.go:204] [ 707: 709] Signal 707, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.211858 644066 task_signals.go:204] [ 707: 710] Signal 707, PID: 710, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.211875 644066 task_exit.go:204] [ 707: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.211860 644066 task_signals.go:204] [ 707: 711] Signal 707, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.211884 644066 task_signals.go:204] [ 707: 708] Signal 707, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.211894 644066 task_exit.go:204] [ 707: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.211942 644066 task_exit.go:204] [ 707: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.211957 644066 task_exit.go:204] [ 707: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.211972 644066 task_exit.go:204] [ 707: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.211978 644066 task_exit.go:204] [ 707: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.211988 644066 task_exit.go:204] [ 707: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.211996 644066 task_exit.go:204] [ 707: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.212001 644066 task_exit.go:204] [ 707: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.212033 644066 task_exit.go:204] [ 707: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.213456 644066 task_exit.go:204] [ 707: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.213507 644066 task_exit.go:204] [ 707: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.213547 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.213578 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.213636 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.213792 644066 task_exit.go:204] [ 707: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.214631 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.216356 644066 syscalls.go:262] [ 712: 712] Allocating stack with size of 8388608 bytes D0713 05:18:03.216497 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.220079 644066 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.220132 644066 usertrap_amd64.go:106] [ 712: 712] Map a usertrap vma at 65000 D0713 05:18:03.220257 644066 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000b09860 1 D0713 05:18:03.220345 644066 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:03.220798 644066 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.220846 644066 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000b09860 2 D0713 05:18:03.220866 644066 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:03.222098 644066 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.222126 644066 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000b09860 3 D0713 05:18:03.222137 644066 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:03.229834 644066 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.229928 644066 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000b09860 4 D0713 05:18:03.229992 644066 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:03.231383 644066 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.231448 644066 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000b09860 5 D0713 05:18:03.231462 644066 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:03.231535 644066 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.231543 644066 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000b09860 6 D0713 05:18:03.231551 644066 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:03.231946 644066 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.231973 644066 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000b09860 7 D0713 05:18:03.231982 644066 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:03.232355 644066 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.232424 644066 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc000b09860 8 D0713 05:18:03.232453 644066 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:03.232831 644066 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.232862 644066 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc000b09860 9 D0713 05:18:03.232877 644066 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:03.233597 644066 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.233711 644066 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc000b09860 10 D0713 05:18:03.233772 644066 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46b020 trap addr 65320 ([184 39 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:03.233893 644066 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.233912 644066 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000b09860 11 D0713 05:18:03.233926 644066 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b57c trap addr 65370 ([184 202 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:03.233957 644066 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.233977 644066 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc000b09860 12 D0713 05:18:03.233996 644066 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:03.234028 644066 task_signals.go:470] [ 712: 712] Notified of signal 23 D0713 05:18:03.234048 644066 task_signals.go:179] [ 712: 712] Restarting syscall 202: interrupted by signal 23 D0713 05:18:03.234057 644066 task_signals.go:220] [ 712: 712] Signal 23: delivering to handler D0713 05:18:03.245260 644066 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.245404 644066 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000b09860 13 D0713 05:18:03.245465 644066 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:03.256634 644066 task_signals.go:470] [ 712: 712] Notified of signal 23 D0713 05:18:03.256723 644066 task_signals.go:220] [ 712: 712] Signal 23: delivering to handler D0713 05:18:03.257229 644066 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.257268 644066 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000b09860 14 D0713 05:18:03.257288 644066 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:03.257351 644066 task_exit.go:204] [ 712: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.257374 644066 task_exit.go:204] [ 712: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.257396 644066 task_signals.go:204] [ 712: 713] Signal 712, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.257412 644066 task_exit.go:204] [ 712: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.257420 644066 task_exit.go:204] [ 712: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.257426 644066 task_exit.go:204] [ 712: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.257457 644066 task_signals.go:204] [ 712: 714] Signal 712, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.257473 644066 task_exit.go:204] [ 712: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.257482 644066 task_exit.go:204] [ 712: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.257488 644066 task_exit.go:204] [ 712: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.257518 644066 task_signals.go:204] [ 712: 715] Signal 712, PID: 715, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.257529 644066 task_exit.go:204] [ 712: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.257536 644066 task_exit.go:204] [ 712: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.257540 644066 task_exit.go:204] [ 712: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.257552 644066 task_signals.go:204] [ 712: 716] Signal 712, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.257560 644066 task_exit.go:204] [ 712: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.259052 644066 task_exit.go:204] [ 712: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.259091 644066 task_exit.go:204] [ 712: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.259107 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.259140 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.259198 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.259306 644066 task_exit.go:204] [ 712: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.259939 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.261601 644066 syscalls.go:262] [ 717: 717] Allocating stack with size of 8388608 bytes D0713 05:18:03.261728 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.264405 644066 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.264458 644066 usertrap_amd64.go:106] [ 717: 717] Map a usertrap vma at 67000 D0713 05:18:03.264580 644066 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0007fbb60 1 D0713 05:18:03.264612 644066 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:03.264868 644066 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.264888 644066 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0007fbb60 2 D0713 05:18:03.264921 644066 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:03.269529 644066 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.269560 644066 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0007fbb60 3 D0713 05:18:03.269574 644066 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:03.276279 644066 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.276315 644066 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0007fbb60 4 D0713 05:18:03.276331 644066 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:03.277762 644066 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.277796 644066 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0007fbb60 5 D0713 05:18:03.277809 644066 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:03.277859 644066 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.277866 644066 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0007fbb60 6 D0713 05:18:03.277872 644066 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:03.278273 644066 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.278295 644066 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0007fbb60 7 D0713 05:18:03.278302 644066 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:03.278519 644066 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.278571 644066 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc0007fbb60 8 D0713 05:18:03.278592 644066 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:03.278820 644066 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.278842 644066 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc0007fbb60 9 D0713 05:18:03.278861 644066 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:03.279041 644066 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.279086 644066 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0007fbb60 10 D0713 05:18:03.279107 644066 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:03.290378 644066 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.290428 644066 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0007fbb60 11 D0713 05:18:03.290462 644066 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:03.291185 644066 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.291217 644066 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc0007fbb60 12 D0713 05:18:03.291233 644066 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:03.293283 644066 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.293327 644066 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc0007fbb60 13 D0713 05:18:03.293344 644066 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:03.294662 644066 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 05:18:03.294756 644066 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 05:18:03.301869 644066 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.301933 644066 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc0007fbb60 14 D0713 05:18:03.301954 644066 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:03.302007 644066 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.302038 644066 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.302071 644066 task_signals.go:204] [ 717: 718] Signal 717, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.302095 644066 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.302106 644066 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.302113 644066 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.302137 644066 task_signals.go:204] [ 717: 720] Signal 717, PID: 720, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.302162 644066 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.302174 644066 task_signals.go:204] [ 717: 719] Signal 717, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.302149 644066 task_signals.go:204] [ 717: 721] Signal 717, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.302189 644066 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.302218 644066 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.302260 644066 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.302279 644066 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.302286 644066 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.302300 644066 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.303675 644066 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.303713 644066 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.303731 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.303762 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.303816 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.303976 644066 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.304600 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.306166 644066 syscalls.go:262] [ 722: 722] Allocating stack with size of 8388608 bytes D0713 05:18:03.306264 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.310084 644066 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.310195 644066 usertrap_amd64.go:106] [ 722: 722] Map a usertrap vma at 61000 D0713 05:18:03.310391 644066 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000b09fb0 1 D0713 05:18:03.310434 644066 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:03.322101 644066 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.322138 644066 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000b09fb0 2 D0713 05:18:03.322153 644066 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:03.324312 644066 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.324396 644066 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000b09fb0 3 D0713 05:18:03.324423 644066 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:03.343754 644066 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.343899 644066 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000b09fb0 4 D0713 05:18:03.344007 644066 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:03.353060 644066 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.353099 644066 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000b09fb0 5 D0713 05:18:03.353114 644066 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:03.353244 644066 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.353271 644066 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000b09fb0 6 D0713 05:18:03.353282 644066 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:03.353780 644066 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.353802 644066 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000b09fb0 7 D0713 05:18:03.353812 644066 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:03.354131 644066 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.354165 644066 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc000b09fb0 8 D0713 05:18:03.354192 644066 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:03.354895 644066 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.354916 644066 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc000b09fb0 9 D0713 05:18:03.354942 644066 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:03.354959 644066 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.354965 644066 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000b09fb0 10 D0713 05:18:03.354970 644066 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:03.356220 644066 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.356252 644066 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc000b09fb0 11 D0713 05:18:03.356266 644066 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:03.356345 644066 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.356361 644066 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc000b09fb0 12 D0713 05:18:03.356371 644066 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:03.356397 644066 task_signals.go:470] [ 722: 722] Notified of signal 23 D0713 05:18:03.356477 644066 task_signals.go:220] [ 722: 722] Signal 23: delivering to handler D0713 05:18:03.356702 644066 task_signals.go:470] [ 722: 722] Notified of signal 23 D0713 05:18:03.356766 644066 task_signals.go:220] [ 722: 722] Signal 23: delivering to handler D0713 05:18:03.363563 644066 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.363594 644066 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000b09fb0 13 D0713 05:18:03.363627 644066 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:03.367515 644066 task_signals.go:470] [ 722: 722] Notified of signal 23 D0713 05:18:03.367673 644066 task_signals.go:220] [ 722: 722] Signal 23: delivering to handler I0713 05:18:03.376261 644066 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0713 05:18:03.376346 644066 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.376360 644066 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000b09fb0 14 D0713 05:18:03.376373 644066 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:03.376454 644066 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.376480 644066 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.376500 644066 task_signals.go:204] [ 722: 725] Signal 722, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.376499 644066 task_signals.go:204] [ 722: 724] Signal 722, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.376513 644066 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.376525 644066 task_signals.go:204] [ 722: 723] Signal 722, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.376531 644066 task_signals.go:204] [ 722: 726] Signal 722, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.376544 644066 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.376552 644066 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.376568 644066 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.376577 644066 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.376595 644066 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.376605 644066 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.376614 644066 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.376627 644066 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.376642 644066 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.377996 644066 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.378023 644066 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.378039 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.378115 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.378137 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.378302 644066 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.379116 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.380455 644066 syscalls.go:262] [ 727: 727] Allocating stack with size of 8388608 bytes D0713 05:18:03.380639 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.383090 644066 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.383140 644066 usertrap_amd64.go:106] [ 727: 727] Map a usertrap vma at 61000 D0713 05:18:03.383236 644066 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc0005ba480 1 D0713 05:18:03.383263 644066 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:03.383651 644066 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.383736 644066 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc0005ba480 2 D0713 05:18:03.383799 644066 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:03.384653 644066 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.384681 644066 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc0005ba480 3 D0713 05:18:03.384691 644066 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:03.392532 644066 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.392574 644066 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc0005ba480 4 D0713 05:18:03.392588 644066 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:03.394110 644066 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.394145 644066 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc0005ba480 5 D0713 05:18:03.394180 644066 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:03.394237 644066 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.394257 644066 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc0005ba480 6 D0713 05:18:03.394265 644066 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:03.394523 644066 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.394548 644066 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc0005ba480 7 D0713 05:18:03.394557 644066 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:03.394749 644066 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.394770 644066 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc0005ba480 8 D0713 05:18:03.394780 644066 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:03.394918 644066 usertrap_amd64.go:212] [ 727: 729] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.394942 644066 usertrap_amd64.go:122] [ 727: 729] Allocate a new trap: 0xc0005ba480 9 D0713 05:18:03.394951 644066 usertrap_amd64.go:225] [ 727: 729] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:03.395073 644066 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.395096 644066 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc0005ba480 10 D0713 05:18:03.395107 644066 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:03.404504 644066 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.404569 644066 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc0005ba480 11 D0713 05:18:03.404583 644066 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:03.407380 644066 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.407404 644066 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc0005ba480 12 D0713 05:18:03.407415 644066 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:03.407477 644066 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.407492 644066 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc0005ba480 13 D0713 05:18:03.407501 644066 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:03.407519 644066 task_signals.go:470] [ 727: 727] Notified of signal 23 D0713 05:18:03.407561 644066 task_signals.go:220] [ 727: 727] Signal 23: delivering to handler D0713 05:18:03.415821 644066 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.415852 644066 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc0005ba480 14 D0713 05:18:03.415861 644066 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:03.415930 644066 task_exit.go:204] [ 727: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.415955 644066 task_exit.go:204] [ 727: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.415972 644066 task_signals.go:204] [ 727: 729] Signal 727, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.415997 644066 task_signals.go:204] [ 727: 731] Signal 727, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.415986 644066 task_signals.go:204] [ 727: 728] Signal 727, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.416014 644066 task_exit.go:204] [ 727: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.416029 644066 task_exit.go:204] [ 727: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.416050 644066 task_exit.go:204] [ 727: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.415982 644066 task_signals.go:204] [ 727: 730] Signal 727, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.416071 644066 task_exit.go:204] [ 727: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.416081 644066 task_exit.go:204] [ 727: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.416086 644066 task_exit.go:204] [ 727: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.416095 644066 task_exit.go:204] [ 727: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.416108 644066 task_exit.go:204] [ 727: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.416112 644066 task_exit.go:204] [ 727: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.416120 644066 task_exit.go:204] [ 727: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.417302 644066 task_exit.go:204] [ 727: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.417332 644066 task_exit.go:204] [ 727: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.417348 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.417554 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.417589 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.417709 644066 task_exit.go:204] [ 727: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.417956 644066 task_signals.go:470] [ 6: 10] Notified of signal 23 D0713 05:18:03.418073 644066 task_signals.go:220] [ 6: 10] Signal 23: delivering to handler D0713 05:18:03.418984 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.420541 644066 syscalls.go:262] [ 732: 732] Allocating stack with size of 8388608 bytes D0713 05:18:03.420784 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.421566 644066 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.421668 644066 usertrap_amd64.go:106] [ 732: 732] Map a usertrap vma at 64000 D0713 05:18:03.421746 644066 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0008f1aa0 1 D0713 05:18:03.421778 644066 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:03.422144 644066 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.422212 644066 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0008f1aa0 2 D0713 05:18:03.422262 644066 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:03.422892 644066 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.422912 644066 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0008f1aa0 3 D0713 05:18:03.422923 644066 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:03.429043 644066 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.429083 644066 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0008f1aa0 4 D0713 05:18:03.429097 644066 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:03.430701 644066 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.430727 644066 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0008f1aa0 5 D0713 05:18:03.430737 644066 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:03.430858 644066 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.430870 644066 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0008f1aa0 6 D0713 05:18:03.430880 644066 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:03.431057 644066 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.431077 644066 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0008f1aa0 7 D0713 05:18:03.431086 644066 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:03.431300 644066 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.431325 644066 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc0008f1aa0 8 D0713 05:18:03.431338 644066 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:03.431501 644066 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.431520 644066 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc0008f1aa0 9 D0713 05:18:03.431530 644066 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:03.431572 644066 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.431583 644066 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0008f1aa0 10 D0713 05:18:03.431594 644066 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:03.432031 644066 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.432057 644066 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc0008f1aa0 11 D0713 05:18:03.432066 644066 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:03.432085 644066 usertrap_amd64.go:212] [ 732: 733] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.432092 644066 usertrap_amd64.go:122] [ 732: 733] Allocate a new trap: 0xc0008f1aa0 12 D0713 05:18:03.432099 644066 usertrap_amd64.go:225] [ 732: 733] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:03.432150 644066 task_signals.go:470] [ 732: 732] Notified of signal 23 D0713 05:18:03.432252 644066 task_signals.go:220] [ 732: 732] Signal 23: delivering to handler D0713 05:18:03.439607 644066 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.439640 644066 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0008f1aa0 13 D0713 05:18:03.439653 644066 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:03.442943 644066 task_signals.go:470] [ 732: 732] Notified of signal 23 D0713 05:18:03.443003 644066 task_signals.go:220] [ 732: 732] Signal 23: delivering to handler I0713 05:18:03.450818 644066 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0713 05:18:03.450916 644066 usertrap_amd64.go:212] [ 732: 732] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.450930 644066 usertrap_amd64.go:122] [ 732: 732] Allocate a new trap: 0xc0008f1aa0 14 D0713 05:18:03.450946 644066 usertrap_amd64.go:225] [ 732: 732] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:03.451036 644066 task_exit.go:204] [ 732: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.451074 644066 task_exit.go:204] [ 732: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.451098 644066 task_signals.go:204] [ 732: 736] Signal 732, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.451127 644066 task_exit.go:204] [ 732: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.451126 644066 task_signals.go:204] [ 732: 733] Signal 732, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.451136 644066 task_exit.go:204] [ 732: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.451147 644066 task_exit.go:204] [ 732: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.451097 644066 task_signals.go:204] [ 732: 734] Signal 732, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.451166 644066 task_exit.go:204] [ 732: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.451172 644066 task_exit.go:204] [ 732: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.451177 644066 task_exit.go:204] [ 732: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.451127 644066 task_signals.go:204] [ 732: 735] Signal 732, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.451185 644066 task_exit.go:204] [ 732: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.451189 644066 task_exit.go:204] [ 732: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.451193 644066 task_exit.go:204] [ 732: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.451201 644066 task_exit.go:204] [ 732: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.452427 644066 task_exit.go:204] [ 732: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.452528 644066 task_exit.go:204] [ 732: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.452556 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.452629 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.452695 644066 task_exit.go:204] [ 732: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.452747 644066 task_signals.go:470] [ 6: 10] Notified of signal 23 D0713 05:18:03.452812 644066 task_signals.go:220] [ 6: 10] Signal 23: delivering to handler D0713 05:18:03.453417 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.454497 644066 syscalls.go:262] [ 737: 737] Allocating stack with size of 8388608 bytes D0713 05:18:03.454748 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.455746 644066 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.455807 644066 usertrap_amd64.go:106] [ 737: 737] Map a usertrap vma at 68000 D0713 05:18:03.455884 644066 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0018e1a10 1 D0713 05:18:03.455960 644066 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:03.456420 644066 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.456498 644066 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0018e1a10 2 D0713 05:18:03.456550 644066 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:03.457313 644066 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.457342 644066 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0018e1a10 3 D0713 05:18:03.457354 644066 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:03.463613 644066 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.463644 644066 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0018e1a10 4 D0713 05:18:03.463658 644066 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:03.464935 644066 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.465010 644066 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0018e1a10 5 D0713 05:18:03.465023 644066 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:03.465069 644066 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.465084 644066 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0018e1a10 6 D0713 05:18:03.465094 644066 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:03.465551 644066 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.465577 644066 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0018e1a10 7 D0713 05:18:03.465588 644066 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:03.465735 644066 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.466007 644066 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc0018e1a10 8 D0713 05:18:03.466075 644066 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:03.466186 644066 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.466240 644066 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0018e1a10 9 D0713 05:18:03.466260 644066 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:03.466312 644066 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.466325 644066 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc0018e1a10 10 D0713 05:18:03.466336 644066 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:03.467008 644066 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.467030 644066 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc0018e1a10 11 D0713 05:18:03.467052 644066 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:03.467132 644066 usertrap_amd64.go:212] [ 737: 738] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.467154 644066 usertrap_amd64.go:122] [ 737: 738] Allocate a new trap: 0xc0018e1a10 12 D0713 05:18:03.467167 644066 usertrap_amd64.go:225] [ 737: 738] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:03.467200 644066 task_signals.go:470] [ 737: 737] Notified of signal 23 D0713 05:18:03.467235 644066 task_signals.go:220] [ 737: 737] Signal 23: delivering to handler D0713 05:18:03.474102 644066 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.474135 644066 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0018e1a10 13 D0713 05:18:03.474148 644066 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:03.477394 644066 task_signals.go:470] [ 737: 737] Notified of signal 23 D0713 05:18:03.477478 644066 task_signals.go:220] [ 737: 737] Signal 23: delivering to handler D0713 05:18:03.485461 644066 usertrap_amd64.go:212] [ 737: 737] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.485534 644066 usertrap_amd64.go:122] [ 737: 737] Allocate a new trap: 0xc0018e1a10 14 D0713 05:18:03.485555 644066 usertrap_amd64.go:225] [ 737: 737] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:03.485637 644066 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.485695 644066 task_signals.go:204] [ 737: 738] Signal 737, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.485706 644066 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.485754 644066 task_signals.go:204] [ 737: 740] Signal 737, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.485801 644066 task_signals.go:204] [ 737: 739] Signal 737, PID: 739, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.485822 644066 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.485853 644066 task_signals.go:204] [ 737: 741] Signal 737, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.485870 644066 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.485877 644066 task_exit.go:204] [ 737: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.485892 644066 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.485901 644066 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.485906 644066 task_exit.go:204] [ 737: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.485926 644066 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.485934 644066 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.485941 644066 task_exit.go:204] [ 737: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.485968 644066 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.487188 644066 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.487230 644066 task_exit.go:204] [ 737: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.487248 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.487282 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.487372 644066 task_exit.go:204] [ 737: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.488083 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.489818 644066 syscalls.go:262] [ 742: 742] Allocating stack with size of 8388608 bytes D0713 05:18:03.489952 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.492124 644066 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.492169 644066 usertrap_amd64.go:106] [ 742: 742] Map a usertrap vma at 63000 D0713 05:18:03.492280 644066 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0006a2c90 1 D0713 05:18:03.492323 644066 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:03.492757 644066 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.492778 644066 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0006a2c90 2 D0713 05:18:03.492787 644066 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:03.493539 644066 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.493569 644066 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0006a2c90 3 D0713 05:18:03.493580 644066 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:03.499638 644066 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.499706 644066 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0006a2c90 4 D0713 05:18:03.499727 644066 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:03.501120 644066 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.501172 644066 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0006a2c90 5 D0713 05:18:03.501188 644066 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:03.501330 644066 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.501371 644066 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0006a2c90 6 D0713 05:18:03.501389 644066 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:03.501979 644066 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.502023 644066 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0006a2c90 7 D0713 05:18:03.502036 644066 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:03.502277 644066 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.502302 644066 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc0006a2c90 8 D0713 05:18:03.502314 644066 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:03.502665 644066 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.502721 644066 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc0006a2c90 9 D0713 05:18:03.502784 644066 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:03.502828 644066 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.502844 644066 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0006a2c90 10 D0713 05:18:03.502853 644066 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:03.511223 644066 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.511254 644066 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0006a2c90 11 D0713 05:18:03.511265 644066 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:03.514094 644066 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.514130 644066 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc0006a2c90 12 D0713 05:18:03.514142 644066 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:03.514221 644066 usertrap_amd64.go:212] [ 742: 743] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.514230 644066 usertrap_amd64.go:122] [ 742: 743] Allocate a new trap: 0xc0006a2c90 13 D0713 05:18:03.514239 644066 usertrap_amd64.go:225] [ 742: 743] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:03.514261 644066 task_signals.go:470] [ 742: 742] Notified of signal 23 D0713 05:18:03.514353 644066 task_signals.go:220] [ 742: 742] Signal 23: delivering to handler I0713 05:18:03.522941 644066 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0713 05:18:03.523101 644066 usertrap_amd64.go:212] [ 742: 742] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.523130 644066 usertrap_amd64.go:122] [ 742: 742] Allocate a new trap: 0xc0006a2c90 14 D0713 05:18:03.523143 644066 usertrap_amd64.go:225] [ 742: 742] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:03.523230 644066 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.523272 644066 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.523289 644066 task_signals.go:204] [ 742: 745] Signal 742, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.523302 644066 task_signals.go:204] [ 742: 747] Signal 742, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.523326 644066 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.523347 644066 task_signals.go:204] [ 742: 743] Signal 742, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.523383 644066 task_signals.go:204] [ 742: 744] Signal 742, PID: 744, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.523389 644066 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.523422 644066 task_exit.go:204] [ 742: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.523444 644066 task_exit.go:204] [ 742: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.523456 644066 task_exit.go:204] [ 742: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.523463 644066 task_exit.go:204] [ 742: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.523485 644066 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.523504 644066 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.523517 644066 task_exit.go:204] [ 742: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.523543 644066 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.523561 644066 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.523568 644066 task_exit.go:204] [ 742: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.523292 644066 task_signals.go:204] [ 742: 746] Signal 742, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.523646 644066 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.525009 644066 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.525042 644066 task_exit.go:204] [ 742: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.525057 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.525092 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.525146 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.525343 644066 task_exit.go:204] [ 742: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.526119 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.527959 644066 syscalls.go:262] [ 748: 748] Allocating stack with size of 8388608 bytes D0713 05:18:03.528070 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.529350 644066 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.529411 644066 usertrap_amd64.go:106] [ 748: 748] Map a usertrap vma at 66000 D0713 05:18:03.529616 644066 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc001216b70 1 D0713 05:18:03.529732 644066 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:03.530158 644066 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.530185 644066 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc001216b70 2 D0713 05:18:03.530207 644066 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:03.531013 644066 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.531060 644066 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc001216b70 3 D0713 05:18:03.531075 644066 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:03.537173 644066 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.537225 644066 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc001216b70 4 D0713 05:18:03.537243 644066 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:03.538382 644066 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.538418 644066 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc001216b70 5 D0713 05:18:03.538433 644066 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:03.538520 644066 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.538541 644066 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc001216b70 6 D0713 05:18:03.538552 644066 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:03.538995 644066 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.539027 644066 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc001216b70 7 D0713 05:18:03.539037 644066 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:03.539229 644066 usertrap_amd64.go:212] [ 748: 749] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.539257 644066 usertrap_amd64.go:122] [ 748: 749] Allocate a new trap: 0xc001216b70 8 D0713 05:18:03.539267 644066 usertrap_amd64.go:225] [ 748: 749] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:03.539445 644066 usertrap_amd64.go:212] [ 748: 749] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.539481 644066 usertrap_amd64.go:122] [ 748: 749] Allocate a new trap: 0xc001216b70 9 D0713 05:18:03.539498 644066 usertrap_amd64.go:225] [ 748: 749] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:03.539514 644066 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.539522 644066 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc001216b70 10 D0713 05:18:03.539531 644066 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:03.539636 644066 usertrap_amd64.go:212] [ 748: 751] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:03.539682 644066 usertrap_amd64.go:122] [ 748: 751] Allocate a new trap: 0xc001216b70 11 D0713 05:18:03.539710 644066 usertrap_amd64.go:225] [ 748: 751] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:03.547188 644066 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.547247 644066 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc001216b70 12 D0713 05:18:03.547267 644066 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:03.550239 644066 usertrap_amd64.go:212] [ 748: 749] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.550274 644066 usertrap_amd64.go:122] [ 748: 749] Allocate a new trap: 0xc001216b70 13 D0713 05:18:03.550291 644066 usertrap_amd64.go:225] [ 748: 749] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:03.550423 644066 usertrap_amd64.go:212] [ 748: 749] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.550457 644066 usertrap_amd64.go:122] [ 748: 749] Allocate a new trap: 0xc001216b70 14 D0713 05:18:03.550473 644066 usertrap_amd64.go:225] [ 748: 749] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:03.550517 644066 task_signals.go:470] [ 748: 748] Notified of signal 23 D0713 05:18:03.550607 644066 task_signals.go:220] [ 748: 748] Signal 23: delivering to handler I0713 05:18:03.557499 644066 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0713 05:18:03.557624 644066 usertrap_amd64.go:212] [ 748: 748] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.557639 644066 usertrap_amd64.go:122] [ 748: 748] Allocate a new trap: 0xc001216b70 15 D0713 05:18:03.557647 644066 usertrap_amd64.go:225] [ 748: 748] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:18:03.557710 644066 task_exit.go:204] [ 748: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.557732 644066 task_exit.go:204] [ 748: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.557751 644066 task_signals.go:204] [ 748: 749] Signal 748, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.557765 644066 task_exit.go:204] [ 748: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.557771 644066 task_exit.go:204] [ 748: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.557762 644066 task_signals.go:204] [ 748: 751] Signal 748, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.557775 644066 task_exit.go:204] [ 748: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.557798 644066 task_signals.go:204] [ 748: 752] Signal 748, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.557803 644066 task_signals.go:204] [ 748: 753] Signal 748, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.557815 644066 task_exit.go:204] [ 748: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.557851 644066 task_signals.go:204] [ 748: 750] Signal 748, PID: 750, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.557897 644066 task_exit.go:204] [ 748: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.557905 644066 task_exit.go:204] [ 748: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.557919 644066 task_exit.go:204] [ 748: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.557929 644066 task_exit.go:204] [ 748: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.557953 644066 task_exit.go:204] [ 748: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.557964 644066 task_exit.go:204] [ 748: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.557973 644066 task_exit.go:204] [ 748: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.557979 644066 task_exit.go:204] [ 748: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.557989 644066 task_exit.go:204] [ 748: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.559232 644066 task_exit.go:204] [ 748: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.559259 644066 task_exit.go:204] [ 748: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.559274 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.559307 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.559316 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.559476 644066 task_exit.go:204] [ 748: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.560103 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.561769 644066 syscalls.go:262] [ 754: 754] Allocating stack with size of 8388608 bytes D0713 05:18:03.561881 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.563062 644066 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.563121 644066 usertrap_amd64.go:106] [ 754: 754] Map a usertrap vma at 63000 D0713 05:18:03.563225 644066 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc001216db0 1 D0713 05:18:03.563264 644066 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:03.563664 644066 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.563686 644066 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc001216db0 2 D0713 05:18:03.563694 644066 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:03.564444 644066 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.564471 644066 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc001216db0 3 D0713 05:18:03.564484 644066 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:03.570903 644066 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.570953 644066 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc001216db0 4 D0713 05:18:03.570980 644066 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:03.572637 644066 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.572692 644066 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc001216db0 5 D0713 05:18:03.572709 644066 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:03.572814 644066 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.572839 644066 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc001216db0 6 D0713 05:18:03.572855 644066 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:03.573236 644066 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.573274 644066 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc001216db0 7 D0713 05:18:03.573286 644066 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:03.573505 644066 usertrap_amd64.go:212] [ 754: 755] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.573529 644066 usertrap_amd64.go:122] [ 754: 755] Allocate a new trap: 0xc001216db0 8 D0713 05:18:03.573541 644066 usertrap_amd64.go:225] [ 754: 755] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:03.573689 644066 usertrap_amd64.go:212] [ 754: 755] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.573718 644066 usertrap_amd64.go:122] [ 754: 755] Allocate a new trap: 0xc001216db0 9 D0713 05:18:03.573731 644066 usertrap_amd64.go:225] [ 754: 755] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:03.573745 644066 usertrap_amd64.go:212] [ 754: 756] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:03.573752 644066 usertrap_amd64.go:122] [ 754: 756] Allocate a new trap: 0xc001216db0 10 D0713 05:18:03.573760 644066 usertrap_amd64.go:225] [ 754: 756] Apply the binary patch addr 46b6e0 trap addr 63320 ([184 24 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:03.573783 644066 usertrap_amd64.go:212] [ 754: 756] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.573798 644066 usertrap_amd64.go:122] [ 754: 756] Allocate a new trap: 0xc001216db0 11 D0713 05:18:03.573807 644066 usertrap_amd64.go:225] [ 754: 756] Apply the binary patch addr 46b57c trap addr 63370 ([184 202 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:03.583875 644066 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.583946 644066 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc001216db0 12 D0713 05:18:03.583961 644066 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:03.587718 644066 usertrap_amd64.go:212] [ 754: 755] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.587777 644066 usertrap_amd64.go:122] [ 754: 755] Allocate a new trap: 0xc001216db0 13 D0713 05:18:03.587796 644066 usertrap_amd64.go:225] [ 754: 755] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:03.587864 644066 usertrap_amd64.go:212] [ 754: 755] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.587891 644066 usertrap_amd64.go:122] [ 754: 755] Allocate a new trap: 0xc001216db0 14 D0713 05:18:03.587900 644066 usertrap_amd64.go:225] [ 754: 755] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:03.587939 644066 task_signals.go:470] [ 754: 754] Notified of signal 23 D0713 05:18:03.588129 644066 task_signals.go:220] [ 754: 754] Signal 23: delivering to handler D0713 05:18:03.596158 644066 usertrap_amd64.go:212] [ 754: 754] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.596208 644066 usertrap_amd64.go:122] [ 754: 754] Allocate a new trap: 0xc001216db0 15 D0713 05:18:03.596225 644066 usertrap_amd64.go:225] [ 754: 754] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 05:18:03.596309 644066 task_exit.go:204] [ 754: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.596346 644066 task_exit.go:204] [ 754: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.596373 644066 task_signals.go:204] [ 754: 755] Signal 754, PID: 755, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.596438 644066 task_signals.go:204] [ 754: 756] Signal 754, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.596421 644066 task_signals.go:204] [ 754: 758] Signal 754, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.596456 644066 task_exit.go:204] [ 754: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.596387 644066 task_signals.go:204] [ 754: 757] Signal 754, PID: 757, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.596485 644066 task_exit.go:204] [ 754: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.596531 644066 task_exit.go:204] [ 754: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.596545 644066 task_exit.go:204] [ 754: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.596559 644066 task_exit.go:204] [ 754: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.596590 644066 task_exit.go:204] [ 754: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.596601 644066 task_exit.go:204] [ 754: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.596625 644066 task_exit.go:204] [ 754: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.596873 644066 task_exit.go:204] [ 754: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.596907 644066 task_exit.go:204] [ 754: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.598108 644066 task_exit.go:204] [ 754: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.598134 644066 task_exit.go:204] [ 754: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.598151 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.598229 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.598241 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.598358 644066 task_exit.go:204] [ 754: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.599187 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.600758 644066 syscalls.go:262] [ 759: 759] Allocating stack with size of 8388608 bytes D0713 05:18:03.600860 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.606113 644066 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.606183 644066 usertrap_amd64.go:106] [ 759: 759] Map a usertrap vma at 64000 D0713 05:18:03.606332 644066 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0018e1f50 1 D0713 05:18:03.606394 644066 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:03.606945 644066 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.606969 644066 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0018e1f50 2 D0713 05:18:03.606985 644066 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:03.607800 644066 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.607834 644066 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0018e1f50 3 D0713 05:18:03.607853 644066 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:03.614431 644066 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.614466 644066 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0018e1f50 4 D0713 05:18:03.614477 644066 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:03.615762 644066 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.615808 644066 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0018e1f50 5 D0713 05:18:03.615825 644066 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:03.615887 644066 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.615903 644066 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0018e1f50 6 D0713 05:18:03.615910 644066 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:03.616389 644066 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.616425 644066 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0018e1f50 7 D0713 05:18:03.616438 644066 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:03.616693 644066 usertrap_amd64.go:212] [ 759: 760] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.616734 644066 usertrap_amd64.go:122] [ 759: 760] Allocate a new trap: 0xc0018e1f50 8 D0713 05:18:03.616751 644066 usertrap_amd64.go:225] [ 759: 760] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:03.616994 644066 usertrap_amd64.go:212] [ 759: 760] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.617022 644066 usertrap_amd64.go:122] [ 759: 760] Allocate a new trap: 0xc0018e1f50 9 D0713 05:18:03.617063 644066 usertrap_amd64.go:225] [ 759: 760] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:03.617094 644066 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.617129 644066 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0018e1f50 10 D0713 05:18:03.617140 644066 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:03.625287 644066 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.625328 644066 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0018e1f50 11 D0713 05:18:03.625343 644066 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:03.627967 644066 usertrap_amd64.go:212] [ 759: 760] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.628029 644066 usertrap_amd64.go:122] [ 759: 760] Allocate a new trap: 0xc0018e1f50 12 D0713 05:18:03.628048 644066 usertrap_amd64.go:225] [ 759: 760] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:03.628084 644066 usertrap_amd64.go:212] [ 759: 760] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.628105 644066 usertrap_amd64.go:122] [ 759: 760] Allocate a new trap: 0xc0018e1f50 13 D0713 05:18:03.628129 644066 usertrap_amd64.go:225] [ 759: 760] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:03.628190 644066 task_signals.go:470] [ 759: 759] Notified of signal 23 D0713 05:18:03.628255 644066 task_signals.go:220] [ 759: 759] Signal 23: delivering to handler D0713 05:18:03.637570 644066 usertrap_amd64.go:212] [ 759: 759] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.637620 644066 usertrap_amd64.go:122] [ 759: 759] Allocate a new trap: 0xc0018e1f50 14 D0713 05:18:03.637638 644066 usertrap_amd64.go:225] [ 759: 759] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:03.637704 644066 task_exit.go:204] [ 759: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.637786 644066 task_signals.go:204] [ 759: 760] Signal 759, PID: 760, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.637811 644066 task_signals.go:204] [ 759: 763] Signal 759, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.637817 644066 task_signals.go:204] [ 759: 764] Signal 759, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.637831 644066 task_signals.go:204] [ 759: 761] Signal 759, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.637808 644066 task_signals.go:204] [ 759: 762] Signal 759, PID: 762, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.637853 644066 task_exit.go:204] [ 759: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.637868 644066 task_exit.go:204] [ 759: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.637876 644066 task_exit.go:204] [ 759: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.637906 644066 task_exit.go:204] [ 759: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.637916 644066 task_exit.go:204] [ 759: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.637929 644066 task_exit.go:204] [ 759: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.637940 644066 task_exit.go:204] [ 759: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.637948 644066 task_exit.go:204] [ 759: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.637962 644066 task_exit.go:204] [ 759: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.637973 644066 task_exit.go:204] [ 759: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.637990 644066 task_exit.go:204] [ 759: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.637997 644066 task_exit.go:204] [ 759: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.638006 644066 task_exit.go:204] [ 759: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.638063 644066 task_exit.go:204] [ 759: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie executing program D0713 05:18:03.639325 644066 task_exit.go:204] [ 759: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.639360 644066 task_exit.go:204] [ 759: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.639376 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.639437 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.639465 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.639655 644066 task_exit.go:204] [ 759: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.639760 644066 task_signals.go:470] [ 6: 10] Notified of signal 23 D0713 05:18:03.639843 644066 task_signals.go:220] [ 6: 10] Signal 23: delivering to handler D0713 05:18:03.640305 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.641760 644066 syscalls.go:262] [ 765: 765] Allocating stack with size of 8388608 bytes D0713 05:18:03.641919 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.642923 644066 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.642971 644066 usertrap_amd64.go:106] [ 765: 765] Map a usertrap vma at 66000 D0713 05:18:03.643073 644066 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000a4f2f0 1 D0713 05:18:03.643110 644066 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:03.643491 644066 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.643515 644066 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000a4f2f0 2 D0713 05:18:03.643526 644066 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:03.644293 644066 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.644319 644066 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000a4f2f0 3 D0713 05:18:03.644330 644066 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:03.650762 644066 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.650817 644066 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000a4f2f0 4 D0713 05:18:03.650834 644066 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:03.652199 644066 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.652230 644066 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000a4f2f0 5 D0713 05:18:03.652240 644066 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:03.652303 644066 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.652316 644066 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000a4f2f0 6 D0713 05:18:03.652325 644066 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:03.652617 644066 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.652645 644066 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000a4f2f0 7 D0713 05:18:03.652660 644066 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:03.652852 644066 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.652878 644066 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc000a4f2f0 8 D0713 05:18:03.652890 644066 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:03.653119 644066 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.653148 644066 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc000a4f2f0 9 D0713 05:18:03.653159 644066 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:03.653171 644066 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.653178 644066 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000a4f2f0 10 D0713 05:18:03.653184 644066 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:03.660725 644066 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.660761 644066 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000a4f2f0 11 D0713 05:18:03.660775 644066 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:03.663569 644066 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.663604 644066 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc000a4f2f0 12 D0713 05:18:03.663618 644066 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:03.663642 644066 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.663654 644066 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc000a4f2f0 13 D0713 05:18:03.663664 644066 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:03.663707 644066 task_signals.go:470] [ 765: 765] Notified of signal 23 D0713 05:18:03.663849 644066 task_signals.go:220] [ 765: 765] Signal 23: delivering to handler D0713 05:18:03.672711 644066 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.672751 644066 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000a4f2f0 14 D0713 05:18:03.672762 644066 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:03.672810 644066 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.672831 644066 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.672870 644066 task_signals.go:204] [ 765: 767] Signal 765, PID: 767, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.672862 644066 task_signals.go:204] [ 765: 766] Signal 765, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.672882 644066 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.672888 644066 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.672897 644066 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.672912 644066 task_signals.go:204] [ 765: 769] Signal 765, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.672921 644066 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.672933 644066 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.672999 644066 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.672926 644066 task_signals.go:204] [ 765: 768] Signal 765, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.673017 644066 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.673051 644066 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.673078 644066 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.673100 644066 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.674415 644066 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.674520 644066 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.674559 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.674598 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.674619 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.674652 644066 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.675613 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.677464 644066 syscalls.go:262] [ 770: 770] Allocating stack with size of 8388608 bytes D0713 05:18:03.677605 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.679236 644066 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.679276 644066 usertrap_amd64.go:106] [ 770: 770] Map a usertrap vma at 60000 D0713 05:18:03.679361 644066 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d643f0 1 D0713 05:18:03.679390 644066 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:03.679930 644066 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.679951 644066 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d643f0 2 D0713 05:18:03.679964 644066 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:03.683812 644066 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.683834 644066 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d643f0 3 D0713 05:18:03.683847 644066 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:03.690660 644066 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.690696 644066 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d643f0 4 D0713 05:18:03.690709 644066 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:03.691938 644066 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.691974 644066 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d643f0 5 D0713 05:18:03.691988 644066 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:03.692049 644066 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.692064 644066 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d643f0 6 D0713 05:18:03.692069 644066 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:03.692332 644066 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.692358 644066 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d643f0 7 D0713 05:18:03.692364 644066 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:03.692661 644066 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.692677 644066 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000d643f0 8 D0713 05:18:03.692688 644066 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:03.692992 644066 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.693019 644066 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d643f0 9 D0713 05:18:03.693031 644066 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:03.693269 644066 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.693293 644066 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000d643f0 10 D0713 05:18:03.693307 644066 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:03.700799 644066 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.700839 644066 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d643f0 11 D0713 05:18:03.700853 644066 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:03.704785 644066 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.704842 644066 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000d643f0 12 D0713 05:18:03.704862 644066 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:03.704895 644066 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.704913 644066 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000d643f0 13 D0713 05:18:03.705002 644066 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:03.705254 644066 task_signals.go:470] [ 770: 770] Notified of signal 23 D0713 05:18:03.705401 644066 task_signals.go:220] [ 770: 770] Signal 23: delivering to handler D0713 05:18:03.713741 644066 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.713777 644066 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000d643f0 14 D0713 05:18:03.713789 644066 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:03.713853 644066 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.713883 644066 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.713889 644066 task_signals.go:204] [ 770: 772] Signal 770, PID: 772, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.713920 644066 task_signals.go:204] [ 770: 771] Signal 770, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.713907 644066 task_signals.go:204] [ 770: 773] Signal 770, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.713928 644066 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.713943 644066 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.713960 644066 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.713908 644066 task_signals.go:204] [ 770: 774] Signal 770, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.713977 644066 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.713984 644066 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.713991 644066 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.714007 644066 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.714016 644066 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.714023 644066 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.714034 644066 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.715298 644066 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.715334 644066 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.715351 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.715408 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.715486 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.715595 644066 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.716320 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.717980 644066 syscalls.go:262] [ 775: 775] Allocating stack with size of 8388608 bytes D0713 05:18:03.718072 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.720296 644066 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.720344 644066 usertrap_amd64.go:106] [ 775: 775] Map a usertrap vma at 63000 D0713 05:18:03.720432 644066 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005bb2c0 1 D0713 05:18:03.720467 644066 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:03.720755 644066 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.720775 644066 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005bb2c0 2 D0713 05:18:03.720785 644066 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:03.721609 644066 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.721643 644066 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005bb2c0 3 D0713 05:18:03.721662 644066 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:03.729486 644066 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.729567 644066 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005bb2c0 4 D0713 05:18:03.729597 644066 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:03.731033 644066 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.731079 644066 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005bb2c0 5 D0713 05:18:03.731095 644066 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:03.731177 644066 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.731187 644066 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005bb2c0 6 D0713 05:18:03.731196 644066 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:03.731640 644066 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.731664 644066 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005bb2c0 7 D0713 05:18:03.731676 644066 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:03.731944 644066 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.731967 644066 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc0005bb2c0 8 D0713 05:18:03.731977 644066 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:03.732161 644066 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.732182 644066 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc0005bb2c0 9 D0713 05:18:03.732191 644066 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:03.732364 644066 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.732391 644066 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005bb2c0 10 D0713 05:18:03.732403 644066 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:03.742260 644066 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.742294 644066 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005bb2c0 11 D0713 05:18:03.742308 644066 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:03.743206 644066 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.743247 644066 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc0005bb2c0 12 D0713 05:18:03.743262 644066 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:03.743744 644066 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.743767 644066 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc0005bb2c0 13 D0713 05:18:03.743778 644066 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:03.743796 644066 task_signals.go:470] [ 775: 775] Notified of signal 23 D0713 05:18:03.743954 644066 task_signals.go:220] [ 775: 775] Signal 23: delivering to handler D0713 05:18:03.754599 644066 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.754692 644066 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0005bb2c0 14 D0713 05:18:03.754774 644066 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:03.754841 644066 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.754870 644066 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.754904 644066 task_signals.go:204] [ 775: 779] Signal 775, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.754913 644066 task_signals.go:204] [ 775: 778] Signal 775, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.754933 644066 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.754931 644066 task_signals.go:204] [ 775: 776] Signal 775, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.754966 644066 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.754987 644066 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.755005 644066 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.755018 644066 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.755033 644066 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.754945 644066 task_signals.go:204] [ 775: 777] Signal 775, PID: 777, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.755047 644066 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.755064 644066 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.755080 644066 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.755104 644066 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.756654 644066 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.756752 644066 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.756772 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.756865 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.756874 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.757073 644066 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.757700 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.759020 644066 syscalls.go:262] [ 780: 780] Allocating stack with size of 8388608 bytes D0713 05:18:03.759192 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.760932 644066 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.761016 644066 usertrap_amd64.go:106] [ 780: 780] Map a usertrap vma at 66000 D0713 05:18:03.761159 644066 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001786e10 1 D0713 05:18:03.761200 644066 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:03.761727 644066 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.761758 644066 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001786e10 2 D0713 05:18:03.761772 644066 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:03.763316 644066 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.763348 644066 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001786e10 3 D0713 05:18:03.763356 644066 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:03.770140 644066 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.770206 644066 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001786e10 4 D0713 05:18:03.770229 644066 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:03.771705 644066 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.771747 644066 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001786e10 5 D0713 05:18:03.771763 644066 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:03.771831 644066 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.771842 644066 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001786e10 6 D0713 05:18:03.771852 644066 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:03.772252 644066 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.772283 644066 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001786e10 7 D0713 05:18:03.772295 644066 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:03.772497 644066 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.772521 644066 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc001786e10 8 D0713 05:18:03.772530 644066 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:03.772747 644066 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.772766 644066 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc001786e10 9 D0713 05:18:03.772779 644066 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:03.773000 644066 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.773034 644066 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001786e10 10 D0713 05:18:03.773046 644066 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:03.781253 644066 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.781288 644066 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001786e10 11 D0713 05:18:03.781303 644066 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:03.784239 644066 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.784280 644066 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc001786e10 12 D0713 05:18:03.784297 644066 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:03.784370 644066 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.784389 644066 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc001786e10 13 D0713 05:18:03.784403 644066 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:03.784446 644066 task_signals.go:470] [ 780: 780] Notified of signal 23 D0713 05:18:03.784542 644066 task_signals.go:220] [ 780: 780] Signal 23: delivering to handler D0713 05:18:03.792644 644066 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.792680 644066 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc001786e10 14 D0713 05:18:03.792699 644066 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:03.792740 644066 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.792766 644066 task_signals.go:204] [ 780: 782] Signal 780, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.792768 644066 task_signals.go:204] [ 780: 784] Signal 780, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.792787 644066 task_signals.go:204] [ 780: 781] Signal 780, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.792792 644066 task_signals.go:204] [ 780: 783] Signal 780, PID: 783, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.792804 644066 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.792812 644066 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.792819 644066 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.792830 644066 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.792838 644066 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.792854 644066 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.792863 644066 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.792869 644066 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.792878 644066 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.792991 644066 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.793005 644066 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.794285 644066 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.794316 644066 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.794340 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.794374 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.794384 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.794589 644066 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.795368 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.796979 644066 syscalls.go:262] [ 785: 785] Allocating stack with size of 8388608 bytes D0713 05:18:03.797154 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.799525 644066 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.799566 644066 usertrap_amd64.go:106] [ 785: 785] Map a usertrap vma at 64000 D0713 05:18:03.799649 644066 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc001217020 1 D0713 05:18:03.799703 644066 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:03.800040 644066 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.800075 644066 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc001217020 2 D0713 05:18:03.800088 644066 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:03.800808 644066 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.800846 644066 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc001217020 3 D0713 05:18:03.800859 644066 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:03.807228 644066 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.807260 644066 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc001217020 4 D0713 05:18:03.807275 644066 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:03.808368 644066 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.808447 644066 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc001217020 5 D0713 05:18:03.808487 644066 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:03.808552 644066 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.808571 644066 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc001217020 6 D0713 05:18:03.808580 644066 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:03.808763 644066 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.808781 644066 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc001217020 7 D0713 05:18:03.808787 644066 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:03.808932 644066 usertrap_amd64.go:212] [ 785: 786] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.808986 644066 usertrap_amd64.go:122] [ 785: 786] Allocate a new trap: 0xc001217020 8 D0713 05:18:03.808995 644066 usertrap_amd64.go:225] [ 785: 786] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:03.809404 644066 usertrap_amd64.go:212] [ 785: 786] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.809436 644066 usertrap_amd64.go:122] [ 785: 786] Allocate a new trap: 0xc001217020 9 D0713 05:18:03.809453 644066 usertrap_amd64.go:225] [ 785: 786] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:03.809470 644066 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.809488 644066 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc001217020 10 D0713 05:18:03.809499 644066 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:03.810153 644066 usertrap_amd64.go:212] [ 785: 786] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.810180 644066 usertrap_amd64.go:122] [ 785: 786] Allocate a new trap: 0xc001217020 11 D0713 05:18:03.810192 644066 usertrap_amd64.go:225] [ 785: 786] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:03.810253 644066 usertrap_amd64.go:212] [ 785: 786] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.810301 644066 usertrap_amd64.go:122] [ 785: 786] Allocate a new trap: 0xc001217020 12 D0713 05:18:03.810322 644066 usertrap_amd64.go:225] [ 785: 786] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:03.810366 644066 task_signals.go:470] [ 785: 785] Notified of signal 23 D0713 05:18:03.810393 644066 task_signals.go:220] [ 785: 785] Signal 23: delivering to handler D0713 05:18:03.819388 644066 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.819426 644066 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc001217020 13 D0713 05:18:03.819440 644066 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:03.820587 644066 task_signals.go:470] [ 785: 785] Notified of signal 23 D0713 05:18:03.822010 644066 task_signals.go:220] [ 785: 785] Signal 23: delivering to handler D0713 05:18:03.830780 644066 usertrap_amd64.go:212] [ 785: 785] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.830858 644066 usertrap_amd64.go:122] [ 785: 785] Allocate a new trap: 0xc001217020 14 D0713 05:18:03.830873 644066 usertrap_amd64.go:225] [ 785: 785] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:03.830975 644066 task_exit.go:204] [ 785: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.831011 644066 task_exit.go:204] [ 785: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.831048 644066 task_signals.go:204] [ 785: 786] Signal 785, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.831070 644066 task_exit.go:204] [ 785: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.831076 644066 task_exit.go:204] [ 785: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.831080 644066 task_exit.go:204] [ 785: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.831106 644066 task_signals.go:204] [ 785: 787] Signal 785, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.831121 644066 task_exit.go:204] [ 785: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.831126 644066 task_exit.go:204] [ 785: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.831129 644066 task_exit.go:204] [ 785: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.831149 644066 task_signals.go:204] [ 785: 788] Signal 785, PID: 788, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.831159 644066 task_exit.go:204] [ 785: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.831166 644066 task_exit.go:204] [ 785: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.831170 644066 task_exit.go:204] [ 785: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.831199 644066 task_signals.go:204] [ 785: 789] Signal 785, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.831209 644066 task_exit.go:204] [ 785: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.831215 644066 task_exit.go:204] [ 785: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.831220 644066 task_exit.go:204] [ 785: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.831235 644066 task_signals.go:204] [ 785: 790] Signal 785, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.831244 644066 task_exit.go:204] [ 785: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.832504 644066 task_exit.go:204] [ 785: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.832524 644066 task_exit.go:204] [ 785: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.832546 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.832602 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.832698 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.832865 644066 task_exit.go:204] [ 785: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.833529 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.834876 644066 syscalls.go:262] [ 791: 791] Allocating stack with size of 8388608 bytes D0713 05:18:03.834967 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.836441 644066 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.836497 644066 usertrap_amd64.go:106] [ 791: 791] Map a usertrap vma at 62000 D0713 05:18:03.836625 644066 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000d64840 1 D0713 05:18:03.836649 644066 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:03.837367 644066 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.837402 644066 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000d64840 2 D0713 05:18:03.837420 644066 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:03.838055 644066 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.838089 644066 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000d64840 3 D0713 05:18:03.838105 644066 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:03.845552 644066 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.845652 644066 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000d64840 4 D0713 05:18:03.845673 644066 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:03.847079 644066 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.847111 644066 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000d64840 5 D0713 05:18:03.847139 644066 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:03.847205 644066 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.847211 644066 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000d64840 6 D0713 05:18:03.847216 644066 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:03.847598 644066 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.847622 644066 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000d64840 7 D0713 05:18:03.847628 644066 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:03.847842 644066 usertrap_amd64.go:212] [ 791: 792] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.847884 644066 usertrap_amd64.go:122] [ 791: 792] Allocate a new trap: 0xc000d64840 8 D0713 05:18:03.847903 644066 usertrap_amd64.go:225] [ 791: 792] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:03.848191 644066 usertrap_amd64.go:212] [ 791: 792] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.848216 644066 usertrap_amd64.go:122] [ 791: 792] Allocate a new trap: 0xc000d64840 9 D0713 05:18:03.848229 644066 usertrap_amd64.go:225] [ 791: 792] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:03.848317 644066 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.848335 644066 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000d64840 10 D0713 05:18:03.848342 644066 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:03.856388 644066 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.856425 644066 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000d64840 11 D0713 05:18:03.856438 644066 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:03.858989 644066 usertrap_amd64.go:212] [ 791: 792] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.859032 644066 usertrap_amd64.go:122] [ 791: 792] Allocate a new trap: 0xc000d64840 12 D0713 05:18:03.859051 644066 usertrap_amd64.go:225] [ 791: 792] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:03.859116 644066 usertrap_amd64.go:212] [ 791: 792] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.859126 644066 usertrap_amd64.go:122] [ 791: 792] Allocate a new trap: 0xc000d64840 13 D0713 05:18:03.859138 644066 usertrap_amd64.go:225] [ 791: 792] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:03.859160 644066 task_signals.go:470] [ 791: 791] Notified of signal 23 D0713 05:18:03.859265 644066 task_signals.go:220] [ 791: 791] Signal 23: delivering to handler D0713 05:18:03.862962 644066 sampler.go:191] Time: Adjusting syscall overhead down to 515 D0713 05:18:03.862999 644066 sampler.go:191] Time: Adjusting syscall overhead down to 671 D0713 05:18:03.867494 644066 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.867541 644066 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000d64840 14 D0713 05:18:03.867564 644066 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:03.867638 644066 task_exit.go:204] [ 791: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.867678 644066 task_exit.go:204] [ 791: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.867723 644066 task_signals.go:204] [ 791: 794] Signal 791, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.867742 644066 task_exit.go:204] [ 791: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.867751 644066 task_exit.go:204] [ 791: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.867757 644066 task_exit.go:204] [ 791: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.867730 644066 task_signals.go:204] [ 791: 793] Signal 791, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.867832 644066 task_exit.go:204] [ 791: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.867883 644066 task_exit.go:204] [ 791: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.867906 644066 task_exit.go:204] [ 791: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.867791 644066 task_signals.go:204] [ 791: 795] Signal 791, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.867943 644066 task_exit.go:204] [ 791: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.867953 644066 task_exit.go:204] [ 791: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.867958 644066 task_exit.go:204] [ 791: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.867808 644066 task_signals.go:204] [ 791: 792] Signal 791, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.867987 644066 task_exit.go:204] [ 791: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.869481 644066 task_exit.go:204] [ 791: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.869571 644066 task_exit.go:204] [ 791: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.869679 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.869740 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:03.869754 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.869863 644066 task_exit.go:204] [ 791: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.870522 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.871986 644066 syscalls.go:262] [ 796: 796] Allocating stack with size of 8388608 bytes D0713 05:18:03.872132 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.873600 644066 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.873643 644066 usertrap_amd64.go:106] [ 796: 796] Map a usertrap vma at 68000 D0713 05:18:03.873753 644066 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc001316180 1 D0713 05:18:03.873791 644066 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:03.874213 644066 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.874234 644066 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc001316180 2 D0713 05:18:03.874242 644066 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:03.874701 644066 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.874725 644066 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc001316180 3 D0713 05:18:03.874737 644066 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:03.880757 644066 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.880797 644066 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc001316180 4 D0713 05:18:03.880812 644066 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:03.882151 644066 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.882188 644066 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc001316180 5 D0713 05:18:03.882201 644066 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:03.882246 644066 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.882261 644066 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc001316180 6 D0713 05:18:03.882266 644066 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:03.882601 644066 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.882618 644066 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc001316180 7 D0713 05:18:03.882623 644066 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:03.882739 644066 usertrap_amd64.go:212] [ 796: 797] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.882762 644066 usertrap_amd64.go:122] [ 796: 797] Allocate a new trap: 0xc001316180 8 D0713 05:18:03.882771 644066 usertrap_amd64.go:225] [ 796: 797] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:03.882987 644066 usertrap_amd64.go:212] [ 796: 797] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.883036 644066 usertrap_amd64.go:122] [ 796: 797] Allocate a new trap: 0xc001316180 9 D0713 05:18:03.883054 644066 usertrap_amd64.go:225] [ 796: 797] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:03.883082 644066 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.883099 644066 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc001316180 10 D0713 05:18:03.883107 644066 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:03.883359 644066 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:03.883376 644066 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc001316180 11 D0713 05:18:03.883392 644066 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:03.893049 644066 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.893090 644066 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc001316180 12 D0713 05:18:03.893108 644066 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:03.893863 644066 usertrap_amd64.go:212] [ 796: 797] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.893905 644066 usertrap_amd64.go:122] [ 796: 797] Allocate a new trap: 0xc001316180 13 D0713 05:18:03.893922 644066 usertrap_amd64.go:225] [ 796: 797] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:03.894058 644066 usertrap_amd64.go:212] [ 796: 797] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.894090 644066 usertrap_amd64.go:122] [ 796: 797] Allocate a new trap: 0xc001316180 14 D0713 05:18:03.894103 644066 usertrap_amd64.go:225] [ 796: 797] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:03.894151 644066 task_signals.go:470] [ 796: 796] Notified of signal 23 D0713 05:18:03.895836 644066 task_signals.go:220] [ 796: 796] Signal 23: delivering to handler D0713 05:18:03.904357 644066 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.904413 644066 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc001316180 15 D0713 05:18:03.904445 644066 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 05:18:03.904595 644066 task_exit.go:204] [ 796: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.904670 644066 task_exit.go:204] [ 796: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.904708 644066 task_signals.go:204] [ 796: 800] Signal 796, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.904717 644066 task_signals.go:204] [ 796: 799] Signal 796, PID: 799, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.904741 644066 task_signals.go:204] [ 796: 798] Signal 796, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.904761 644066 task_exit.go:204] [ 796: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.904775 644066 task_signals.go:204] [ 796: 797] Signal 796, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.904795 644066 task_exit.go:204] [ 796: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.904801 644066 task_exit.go:204] [ 796: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.904822 644066 task_exit.go:204] [ 796: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.904828 644066 task_exit.go:204] [ 796: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.904831 644066 task_exit.go:204] [ 796: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.904845 644066 task_exit.go:204] [ 796: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.904860 644066 task_exit.go:204] [ 796: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.904864 644066 task_exit.go:204] [ 796: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.904871 644066 task_exit.go:204] [ 796: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.906186 644066 task_exit.go:204] [ 796: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.906226 644066 task_exit.go:204] [ 796: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.906244 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.906279 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.906291 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.906409 644066 task_exit.go:204] [ 796: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.907022 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.908328 644066 syscalls.go:262] [ 801: 801] Allocating stack with size of 8388608 bytes D0713 05:18:03.908723 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.911884 644066 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.911982 644066 usertrap_amd64.go:106] [ 801: 801] Map a usertrap vma at 60000 D0713 05:18:03.912137 644066 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc000d64f90 1 D0713 05:18:03.912250 644066 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:03.912723 644066 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.912806 644066 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc000d64f90 2 D0713 05:18:03.912869 644066 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:03.913645 644066 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.913779 644066 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc000d64f90 3 D0713 05:18:03.913815 644066 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:03.920419 644066 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.920481 644066 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc000d64f90 4 D0713 05:18:03.920499 644066 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:03.921763 644066 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.921829 644066 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc000d64f90 5 D0713 05:18:03.921852 644066 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:03.921962 644066 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.921998 644066 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc000d64f90 6 D0713 05:18:03.922010 644066 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:03.922589 644066 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.922618 644066 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc000d64f90 7 D0713 05:18:03.922627 644066 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:03.922945 644066 usertrap_amd64.go:212] [ 801: 802] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.922966 644066 usertrap_amd64.go:122] [ 801: 802] Allocate a new trap: 0xc000d64f90 8 D0713 05:18:03.922972 644066 usertrap_amd64.go:225] [ 801: 802] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:03.923049 644066 usertrap_amd64.go:212] [ 801: 802] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.923058 644066 usertrap_amd64.go:122] [ 801: 802] Allocate a new trap: 0xc000d64f90 9 D0713 05:18:03.923063 644066 usertrap_amd64.go:225] [ 801: 802] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:03.923200 644066 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.923227 644066 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc000d64f90 10 D0713 05:18:03.923239 644066 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:03.932852 644066 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.932989 644066 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc000d64f90 11 D0713 05:18:03.933084 644066 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:03.934010 644066 usertrap_amd64.go:212] [ 801: 802] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.934081 644066 usertrap_amd64.go:122] [ 801: 802] Allocate a new trap: 0xc000d64f90 12 D0713 05:18:03.934109 644066 usertrap_amd64.go:225] [ 801: 802] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:03.934181 644066 usertrap_amd64.go:212] [ 801: 802] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.934203 644066 usertrap_amd64.go:122] [ 801: 802] Allocate a new trap: 0xc000d64f90 13 D0713 05:18:03.934213 644066 usertrap_amd64.go:225] [ 801: 802] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:03.934255 644066 task_signals.go:470] [ 801: 801] Notified of signal 23 D0713 05:18:03.934321 644066 task_signals.go:220] [ 801: 801] Signal 23: delivering to handler D0713 05:18:03.945295 644066 task_signals.go:470] [ 801: 801] Notified of signal 23 D0713 05:18:03.945513 644066 task_signals.go:220] [ 801: 801] Signal 23: delivering to handler D0713 05:18:03.945700 644066 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.945732 644066 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc000d64f90 14 D0713 05:18:03.945750 644066 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:03.945795 644066 task_exit.go:204] [ 801: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.945829 644066 task_exit.go:204] [ 801: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.945856 644066 task_signals.go:204] [ 801: 802] Signal 801, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.945872 644066 task_exit.go:204] [ 801: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.945888 644066 task_exit.go:204] [ 801: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.945898 644066 task_exit.go:204] [ 801: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.945913 644066 task_signals.go:204] [ 801: 804] Signal 801, PID: 804, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.945919 644066 task_exit.go:204] [ 801: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.945925 644066 task_exit.go:204] [ 801: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.945936 644066 task_exit.go:204] [ 801: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.945948 644066 task_signals.go:204] [ 801: 803] Signal 801, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.945955 644066 task_exit.go:204] [ 801: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.945959 644066 task_exit.go:204] [ 801: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.945963 644066 task_exit.go:204] [ 801: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.945973 644066 task_signals.go:204] [ 801: 805] Signal 801, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.945980 644066 task_exit.go:204] [ 801: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.947292 644066 task_exit.go:204] [ 801: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.947401 644066 task_exit.go:204] [ 801: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.947513 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.947671 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.947749 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.947855 644066 task_exit.go:204] [ 801: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.948856 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.950466 644066 syscalls.go:262] [ 806: 806] Allocating stack with size of 8388608 bytes D0713 05:18:03.950593 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.954347 644066 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.954813 644066 usertrap_amd64.go:106] [ 806: 806] Map a usertrap vma at 61000 D0713 05:18:03.954963 644066 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc001787620 1 D0713 05:18:03.955006 644066 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:03.955416 644066 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.955442 644066 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc001787620 2 D0713 05:18:03.955458 644066 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:03.956167 644066 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.956246 644066 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc001787620 3 D0713 05:18:03.956283 644066 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:03.963712 644066 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:03.963775 644066 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc001787620 4 D0713 05:18:03.963790 644066 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:03.964877 644066 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:03.964904 644066 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc001787620 5 D0713 05:18:03.964916 644066 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:03.965070 644066 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b214:sysno 13 D0713 05:18:03.965082 644066 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc001787620 6 D0713 05:18:03.965090 644066 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:03.965548 644066 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:03.965576 644066 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc001787620 7 D0713 05:18:03.965588 644066 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:03.967306 644066 usertrap_amd64.go:212] [ 806: 807] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:03.967361 644066 usertrap_amd64.go:122] [ 806: 807] Allocate a new trap: 0xc001787620 8 D0713 05:18:03.967380 644066 usertrap_amd64.go:225] [ 806: 807] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:03.967722 644066 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:03.967746 644066 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc001787620 9 D0713 05:18:03.967756 644066 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:03.967774 644066 usertrap_amd64.go:212] [ 806: 807] Found the pattern at ip 46af76:sysno 35 D0713 05:18:03.967797 644066 usertrap_amd64.go:122] [ 806: 807] Allocate a new trap: 0xc001787620 10 D0713 05:18:03.967811 644066 usertrap_amd64.go:225] [ 806: 807] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:03.976173 644066 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46af29:sysno 293 D0713 05:18:03.976248 644066 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc001787620 11 D0713 05:18:03.976316 644066 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:03.979494 644066 usertrap_amd64.go:212] [ 806: 807] Found the pattern at ip 46b020:sysno 39 D0713 05:18:03.979516 644066 usertrap_amd64.go:122] [ 806: 807] Allocate a new trap: 0xc001787620 12 D0713 05:18:03.979529 644066 usertrap_amd64.go:225] [ 806: 807] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:03.979685 644066 usertrap_amd64.go:212] [ 806: 807] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:03.979699 644066 usertrap_amd64.go:122] [ 806: 807] Allocate a new trap: 0xc001787620 13 D0713 05:18:03.979710 644066 usertrap_amd64.go:225] [ 806: 807] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:03.979745 644066 task_signals.go:470] [ 806: 806] Notified of signal 23 D0713 05:18:03.979845 644066 task_signals.go:220] [ 806: 806] Signal 23: delivering to handler D0713 05:18:03.988753 644066 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:03.988778 644066 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc001787620 14 D0713 05:18:03.988791 644066 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:03.988839 644066 task_exit.go:204] [ 806: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.988863 644066 task_exit.go:204] [ 806: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.988896 644066 task_signals.go:204] [ 806: 807] Signal 806, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.988911 644066 task_exit.go:204] [ 806: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.988926 644066 task_exit.go:204] [ 806: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.988931 644066 task_exit.go:204] [ 806: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.988973 644066 task_signals.go:204] [ 806: 808] Signal 806, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.988983 644066 task_exit.go:204] [ 806: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.988990 644066 task_exit.go:204] [ 806: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.988998 644066 task_exit.go:204] [ 806: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.989018 644066 task_signals.go:204] [ 806: 809] Signal 806, PID: 809, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.989027 644066 task_exit.go:204] [ 806: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.989033 644066 task_exit.go:204] [ 806: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.989038 644066 task_exit.go:204] [ 806: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.989053 644066 task_signals.go:204] [ 806: 810] Signal 806, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:03.989060 644066 task_exit.go:204] [ 806: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:03.990328 644066 task_exit.go:204] [ 806: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:03.990358 644066 task_exit.go:204] [ 806: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.990372 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:03.990425 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:03.990442 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:03.990909 644066 task_exit.go:204] [ 806: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:03.992088 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.993430 644066 syscalls.go:262] [ 811: 811] Allocating stack with size of 8388608 bytes D0713 05:18:03.993565 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:03.996324 644066 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:03.996389 644066 usertrap_amd64.go:106] [ 811: 811] Map a usertrap vma at 60000 D0713 05:18:03.996539 644066 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc000d65440 1 D0713 05:18:03.996571 644066 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:03.997151 644066 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:03.997203 644066 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc000d65440 2 D0713 05:18:03.997218 644066 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:03.997831 644066 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:03.997858 644066 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc000d65440 3 D0713 05:18:03.997874 644066 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:04.004705 644066 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.004727 644066 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc000d65440 4 D0713 05:18:04.004740 644066 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:04.005920 644066 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.005962 644066 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc000d65440 5 D0713 05:18:04.005977 644066 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:04.006032 644066 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.006051 644066 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc000d65440 6 D0713 05:18:04.006061 644066 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:04.006298 644066 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.006331 644066 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc000d65440 7 D0713 05:18:04.006343 644066 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:04.006584 644066 usertrap_amd64.go:212] [ 811: 812] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.006610 644066 usertrap_amd64.go:122] [ 811: 812] Allocate a new trap: 0xc000d65440 8 D0713 05:18:04.006620 644066 usertrap_amd64.go:225] [ 811: 812] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:04.006811 644066 usertrap_amd64.go:212] [ 811: 812] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.006843 644066 usertrap_amd64.go:122] [ 811: 812] Allocate a new trap: 0xc000d65440 9 D0713 05:18:04.006856 644066 usertrap_amd64.go:225] [ 811: 812] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:04.006869 644066 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.006875 644066 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc000d65440 10 D0713 05:18:04.006886 644066 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:04.014246 644066 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.014279 644066 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc000d65440 11 D0713 05:18:04.014294 644066 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:04.018652 644066 usertrap_amd64.go:212] [ 811: 812] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.018675 644066 usertrap_amd64.go:122] [ 811: 812] Allocate a new trap: 0xc000d65440 12 D0713 05:18:04.018688 644066 usertrap_amd64.go:225] [ 811: 812] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:04.018814 644066 usertrap_amd64.go:212] [ 811: 812] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.018929 644066 usertrap_amd64.go:122] [ 811: 812] Allocate a new trap: 0xc000d65440 13 D0713 05:18:04.018994 644066 usertrap_amd64.go:225] [ 811: 812] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:04.019084 644066 task_signals.go:470] [ 811: 811] Notified of signal 23 D0713 05:18:04.019380 644066 task_signals.go:220] [ 811: 811] Signal 23: delivering to handler I0713 05:18:04.025750 644066 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0713 05:18:04.025850 644066 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.025874 644066 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc000d65440 14 D0713 05:18:04.025885 644066 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:04.025970 644066 task_exit.go:204] [ 811: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.026007 644066 task_signals.go:204] [ 811: 812] Signal 811, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.026007 644066 task_signals.go:204] [ 811: 813] Signal 811, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.026028 644066 task_exit.go:204] [ 811: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.026038 644066 task_signals.go:204] [ 811: 814] Signal 811, PID: 814, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.026050 644066 task_signals.go:204] [ 811: 816] Signal 811, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.026058 644066 task_exit.go:204] [ 811: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.026068 644066 task_signals.go:204] [ 811: 815] Signal 811, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.026076 644066 task_exit.go:204] [ 811: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.026083 644066 task_exit.go:204] [ 811: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.026089 644066 task_exit.go:204] [ 811: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.026100 644066 task_exit.go:204] [ 811: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.026118 644066 task_exit.go:204] [ 811: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.026128 644066 task_exit.go:204] [ 811: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.026139 644066 task_exit.go:204] [ 811: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.026145 644066 task_exit.go:204] [ 811: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.026154 644066 task_exit.go:204] [ 811: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.026170 644066 task_exit.go:204] [ 811: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.026175 644066 task_exit.go:204] [ 811: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.026184 644066 task_exit.go:204] [ 811: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.027587 644066 task_exit.go:204] [ 811: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.027615 644066 task_exit.go:204] [ 811: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.027628 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.027668 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:04.027677 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.027781 644066 task_exit.go:204] [ 811: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.028366 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.029733 644066 syscalls.go:262] [ 817: 817] Allocating stack with size of 8388608 bytes D0713 05:18:04.029838 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.031676 644066 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.031713 644066 usertrap_amd64.go:106] [ 817: 817] Map a usertrap vma at 66000 D0713 05:18:04.031818 644066 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc000f88090 1 D0713 05:18:04.031848 644066 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:04.032069 644066 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.032183 644066 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc000f88090 2 D0713 05:18:04.032198 644066 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:04.034352 644066 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.034378 644066 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc000f88090 3 D0713 05:18:04.034388 644066 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:04.040771 644066 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.040796 644066 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc000f88090 4 D0713 05:18:04.040809 644066 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:04.041870 644066 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.041898 644066 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc000f88090 5 D0713 05:18:04.041913 644066 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:04.041976 644066 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.041986 644066 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc000f88090 6 D0713 05:18:04.041993 644066 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:04.042385 644066 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.042410 644066 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc000f88090 7 D0713 05:18:04.042419 644066 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:04.042624 644066 usertrap_amd64.go:212] [ 817: 818] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.042651 644066 usertrap_amd64.go:122] [ 817: 818] Allocate a new trap: 0xc000f88090 8 D0713 05:18:04.042664 644066 usertrap_amd64.go:225] [ 817: 818] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:04.042932 644066 usertrap_amd64.go:212] [ 817: 818] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.042956 644066 usertrap_amd64.go:122] [ 817: 818] Allocate a new trap: 0xc000f88090 9 D0713 05:18:04.043067 644066 usertrap_amd64.go:225] [ 817: 818] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:04.043124 644066 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.043146 644066 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc000f88090 10 D0713 05:18:04.043160 644066 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:04.051418 644066 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.051460 644066 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc000f88090 11 D0713 05:18:04.051471 644066 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:04.056032 644066 usertrap_amd64.go:212] [ 817: 818] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.056079 644066 usertrap_amd64.go:122] [ 817: 818] Allocate a new trap: 0xc000f88090 12 D0713 05:18:04.056098 644066 usertrap_amd64.go:225] [ 817: 818] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:04.056125 644066 usertrap_amd64.go:212] [ 817: 818] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.056133 644066 usertrap_amd64.go:122] [ 817: 818] Allocate a new trap: 0xc000f88090 13 D0713 05:18:04.056141 644066 usertrap_amd64.go:225] [ 817: 818] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:04.056186 644066 task_signals.go:470] [ 817: 817] Notified of signal 23 D0713 05:18:04.056256 644066 task_signals.go:220] [ 817: 817] Signal 23: delivering to handler I0713 05:18:04.063053 644066 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0713 05:18:04.063128 644066 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.063143 644066 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc000f88090 14 D0713 05:18:04.063157 644066 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:04.063238 644066 task_exit.go:204] [ 817: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.063277 644066 task_exit.go:204] [ 817: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.063280 644066 task_signals.go:204] [ 817: 818] Signal 817, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.063301 644066 task_signals.go:204] [ 817: 821] Signal 817, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.063311 644066 task_exit.go:204] [ 817: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.063308 644066 task_signals.go:204] [ 817: 820] Signal 817, PID: 820, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.063322 644066 task_exit.go:204] [ 817: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.063330 644066 task_exit.go:204] [ 817: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.063342 644066 task_signals.go:204] [ 817: 819] Signal 817, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.063345 644066 task_exit.go:204] [ 817: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.063374 644066 task_exit.go:204] [ 817: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.063394 644066 task_exit.go:204] [ 817: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.063407 644066 task_exit.go:204] [ 817: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.063426 644066 task_exit.go:204] [ 817: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.063433 644066 task_exit.go:204] [ 817: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.063447 644066 task_exit.go:204] [ 817: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.064803 644066 task_exit.go:204] [ 817: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.064841 644066 task_exit.go:204] [ 817: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.064858 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.064892 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.064904 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.066054 644066 task_exit.go:204] [ 817: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.066725 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.068331 644066 syscalls.go:262] [ 822: 822] Allocating stack with size of 8388608 bytes D0713 05:18:04.068465 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.069575 644066 usertrap_amd64.go:212] [ 822: 822] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.069617 644066 usertrap_amd64.go:106] [ 822: 822] Map a usertrap vma at 67000 D0713 05:18:04.069710 644066 usertrap_amd64.go:122] [ 822: 822] Allocate a new trap: 0xc001787d70 1 D0713 05:18:04.069738 644066 usertrap_amd64.go:225] [ 822: 822] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:04.070183 644066 usertrap_amd64.go:212] [ 822: 822] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.070218 644066 usertrap_amd64.go:122] [ 822: 822] Allocate a new trap: 0xc001787d70 2 D0713 05:18:04.070226 644066 usertrap_amd64.go:225] [ 822: 822] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:04.070931 644066 usertrap_amd64.go:212] [ 822: 822] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.070955 644066 usertrap_amd64.go:122] [ 822: 822] Allocate a new trap: 0xc001787d70 3 D0713 05:18:04.070967 644066 usertrap_amd64.go:225] [ 822: 822] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:04.077804 644066 usertrap_amd64.go:212] [ 822: 822] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.077849 644066 usertrap_amd64.go:122] [ 822: 822] Allocate a new trap: 0xc001787d70 4 D0713 05:18:04.077863 644066 usertrap_amd64.go:225] [ 822: 822] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:04.079625 644066 usertrap_amd64.go:212] [ 822: 822] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.079666 644066 usertrap_amd64.go:122] [ 822: 822] Allocate a new trap: 0xc001787d70 5 D0713 05:18:04.079683 644066 usertrap_amd64.go:225] [ 822: 822] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:04.079782 644066 usertrap_amd64.go:212] [ 822: 822] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.079865 644066 usertrap_amd64.go:122] [ 822: 822] Allocate a new trap: 0xc001787d70 6 D0713 05:18:04.079891 644066 usertrap_amd64.go:225] [ 822: 822] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:04.080143 644066 usertrap_amd64.go:212] [ 822: 822] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.080152 644066 usertrap_amd64.go:122] [ 822: 822] Allocate a new trap: 0xc001787d70 7 D0713 05:18:04.080158 644066 usertrap_amd64.go:225] [ 822: 822] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:04.080393 644066 usertrap_amd64.go:212] [ 822: 824] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.080420 644066 usertrap_amd64.go:122] [ 822: 824] Allocate a new trap: 0xc001787d70 8 D0713 05:18:04.080432 644066 usertrap_amd64.go:225] [ 822: 824] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:04.080646 644066 usertrap_amd64.go:212] [ 822: 822] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.080662 644066 usertrap_amd64.go:122] [ 822: 822] Allocate a new trap: 0xc001787d70 9 D0713 05:18:04.080672 644066 usertrap_amd64.go:225] [ 822: 822] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:04.080760 644066 usertrap_amd64.go:212] [ 822: 823] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.080825 644066 usertrap_amd64.go:122] [ 822: 823] Allocate a new trap: 0xc001787d70 10 D0713 05:18:04.080904 644066 usertrap_amd64.go:225] [ 822: 823] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:04.080981 644066 usertrap_amd64.go:212] [ 822: 825] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:04.080992 644066 usertrap_amd64.go:122] [ 822: 825] Allocate a new trap: 0xc001787d70 11 D0713 05:18:04.081001 644066 usertrap_amd64.go:225] [ 822: 825] Apply the binary patch addr 46b6e0 trap addr 67370 ([184 24 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:04.088409 644066 usertrap_amd64.go:212] [ 822: 822] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.088440 644066 usertrap_amd64.go:122] [ 822: 822] Allocate a new trap: 0xc001787d70 12 D0713 05:18:04.088454 644066 usertrap_amd64.go:225] [ 822: 822] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:04.091969 644066 usertrap_amd64.go:212] [ 822: 823] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.092013 644066 usertrap_amd64.go:122] [ 822: 823] Allocate a new trap: 0xc001787d70 13 D0713 05:18:04.092031 644066 usertrap_amd64.go:225] [ 822: 823] Apply the binary patch addr 46b020 trap addr 67410 ([184 39 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:04.092101 644066 usertrap_amd64.go:212] [ 822: 823] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.092116 644066 usertrap_amd64.go:122] [ 822: 823] Allocate a new trap: 0xc001787d70 14 D0713 05:18:04.092131 644066 usertrap_amd64.go:225] [ 822: 823] Apply the binary patch addr 46b04f trap addr 67460 ([184 234 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:04.092199 644066 task_signals.go:470] [ 822: 822] Notified of signal 23 D0713 05:18:04.092310 644066 task_signals.go:220] [ 822: 822] Signal 23: delivering to handler I0713 05:18:04.099775 644066 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0713 05:18:04.099960 644066 usertrap_amd64.go:212] [ 822: 822] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.099978 644066 usertrap_amd64.go:122] [ 822: 822] Allocate a new trap: 0xc001787d70 15 D0713 05:18:04.100000 644066 usertrap_amd64.go:225] [ 822: 822] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 05:18:04.100104 644066 task_exit.go:204] [ 822: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.100135 644066 task_exit.go:204] [ 822: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.100156 644066 task_signals.go:204] [ 822: 823] Signal 822, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.100173 644066 task_exit.go:204] [ 822: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.100182 644066 task_exit.go:204] [ 822: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.100188 644066 task_exit.go:204] [ 822: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.100182 644066 task_signals.go:204] [ 822: 826] Signal 822, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.100159 644066 task_signals.go:204] [ 822: 824] Signal 822, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.100201 644066 task_exit.go:204] [ 822: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.100207 644066 task_signals.go:204] [ 822: 825] Signal 822, PID: 825, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.100220 644066 task_exit.go:204] [ 822: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.100225 644066 task_exit.go:204] [ 822: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.100236 644066 task_exit.go:204] [ 822: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.100245 644066 task_exit.go:204] [ 822: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.100250 644066 task_exit.go:204] [ 822: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.100258 644066 task_exit.go:204] [ 822: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.102234 644066 task_exit.go:204] [ 822: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.102273 644066 task_exit.go:204] [ 822: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.102292 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.102692 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.102764 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.103363 644066 task_exit.go:204] [ 822: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.104089 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.106350 644066 syscalls.go:262] [ 827: 827] Allocating stack with size of 8388608 bytes D0713 05:18:04.106463 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.108196 644066 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.108253 644066 usertrap_amd64.go:106] [ 827: 827] Map a usertrap vma at 64000 D0713 05:18:04.108388 644066 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc000d65e30 1 D0713 05:18:04.108473 644066 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:04.109094 644066 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.109134 644066 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc000d65e30 2 D0713 05:18:04.109151 644066 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:04.110730 644066 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.110770 644066 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc000d65e30 3 D0713 05:18:04.110786 644066 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:04.119385 644066 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.119446 644066 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc000d65e30 4 D0713 05:18:04.119463 644066 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:04.120851 644066 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.120897 644066 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc000d65e30 5 D0713 05:18:04.120916 644066 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:04.120998 644066 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.121020 644066 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc000d65e30 6 D0713 05:18:04.121037 644066 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:04.121559 644066 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.121590 644066 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc000d65e30 7 D0713 05:18:04.121603 644066 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:04.121896 644066 usertrap_amd64.go:212] [ 827: 828] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.121924 644066 usertrap_amd64.go:122] [ 827: 828] Allocate a new trap: 0xc000d65e30 8 D0713 05:18:04.121940 644066 usertrap_amd64.go:225] [ 827: 828] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:04.122075 644066 usertrap_amd64.go:212] [ 827: 828] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.122099 644066 usertrap_amd64.go:122] [ 827: 828] Allocate a new trap: 0xc000d65e30 9 D0713 05:18:04.122109 644066 usertrap_amd64.go:225] [ 827: 828] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:04.122155 644066 usertrap_amd64.go:212] [ 827: 828] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.122165 644066 usertrap_amd64.go:122] [ 827: 828] Allocate a new trap: 0xc000d65e30 10 D0713 05:18:04.122173 644066 usertrap_amd64.go:225] [ 827: 828] Apply the binary patch addr 46b020 trap addr 64320 ([184 39 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:04.122766 644066 usertrap_amd64.go:212] [ 827: 828] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.122793 644066 usertrap_amd64.go:122] [ 827: 828] Allocate a new trap: 0xc000d65e30 11 D0713 05:18:04.122808 644066 usertrap_amd64.go:225] [ 827: 828] Apply the binary patch addr 46b04f trap addr 64370 ([184 234 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:04.122947 644066 usertrap_amd64.go:212] [ 827: 829] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.122970 644066 usertrap_amd64.go:122] [ 827: 829] Allocate a new trap: 0xc000d65e30 12 D0713 05:18:04.122980 644066 usertrap_amd64.go:225] [ 827: 829] Apply the binary patch addr 46b57c trap addr 643c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:04.122981 644066 task_signals.go:481] [ 827: 827] No task notified of signal 23 D0713 05:18:04.123045 644066 task_signals.go:220] [ 827: 827] Signal 23: delivering to handler D0713 05:18:04.131629 644066 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.131676 644066 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc000d65e30 13 D0713 05:18:04.131691 644066 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:04.133975 644066 task_signals.go:470] [ 827: 827] Notified of signal 23 D0713 05:18:04.134449 644066 task_signals.go:220] [ 827: 827] Signal 23: delivering to handler D0713 05:18:04.143766 644066 usertrap_amd64.go:212] [ 827: 827] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.143821 644066 usertrap_amd64.go:122] [ 827: 827] Allocate a new trap: 0xc000d65e30 14 D0713 05:18:04.143839 644066 usertrap_amd64.go:225] [ 827: 827] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:04.143920 644066 task_exit.go:204] [ 827: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.143967 644066 task_signals.go:204] [ 827: 829] Signal 827, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.143993 644066 task_exit.go:204] [ 827: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.144025 644066 task_signals.go:204] [ 827: 831] Signal 827, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.144033 644066 task_signals.go:204] [ 827: 828] Signal 827, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.144038 644066 task_exit.go:204] [ 827: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.144047 644066 task_exit.go:204] [ 827: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.144040 644066 task_signals.go:204] [ 827: 830] Signal 827, PID: 830, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.144059 644066 task_exit.go:204] [ 827: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.144065 644066 task_exit.go:204] [ 827: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.144083 644066 task_exit.go:204] [ 827: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.144089 644066 task_exit.go:204] [ 827: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.144098 644066 task_exit.go:204] [ 827: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.144116 644066 task_exit.go:204] [ 827: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.144122 644066 task_exit.go:204] [ 827: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.144132 644066 task_exit.go:204] [ 827: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.145531 644066 task_exit.go:204] [ 827: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.145564 644066 task_exit.go:204] [ 827: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.145581 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.145647 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.145685 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.145894 644066 task_exit.go:204] [ 827: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.146413 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.147814 644066 syscalls.go:262] [ 832: 832] Allocating stack with size of 8388608 bytes D0713 05:18:04.147924 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.148766 644066 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.148805 644066 usertrap_amd64.go:106] [ 832: 832] Map a usertrap vma at 66000 D0713 05:18:04.148901 644066 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc0012171a0 1 D0713 05:18:04.148932 644066 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:04.149594 644066 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.149663 644066 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc0012171a0 2 D0713 05:18:04.149685 644066 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:04.150305 644066 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.150334 644066 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc0012171a0 3 D0713 05:18:04.150347 644066 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:04.156243 644066 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.156277 644066 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc0012171a0 4 D0713 05:18:04.156293 644066 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:04.157524 644066 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.157554 644066 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc0012171a0 5 D0713 05:18:04.157568 644066 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:04.157615 644066 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.157625 644066 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc0012171a0 6 D0713 05:18:04.157633 644066 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:04.157873 644066 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.157903 644066 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc0012171a0 7 D0713 05:18:04.157912 644066 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:04.158093 644066 usertrap_amd64.go:212] [ 832: 833] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.158114 644066 usertrap_amd64.go:122] [ 832: 833] Allocate a new trap: 0xc0012171a0 8 D0713 05:18:04.158122 644066 usertrap_amd64.go:225] [ 832: 833] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:04.158221 644066 usertrap_amd64.go:212] [ 832: 833] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.158241 644066 usertrap_amd64.go:122] [ 832: 833] Allocate a new trap: 0xc0012171a0 9 D0713 05:18:04.158250 644066 usertrap_amd64.go:225] [ 832: 833] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:04.158465 644066 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.158489 644066 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc0012171a0 10 D0713 05:18:04.158499 644066 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:04.158537 644066 usertrap_amd64.go:212] [ 832: 835] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:04.158562 644066 usertrap_amd64.go:122] [ 832: 835] Allocate a new trap: 0xc0012171a0 11 D0713 05:18:04.158575 644066 usertrap_amd64.go:225] [ 832: 835] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:04.167595 644066 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.167648 644066 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc0012171a0 12 D0713 05:18:04.167667 644066 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:04.170441 644066 usertrap_amd64.go:212] [ 832: 833] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.170496 644066 usertrap_amd64.go:122] [ 832: 833] Allocate a new trap: 0xc0012171a0 13 D0713 05:18:04.170515 644066 usertrap_amd64.go:225] [ 832: 833] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:04.170539 644066 usertrap_amd64.go:212] [ 832: 833] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.170546 644066 usertrap_amd64.go:122] [ 832: 833] Allocate a new trap: 0xc0012171a0 14 D0713 05:18:04.170554 644066 usertrap_amd64.go:225] [ 832: 833] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:04.170570 644066 task_signals.go:470] [ 832: 832] Notified of signal 23 D0713 05:18:04.170651 644066 task_signals.go:220] [ 832: 832] Signal 23: delivering to handler I0713 05:18:04.182179 644066 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0713 05:18:04.182337 644066 usertrap_amd64.go:212] [ 832: 832] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.182357 644066 usertrap_amd64.go:122] [ 832: 832] Allocate a new trap: 0xc0012171a0 15 D0713 05:18:04.182384 644066 usertrap_amd64.go:225] [ 832: 832] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:18:04.182681 644066 task_signals.go:470] [ 832: 832] Notified of signal 23 D0713 05:18:04.182733 644066 task_exit.go:204] [ 832: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.182759 644066 task_signals.go:204] [ 832: 833] Signal 832, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.182784 644066 task_signals.go:204] [ 832: 835] Signal 832, PID: 835, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.182828 644066 task_signals.go:204] [ 832: 836] Signal 832, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.182850 644066 task_signals.go:204] [ 832: 837] Signal 832, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.182869 644066 task_signals.go:204] [ 832: 834] Signal 832, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.182885 644066 task_exit.go:204] [ 832: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.182917 644066 task_exit.go:204] [ 832: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.182929 644066 task_exit.go:204] [ 832: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.182936 644066 task_exit.go:204] [ 832: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.182949 644066 task_exit.go:204] [ 832: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.182970 644066 task_exit.go:204] [ 832: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.182976 644066 task_exit.go:204] [ 832: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.182986 644066 task_exit.go:204] [ 832: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.182993 644066 task_exit.go:204] [ 832: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.182998 644066 task_exit.go:204] [ 832: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.183008 644066 task_exit.go:204] [ 832: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.183019 644066 task_exit.go:204] [ 832: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.183031 644066 task_exit.go:204] [ 832: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.183041 644066 task_exit.go:204] [ 832: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.184535 644066 task_exit.go:204] [ 832: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.184610 644066 task_exit.go:204] [ 832: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.184642 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.184700 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.184718 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.184793 644066 task_exit.go:204] [ 832: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.185923 644066 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.187820 644066 syscalls.go:262] [ 838: 838] Allocating stack with size of 8388608 bytes D0713 05:18:04.187951 644066 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.189141 644066 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.189209 644066 usertrap_amd64.go:106] [ 838: 838] Map a usertrap vma at 68000 D0713 05:18:04.189285 644066 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f88960 1 D0713 05:18:04.189317 644066 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:04.189742 644066 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.189777 644066 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f88960 2 D0713 05:18:04.189789 644066 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:04.191257 644066 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.191293 644066 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f88960 3 D0713 05:18:04.191310 644066 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:04.199880 644066 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.199946 644066 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f88960 4 D0713 05:18:04.199970 644066 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:04.201333 644066 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.201512 644066 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f88960 5 D0713 05:18:04.201549 644066 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:04.201872 644066 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.201897 644066 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f88960 6 D0713 05:18:04.201909 644066 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:04.202130 644066 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.202150 644066 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f88960 7 D0713 05:18:04.202159 644066 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:04.202399 644066 usertrap_amd64.go:212] [ 838: 839] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.202419 644066 usertrap_amd64.go:122] [ 838: 839] Allocate a new trap: 0xc000f88960 8 D0713 05:18:04.202430 644066 usertrap_amd64.go:225] [ 838: 839] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:04.202680 644066 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.202706 644066 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f88960 9 D0713 05:18:04.202717 644066 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:04.202809 644066 usertrap_amd64.go:212] [ 838: 839] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.202840 644066 usertrap_amd64.go:122] [ 838: 839] Allocate a new trap: 0xc000f88960 10 D0713 05:18:04.202850 644066 usertrap_amd64.go:225] [ 838: 839] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:04.211384 644066 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.211421 644066 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f88960 11 D0713 05:18:04.211446 644066 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:04.217413 644066 usertrap_amd64.go:212] [ 838: 839] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.217462 644066 usertrap_amd64.go:122] [ 838: 839] Allocate a new trap: 0xc000f88960 12 D0713 05:18:04.217480 644066 usertrap_amd64.go:225] [ 838: 839] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:04.217543 644066 usertrap_amd64.go:212] [ 838: 839] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.217563 644066 usertrap_amd64.go:122] [ 838: 839] Allocate a new trap: 0xc000f88960 13 D0713 05:18:04.217572 644066 usertrap_amd64.go:225] [ 838: 839] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:04.218864 644066 task_signals.go:470] [ 838: 838] Notified of signal 23 D0713 05:18:04.219185 644066 task_signals.go:220] [ 838: 838] Signal 23: delivering to handler I0713 05:18:04.226490 644066 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0713 05:18:04.226736 644066 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.226759 644066 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc000f88960 14 D0713 05:18:04.226775 644066 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:04.226812 644066 task_exit.go:204] [ 838: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.226841 644066 task_exit.go:204] [ 838: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.226844 644066 task_signals.go:204] [ 838: 839] Signal 838, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.226863 644066 task_exit.go:204] [ 838: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.226864 644066 task_signals.go:204] [ 838: 841] Signal 838, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.226877 644066 task_signals.go:204] [ 838: 840] Signal 838, PID: 840, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.226886 644066 task_exit.go:204] [ 838: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.226896 644066 task_exit.go:204] [ 838: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.226910 644066 task_signals.go:204] [ 838: 842] Signal 838, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.226918 644066 task_exit.go:204] [ 838: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.226925 644066 task_exit.go:204] [ 838: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.226931 644066 task_exit.go:204] [ 838: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.226942 644066 task_exit.go:204] [ 838: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.226951 644066 task_exit.go:204] [ 838: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.226956 644066 task_exit.go:204] [ 838: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.226966 644066 task_exit.go:204] [ 838: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.228328 644066 task_exit.go:204] [ 838: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.228365 644066 task_exit.go:204] [ 838: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.228384 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.228476 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.228505 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.228648 644066 task_exit.go:204] [ 838: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.229341 644066 task_stop.go:118] [ 6: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.230639 644066 syscalls.go:262] [ 843: 843] Allocating stack with size of 8388608 bytes D0713 05:18:04.230739 644066 task_stop.go:138] [ 6: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.231924 644066 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.231969 644066 usertrap_amd64.go:106] [ 843: 843] Map a usertrap vma at 6a000 D0713 05:18:04.232040 644066 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0012175f0 1 D0713 05:18:04.232070 644066 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:04.232570 644066 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.232595 644066 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0012175f0 2 D0713 05:18:04.232606 644066 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:04.233550 644066 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.233581 644066 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0012175f0 3 D0713 05:18:04.233593 644066 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:04.242049 644066 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.242162 644066 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0012175f0 4 D0713 05:18:04.242237 644066 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:04.245184 644066 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.245256 644066 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0012175f0 5 D0713 05:18:04.245280 644066 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:04.245347 644066 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.245367 644066 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0012175f0 6 D0713 05:18:04.245376 644066 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:04.245849 644066 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.245866 644066 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0012175f0 7 D0713 05:18:04.245873 644066 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:04.246048 644066 usertrap_amd64.go:212] [ 843: 844] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.246078 644066 usertrap_amd64.go:122] [ 843: 844] Allocate a new trap: 0xc0012175f0 8 D0713 05:18:04.246088 644066 usertrap_amd64.go:225] [ 843: 844] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:04.246343 644066 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.246359 644066 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0012175f0 9 D0713 05:18:04.246368 644066 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:04.246380 644066 usertrap_amd64.go:212] [ 843: 844] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.246388 644066 usertrap_amd64.go:122] [ 843: 844] Allocate a new trap: 0xc0012175f0 10 D0713 05:18:04.246395 644066 usertrap_amd64.go:225] [ 843: 844] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:04.255562 644066 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.255610 644066 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0012175f0 11 D0713 05:18:04.255627 644066 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:04.258635 644066 usertrap_amd64.go:212] [ 843: 844] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.258678 644066 usertrap_amd64.go:122] [ 843: 844] Allocate a new trap: 0xc0012175f0 12 D0713 05:18:04.258697 644066 usertrap_amd64.go:225] [ 843: 844] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:04.258754 644066 usertrap_amd64.go:212] [ 843: 844] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.258771 644066 usertrap_amd64.go:122] [ 843: 844] Allocate a new trap: 0xc0012175f0 13 D0713 05:18:04.258783 644066 usertrap_amd64.go:225] [ 843: 844] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:04.259159 644066 task_signals.go:470] [ 843: 843] Notified of signal 23 D0713 05:18:04.259248 644066 task_signals.go:220] [ 843: 843] Signal 23: delivering to handler D0713 05:18:04.268077 644066 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.268137 644066 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0012175f0 14 D0713 05:18:04.268152 644066 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:04.268223 644066 task_exit.go:204] [ 843: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.268263 644066 task_exit.go:204] [ 843: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.268317 644066 task_signals.go:204] [ 843: 844] Signal 843, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.268348 644066 task_exit.go:204] [ 843: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.268355 644066 task_exit.go:204] [ 843: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.268359 644066 task_exit.go:204] [ 843: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.268380 644066 task_signals.go:204] [ 843: 845] Signal 843, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.268390 644066 task_exit.go:204] [ 843: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.268395 644066 task_exit.go:204] [ 843: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.268399 644066 task_exit.go:204] [ 843: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.268410 644066 task_signals.go:204] [ 843: 846] Signal 843, PID: 846, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.268422 644066 task_exit.go:204] [ 843: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.268426 644066 task_exit.go:204] [ 843: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.268430 644066 task_exit.go:204] [ 843: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.268447 644066 task_signals.go:204] [ 843: 847] Signal 843, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.268465 644066 task_exit.go:204] [ 843: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.268469 644066 task_exit.go:204] [ 843: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.268473 644066 task_exit.go:204] [ 843: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.268486 644066 task_signals.go:204] [ 843: 848] Signal 843, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.268493 644066 task_exit.go:204] [ 843: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.269837 644066 task_exit.go:204] [ 843: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.269883 644066 task_exit.go:204] [ 843: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.269905 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.269967 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.270000 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.270056 644066 task_exit.go:204] [ 843: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.270749 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.272133 644066 syscalls.go:262] [ 849: 849] Allocating stack with size of 8388608 bytes D0713 05:18:04.272289 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.272814 644066 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.272856 644066 usertrap_amd64.go:106] [ 849: 849] Map a usertrap vma at 61000 D0713 05:18:04.272912 644066 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001316e10 1 D0713 05:18:04.273000 644066 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:04.273333 644066 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.273354 644066 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001316e10 2 D0713 05:18:04.273364 644066 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:04.273687 644066 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.273705 644066 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001316e10 3 D0713 05:18:04.273711 644066 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:04.278841 644066 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.278875 644066 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001316e10 4 D0713 05:18:04.278889 644066 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:04.279898 644066 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.279946 644066 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001316e10 5 D0713 05:18:04.279957 644066 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:04.280014 644066 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.280030 644066 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001316e10 6 D0713 05:18:04.280037 644066 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:04.280202 644066 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.280223 644066 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001316e10 7 D0713 05:18:04.280228 644066 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:04.280331 644066 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.280352 644066 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc001316e10 8 D0713 05:18:04.280360 644066 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:04.280586 644066 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.280602 644066 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc001316e10 9 D0713 05:18:04.280613 644066 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:04.280678 644066 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.280694 644066 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001316e10 10 D0713 05:18:04.280704 644066 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:04.290261 644066 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.290317 644066 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001316e10 11 D0713 05:18:04.290334 644066 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:04.293399 644066 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.293479 644066 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc001316e10 12 D0713 05:18:04.293500 644066 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:04.293573 644066 usertrap_amd64.go:212] [ 849: 850] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.293594 644066 usertrap_amd64.go:122] [ 849: 850] Allocate a new trap: 0xc001316e10 13 D0713 05:18:04.293603 644066 usertrap_amd64.go:225] [ 849: 850] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:04.293715 644066 task_signals.go:470] [ 849: 849] Notified of signal 23 D0713 05:18:04.293864 644066 task_signals.go:220] [ 849: 849] Signal 23: delivering to handler I0713 05:18:04.302583 644066 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0713 05:18:04.302741 644066 usertrap_amd64.go:212] [ 849: 849] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.302774 644066 usertrap_amd64.go:122] [ 849: 849] Allocate a new trap: 0xc001316e10 14 D0713 05:18:04.302793 644066 usertrap_amd64.go:225] [ 849: 849] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:04.302921 644066 task_exit.go:204] [ 849: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.302965 644066 task_exit.go:204] [ 849: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.302990 644066 task_signals.go:204] [ 849: 850] Signal 849, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.303033 644066 task_signals.go:204] [ 849: 853] Signal 849, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.303051 644066 task_signals.go:204] [ 849: 851] Signal 849, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.303011 644066 task_signals.go:204] [ 849: 852] Signal 849, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.303056 644066 task_exit.go:204] [ 849: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.303081 644066 task_exit.go:204] [ 849: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.303123 644066 task_exit.go:204] [ 849: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.303131 644066 task_exit.go:204] [ 849: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.303160 644066 task_exit.go:204] [ 849: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.303168 644066 task_exit.go:204] [ 849: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.303173 644066 task_exit.go:204] [ 849: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.303188 644066 task_exit.go:204] [ 849: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.303328 644066 task_exit.go:204] [ 849: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.303374 644066 task_exit.go:204] [ 849: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.304453 644066 task_exit.go:204] [ 849: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.304500 644066 task_exit.go:204] [ 849: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.304529 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.304571 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.304669 644066 task_exit.go:204] [ 849: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.305356 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.306984 644066 syscalls.go:262] [ 854: 854] Allocating stack with size of 8388608 bytes D0713 05:18:04.307179 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.308828 644066 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.309021 644066 usertrap_amd64.go:106] [ 854: 854] Map a usertrap vma at 61000 D0713 05:18:04.309147 644066 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc001316ff0 1 D0713 05:18:04.309179 644066 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:04.309525 644066 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.309547 644066 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc001316ff0 2 D0713 05:18:04.309557 644066 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:04.309981 644066 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.310001 644066 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc001316ff0 3 D0713 05:18:04.310009 644066 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:04.315939 644066 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.315969 644066 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc001316ff0 4 D0713 05:18:04.315979 644066 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:04.317004 644066 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.317028 644066 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc001316ff0 5 D0713 05:18:04.317039 644066 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:04.317077 644066 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.317085 644066 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc001316ff0 6 D0713 05:18:04.317093 644066 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:04.317648 644066 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.317681 644066 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc001316ff0 7 D0713 05:18:04.317694 644066 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:04.317869 644066 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.317889 644066 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc001316ff0 8 D0713 05:18:04.317896 644066 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:04.318067 644066 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.318112 644066 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc001316ff0 9 D0713 05:18:04.318123 644066 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:04.318135 644066 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.318143 644066 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc001316ff0 10 D0713 05:18:04.318151 644066 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:04.326380 644066 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.326417 644066 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc001316ff0 11 D0713 05:18:04.326428 644066 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:04.329005 644066 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.329024 644066 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc001316ff0 12 D0713 05:18:04.329035 644066 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:04.329050 644066 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.329056 644066 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc001316ff0 13 D0713 05:18:04.329062 644066 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:04.329083 644066 task_signals.go:470] [ 854: 854] Notified of signal 23 D0713 05:18:04.329121 644066 task_signals.go:220] [ 854: 854] Signal 23: delivering to handler I0713 05:18:04.337718 644066 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0713 05:18:04.337823 644066 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.337838 644066 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc001316ff0 14 D0713 05:18:04.337851 644066 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:04.337935 644066 task_exit.go:204] [ 854: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.337974 644066 task_exit.go:204] [ 854: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.337988 644066 task_signals.go:204] [ 854: 855] Signal 854, PID: 855, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.338003 644066 task_signals.go:204] [ 854: 857] Signal 854, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.338017 644066 task_exit.go:204] [ 854: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.338032 644066 task_signals.go:204] [ 854: 856] Signal 854, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.338031 644066 task_signals.go:204] [ 854: 858] Signal 854, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.338047 644066 task_exit.go:204] [ 854: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.338054 644066 task_exit.go:204] [ 854: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.338060 644066 task_exit.go:204] [ 854: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.338078 644066 task_exit.go:204] [ 854: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.338088 644066 task_exit.go:204] [ 854: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.338093 644066 task_exit.go:204] [ 854: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.338102 644066 task_exit.go:204] [ 854: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.338148 644066 task_exit.go:204] [ 854: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.338170 644066 task_exit.go:204] [ 854: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.339642 644066 task_exit.go:204] [ 854: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.339658 644066 task_exit.go:204] [ 854: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.339706 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.339736 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:04.339752 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.339901 644066 task_exit.go:204] [ 854: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.340642 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.342563 644066 syscalls.go:262] [ 859: 859] Allocating stack with size of 8388608 bytes D0713 05:18:04.342693 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.343641 644066 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.343676 644066 usertrap_amd64.go:106] [ 859: 859] Map a usertrap vma at 65000 D0713 05:18:04.343778 644066 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc001317140 1 D0713 05:18:04.343806 644066 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:04.344095 644066 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.344116 644066 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc001317140 2 D0713 05:18:04.344126 644066 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:04.344577 644066 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.344595 644066 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc001317140 3 D0713 05:18:04.344601 644066 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:04.350917 644066 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.350960 644066 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc001317140 4 D0713 05:18:04.350973 644066 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:04.352188 644066 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.352218 644066 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc001317140 5 D0713 05:18:04.352231 644066 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:04.352305 644066 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.352320 644066 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc001317140 6 D0713 05:18:04.352328 644066 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:04.352767 644066 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.352792 644066 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc001317140 7 D0713 05:18:04.352800 644066 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:04.353019 644066 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.353042 644066 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc001317140 8 D0713 05:18:04.353050 644066 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:04.353278 644066 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.353300 644066 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc001317140 9 D0713 05:18:04.353312 644066 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:04.353506 644066 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.353581 644066 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc001317140 10 D0713 05:18:04.353635 644066 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:04.362550 644066 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.362585 644066 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc001317140 11 D0713 05:18:04.362599 644066 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:04.365226 644066 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.365333 644066 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc001317140 12 D0713 05:18:04.365364 644066 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:04.365570 644066 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.365666 644066 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc001317140 13 D0713 05:18:04.365685 644066 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:04.365759 644066 task_signals.go:470] [ 859: 859] Notified of signal 23 D0713 05:18:04.365862 644066 task_signals.go:220] [ 859: 859] Signal 23: delivering to handler D0713 05:18:04.373489 644066 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.373531 644066 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc001317140 14 D0713 05:18:04.373546 644066 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:04.373691 644066 task_exit.go:204] [ 859: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.373750 644066 task_exit.go:204] [ 859: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.373777 644066 task_signals.go:204] [ 859: 861] Signal 859, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.373785 644066 task_signals.go:204] [ 859: 863] Signal 859, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.373802 644066 task_exit.go:204] [ 859: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.373816 644066 task_exit.go:204] [ 859: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.373823 644066 task_exit.go:204] [ 859: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.373842 644066 task_signals.go:204] [ 859: 860] Signal 859, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.373866 644066 task_exit.go:204] [ 859: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.373877 644066 task_signals.go:204] [ 859: 862] Signal 859, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.373887 644066 task_exit.go:204] [ 859: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.373893 644066 task_exit.go:204] [ 859: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.373905 644066 task_exit.go:204] [ 859: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.373913 644066 task_exit.go:204] [ 859: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.374235 644066 task_exit.go:204] [ 859: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.374263 644066 task_exit.go:204] [ 859: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.375506 644066 task_exit.go:204] [ 859: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.375528 644066 task_exit.go:204] [ 859: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.375547 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.375593 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:04.375620 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.375730 644066 task_exit.go:204] [ 859: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.376157 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.377582 644066 syscalls.go:262] [ 864: 864] Allocating stack with size of 8388608 bytes D0713 05:18:04.377680 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.379706 644066 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.379745 644066 usertrap_amd64.go:106] [ 864: 864] Map a usertrap vma at 60000 D0713 05:18:04.379955 644066 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc001d234a0 1 D0713 05:18:04.379993 644066 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:04.380663 644066 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.380777 644066 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc001d234a0 2 D0713 05:18:04.380801 644066 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:04.381332 644066 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.381353 644066 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc001d234a0 3 D0713 05:18:04.381362 644066 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:04.387875 644066 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.387914 644066 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc001d234a0 4 D0713 05:18:04.387928 644066 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:04.389120 644066 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.389150 644066 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc001d234a0 5 D0713 05:18:04.389164 644066 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:04.389219 644066 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.389232 644066 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc001d234a0 6 D0713 05:18:04.389240 644066 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:04.389453 644066 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.389470 644066 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc001d234a0 7 D0713 05:18:04.389478 644066 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:04.389707 644066 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.389738 644066 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc001d234a0 8 D0713 05:18:04.389752 644066 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:04.389958 644066 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.389985 644066 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc001d234a0 9 D0713 05:18:04.389997 644066 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:04.390140 644066 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.390154 644066 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc001d234a0 10 D0713 05:18:04.390163 644066 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:04.390224 644066 usertrap_amd64.go:212] [ 864: 867] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:04.390234 644066 usertrap_amd64.go:122] [ 864: 867] Allocate a new trap: 0xc001d234a0 11 D0713 05:18:04.390240 644066 usertrap_amd64.go:225] [ 864: 867] Apply the binary patch addr 46b6e0 trap addr 60370 ([184 24 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:04.390688 644066 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.390706 644066 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc001d234a0 12 D0713 05:18:04.390716 644066 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:04.390735 644066 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.390748 644066 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc001d234a0 13 D0713 05:18:04.390757 644066 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:04.390772 644066 task_signals.go:470] [ 864: 864] Notified of signal 23 D0713 05:18:04.390831 644066 task_signals.go:220] [ 864: 864] Signal 23: delivering to handler D0713 05:18:04.397322 644066 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.397360 644066 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc001d234a0 14 D0713 05:18:04.397373 644066 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46af29 trap addr 60460 ([184 37 1 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:04.401094 644066 task_signals.go:470] [ 864: 864] Notified of signal 23 D0713 05:18:04.401224 644066 task_signals.go:220] [ 864: 864] Signal 23: delivering to handler D0713 05:18:04.407723 644066 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.407765 644066 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc001d234a0 15 D0713 05:18:04.407781 644066 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 05:18:04.407901 644066 task_exit.go:204] [ 864: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.407938 644066 task_exit.go:204] [ 864: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.407942 644066 task_signals.go:204] [ 864: 866] Signal 864, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.407963 644066 task_signals.go:204] [ 864: 868] Signal 864, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.407965 644066 task_signals.go:204] [ 864: 867] Signal 864, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.407970 644066 task_exit.go:204] [ 864: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.407988 644066 task_exit.go:204] [ 864: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.407995 644066 task_exit.go:204] [ 864: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.408010 644066 task_exit.go:204] [ 864: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.408049 644066 task_signals.go:204] [ 864: 865] Signal 864, PID: 865, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.408066 644066 task_exit.go:204] [ 864: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.408081 644066 task_exit.go:204] [ 864: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.408093 644066 task_exit.go:204] [ 864: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.408100 644066 task_exit.go:204] [ 864: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.408106 644066 task_exit.go:204] [ 864: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.408114 644066 task_exit.go:204] [ 864: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.409447 644066 task_exit.go:204] [ 864: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.409480 644066 task_exit.go:204] [ 864: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.409500 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.409528 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:04.409536 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.409815 644066 task_exit.go:204] [ 864: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.409881 644066 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 05:18:04.409916 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 23 D0713 05:18:04.409936 644066 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 05:18:04.410417 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.411889 644066 syscalls.go:262] [ 869: 869] Allocating stack with size of 8388608 bytes D0713 05:18:04.411996 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.412581 644066 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.412636 644066 usertrap_amd64.go:106] [ 869: 869] Map a usertrap vma at 60000 D0713 05:18:04.412704 644066 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000f896b0 1 D0713 05:18:04.412729 644066 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:04.412925 644066 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.412971 644066 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000f896b0 2 D0713 05:18:04.412982 644066 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:04.414527 644066 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.414551 644066 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000f896b0 3 D0713 05:18:04.414558 644066 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:04.420110 644066 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.420189 644066 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000f896b0 4 D0713 05:18:04.420243 644066 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:04.421324 644066 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.421390 644066 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000f896b0 5 D0713 05:18:04.421409 644066 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:04.421465 644066 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.421474 644066 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000f896b0 6 D0713 05:18:04.421483 644066 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:04.421694 644066 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.421714 644066 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000f896b0 7 D0713 05:18:04.421722 644066 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:04.422119 644066 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.422187 644066 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc000f896b0 8 D0713 05:18:04.422252 644066 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:04.422325 644066 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.422346 644066 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000f896b0 9 D0713 05:18:04.422392 644066 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:04.422448 644066 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.422458 644066 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc000f896b0 10 D0713 05:18:04.422466 644066 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:04.423048 644066 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.423110 644066 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc000f896b0 11 D0713 05:18:04.423170 644066 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:04.423302 644066 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.423357 644066 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc000f896b0 12 D0713 05:18:04.423403 644066 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:04.423521 644066 task_signals.go:470] [ 869: 869] Notified of signal 23 D0713 05:18:04.423611 644066 task_signals.go:220] [ 869: 869] Signal 23: delivering to handler D0713 05:18:04.430216 644066 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.430246 644066 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000f896b0 13 D0713 05:18:04.430257 644066 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:04.434726 644066 task_signals.go:470] [ 869: 869] Notified of signal 23 D0713 05:18:04.434830 644066 task_signals.go:220] [ 869: 869] Signal 23: delivering to handler D0713 05:18:04.434949 644066 task_signals.go:470] [ 869: 869] Notified of signal 23 D0713 05:18:04.434989 644066 task_signals.go:179] [ 869: 869] Restarting syscall 202: interrupted by signal 23 D0713 05:18:04.435005 644066 task_signals.go:220] [ 869: 869] Signal 23: delivering to handler D0713 05:18:04.441349 644066 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.441378 644066 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc000f896b0 14 D0713 05:18:04.441391 644066 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:04.441445 644066 task_exit.go:204] [ 869: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.441459 644066 task_exit.go:204] [ 869: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.441477 644066 task_signals.go:204] [ 869: 872] Signal 869, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.441500 644066 task_exit.go:204] [ 869: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.441495 644066 task_signals.go:204] [ 869: 873] Signal 869, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.441507 644066 task_signals.go:204] [ 869: 870] Signal 869, PID: 870, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.441477 644066 task_signals.go:204] [ 869: 871] Signal 869, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.441519 644066 task_exit.go:204] [ 869: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.441540 644066 task_signals.go:204] [ 869: 874] Signal 869, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.441552 644066 task_exit.go:204] [ 869: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.441562 644066 task_exit.go:204] [ 869: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.441569 644066 task_exit.go:204] [ 869: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.441583 644066 task_exit.go:204] [ 869: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.441598 644066 task_exit.go:204] [ 869: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.441605 644066 task_exit.go:204] [ 869: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.441610 644066 task_exit.go:204] [ 869: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.441618 644066 task_exit.go:204] [ 869: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.441622 644066 task_exit.go:204] [ 869: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.441626 644066 task_exit.go:204] [ 869: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.441632 644066 task_exit.go:204] [ 869: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.442908 644066 task_exit.go:204] [ 869: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.442943 644066 task_exit.go:204] [ 869: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.442958 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.442993 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.443005 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.443089 644066 task_exit.go:204] [ 869: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.443732 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.445074 644066 syscalls.go:262] [ 875: 875] Allocating stack with size of 8388608 bytes D0713 05:18:04.445166 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.446101 644066 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.446136 644066 usertrap_amd64.go:106] [ 875: 875] Map a usertrap vma at 67000 D0713 05:18:04.446193 644066 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001d236e0 1 D0713 05:18:04.446223 644066 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:04.446522 644066 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.446550 644066 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001d236e0 2 D0713 05:18:04.446561 644066 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:04.447067 644066 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.447092 644066 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001d236e0 3 D0713 05:18:04.447103 644066 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:04.453794 644066 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.453827 644066 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001d236e0 4 D0713 05:18:04.453837 644066 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:04.454928 644066 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.454954 644066 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001d236e0 5 D0713 05:18:04.454965 644066 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:04.455012 644066 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.455021 644066 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001d236e0 6 D0713 05:18:04.455027 644066 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:04.455197 644066 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.455208 644066 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001d236e0 7 D0713 05:18:04.455216 644066 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:04.455340 644066 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.455349 644066 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc001d236e0 8 D0713 05:18:04.455357 644066 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:04.456188 644066 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.456213 644066 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001d236e0 9 D0713 05:18:04.456222 644066 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:04.456299 644066 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.456326 644066 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc001d236e0 10 D0713 05:18:04.456516 644066 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:04.465208 644066 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.465250 644066 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001d236e0 11 D0713 05:18:04.465266 644066 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:04.467960 644066 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.467994 644066 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc001d236e0 12 D0713 05:18:04.468012 644066 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:04.468059 644066 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.468070 644066 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc001d236e0 13 D0713 05:18:04.468079 644066 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:04.468095 644066 task_signals.go:470] [ 875: 875] Notified of signal 23 D0713 05:18:04.468141 644066 task_signals.go:220] [ 875: 875] Signal 23: delivering to handler D0713 05:18:04.478279 644066 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.478319 644066 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001d236e0 14 D0713 05:18:04.478331 644066 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:04.478396 644066 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.478430 644066 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.478480 644066 task_signals.go:204] [ 875: 876] Signal 875, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.478510 644066 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.478519 644066 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.478526 644066 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.478551 644066 task_signals.go:204] [ 875: 877] Signal 875, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.478570 644066 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.478579 644066 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.478585 644066 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.478604 644066 task_signals.go:204] [ 875: 878] Signal 875, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.478618 644066 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.478626 644066 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.478640 644066 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.478655 644066 task_signals.go:204] [ 875: 879] Signal 875, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.478665 644066 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.479993 644066 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.480019 644066 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.480040 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.480089 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.480106 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.480245 644066 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.481055 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.482776 644066 syscalls.go:262] [ 880: 880] Allocating stack with size of 8388608 bytes D0713 05:18:04.482876 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.484018 644066 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.484059 644066 usertrap_amd64.go:106] [ 880: 880] Map a usertrap vma at 66000 D0713 05:18:04.484188 644066 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc001317440 1 D0713 05:18:04.484217 644066 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:04.484548 644066 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.484566 644066 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc001317440 2 D0713 05:18:04.484574 644066 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:04.485370 644066 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.485434 644066 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc001317440 3 D0713 05:18:04.485451 644066 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:04.492307 644066 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.492356 644066 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc001317440 4 D0713 05:18:04.492371 644066 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:04.493662 644066 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.493698 644066 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc001317440 5 D0713 05:18:04.493714 644066 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:04.493963 644066 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.493980 644066 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc001317440 6 D0713 05:18:04.493992 644066 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:04.494302 644066 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.494325 644066 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc001317440 7 D0713 05:18:04.494334 644066 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:04.494507 644066 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.494562 644066 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc001317440 8 D0713 05:18:04.494629 644066 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:04.494973 644066 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.494996 644066 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc001317440 9 D0713 05:18:04.495006 644066 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:04.495045 644066 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.495056 644066 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc001317440 10 D0713 05:18:04.495064 644066 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:04.503075 644066 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.503115 644066 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc001317440 11 D0713 05:18:04.503129 644066 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:04.506066 644066 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.506132 644066 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc001317440 12 D0713 05:18:04.506148 644066 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:04.506218 644066 usertrap_amd64.go:212] [ 880: 881] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.506227 644066 usertrap_amd64.go:122] [ 880: 881] Allocate a new trap: 0xc001317440 13 D0713 05:18:04.506236 644066 usertrap_amd64.go:225] [ 880: 881] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:04.506264 644066 task_signals.go:470] [ 880: 880] Notified of signal 23 D0713 05:18:04.506403 644066 task_signals.go:220] [ 880: 880] Signal 23: delivering to handler D0713 05:18:04.514506 644066 usertrap_amd64.go:212] [ 880: 880] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.514567 644066 usertrap_amd64.go:122] [ 880: 880] Allocate a new trap: 0xc001317440 14 D0713 05:18:04.514585 644066 usertrap_amd64.go:225] [ 880: 880] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:04.514730 644066 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.514843 644066 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.514896 644066 task_signals.go:204] [ 880: 882] Signal 880, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.514915 644066 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.514925 644066 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.514931 644066 task_exit.go:204] [ 880: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.514952 644066 task_signals.go:204] [ 880: 881] Signal 880, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.514963 644066 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.514971 644066 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.514976 644066 task_exit.go:204] [ 880: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.514992 644066 task_signals.go:204] [ 880: 883] Signal 880, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.515003 644066 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.515010 644066 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.515026 644066 task_exit.go:204] [ 880: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.515041 644066 task_signals.go:204] [ 880: 884] Signal 880, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.515063 644066 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.516559 644066 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.516645 644066 task_exit.go:204] [ 880: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.516674 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.516715 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.516727 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.516772 644066 task_exit.go:204] [ 880: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.517424 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.519297 644066 syscalls.go:262] [ 885: 885] Allocating stack with size of 8388608 bytes D0713 05:18:04.519408 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.520836 644066 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.520884 644066 usertrap_amd64.go:106] [ 885: 885] Map a usertrap vma at 60000 D0713 05:18:04.521242 644066 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000f89b00 1 D0713 05:18:04.521280 644066 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:04.521791 644066 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.521816 644066 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000f89b00 2 D0713 05:18:04.521826 644066 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:04.522644 644066 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.522674 644066 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000f89b00 3 D0713 05:18:04.522684 644066 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:04.529782 644066 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.529847 644066 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000f89b00 4 D0713 05:18:04.529863 644066 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:04.532421 644066 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.532479 644066 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000f89b00 5 D0713 05:18:04.532496 644066 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:04.532561 644066 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.532576 644066 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000f89b00 6 D0713 05:18:04.532582 644066 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:04.533000 644066 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.533024 644066 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000f89b00 7 D0713 05:18:04.533031 644066 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:04.540051 644066 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.540109 644066 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc000f89b00 8 D0713 05:18:04.540129 644066 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:04.540434 644066 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.540483 644066 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc000f89b00 9 D0713 05:18:04.540507 644066 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:04.540622 644066 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.540648 644066 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000f89b00 10 D0713 05:18:04.540660 644066 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:04.549695 644066 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.550058 644066 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000f89b00 11 D0713 05:18:04.550110 644066 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:04.553304 644066 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.553388 644066 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc000f89b00 12 D0713 05:18:04.553422 644066 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:04.553718 644066 usertrap_amd64.go:212] [ 885: 886] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.553752 644066 usertrap_amd64.go:122] [ 885: 886] Allocate a new trap: 0xc000f89b00 13 D0713 05:18:04.553768 644066 usertrap_amd64.go:225] [ 885: 886] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:04.553833 644066 task_signals.go:470] [ 885: 885] Notified of signal 23 D0713 05:18:04.553931 644066 task_signals.go:220] [ 885: 885] Signal 23: delivering to handler D0713 05:18:04.563178 644066 usertrap_amd64.go:212] [ 885: 885] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.563241 644066 usertrap_amd64.go:122] [ 885: 885] Allocate a new trap: 0xc000f89b00 14 D0713 05:18:04.563259 644066 usertrap_amd64.go:225] [ 885: 885] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:04.563331 644066 task_exit.go:204] [ 885: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.563363 644066 task_exit.go:204] [ 885: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.563429 644066 task_signals.go:204] [ 885: 886] Signal 885, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.563466 644066 task_exit.go:204] [ 885: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.563477 644066 task_exit.go:204] [ 885: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.563468 644066 task_signals.go:204] [ 885: 888] Signal 885, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.563481 644066 task_exit.go:204] [ 885: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.563423 644066 task_signals.go:204] [ 885: 889] Signal 885, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.563538 644066 task_exit.go:204] [ 885: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.563400 644066 task_signals.go:204] [ 885: 887] Signal 885, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.563574 644066 task_exit.go:204] [ 885: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.563593 644066 task_exit.go:204] [ 885: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.563600 644066 task_exit.go:204] [ 885: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.563614 644066 task_exit.go:204] [ 885: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.563972 644066 task_exit.go:204] [ 885: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.564008 644066 task_exit.go:204] [ 885: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.565064 644066 task_exit.go:204] [ 885: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.565107 644066 task_exit.go:204] [ 885: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.565123 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.565201 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.565233 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.565551 644066 task_exit.go:204] [ 885: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.566231 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.567544 644066 syscalls.go:262] [ 890: 890] Allocating stack with size of 8388608 bytes D0713 05:18:04.567651 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.568763 644066 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.568821 644066 usertrap_amd64.go:106] [ 890: 890] Map a usertrap vma at 62000 D0713 05:18:04.568933 644066 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc000d92150 1 D0713 05:18:04.569113 644066 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:04.570045 644066 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.570081 644066 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc000d92150 2 D0713 05:18:04.570095 644066 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:04.570656 644066 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.570683 644066 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc000d92150 3 D0713 05:18:04.570694 644066 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:04.577733 644066 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.577864 644066 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc000d92150 4 D0713 05:18:04.577892 644066 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:04.579506 644066 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.579539 644066 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc000d92150 5 D0713 05:18:04.579552 644066 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:04.579595 644066 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.579615 644066 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc000d92150 6 D0713 05:18:04.579624 644066 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:04.579897 644066 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.579914 644066 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc000d92150 7 D0713 05:18:04.579923 644066 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:04.580117 644066 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.580142 644066 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc000d92150 8 D0713 05:18:04.580156 644066 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:04.580412 644066 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.580439 644066 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc000d92150 9 D0713 05:18:04.580449 644066 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:04.580528 644066 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.580555 644066 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc000d92150 10 D0713 05:18:04.580567 644066 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:04.588267 644066 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.588313 644066 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc000d92150 11 D0713 05:18:04.588326 644066 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:04.590918 644066 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.590973 644066 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc000d92150 12 D0713 05:18:04.590987 644066 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:04.591058 644066 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.591076 644066 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc000d92150 13 D0713 05:18:04.591089 644066 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:04.591145 644066 task_signals.go:470] [ 890: 890] Notified of signal 23 D0713 05:18:04.591195 644066 task_signals.go:220] [ 890: 890] Signal 23: delivering to handler D0713 05:18:04.600861 644066 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.600904 644066 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc000d92150 14 D0713 05:18:04.600918 644066 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:04.601088 644066 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.601170 644066 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.601201 644066 task_signals.go:204] [ 890: 894] Signal 890, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.601223 644066 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.601219 644066 task_signals.go:204] [ 890: 892] Signal 890, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.601238 644066 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.601243 644066 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.601260 644066 task_signals.go:204] [ 890: 891] Signal 890, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.601282 644066 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.601288 644066 task_signals.go:204] [ 890: 893] Signal 890, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.601296 644066 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.601299 644066 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.601306 644066 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.601311 644066 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.601314 644066 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.601404 644066 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.602690 644066 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.602722 644066 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.602740 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.602810 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.602878 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.602976 644066 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.603720 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.605301 644066 syscalls.go:262] [ 895: 895] Allocating stack with size of 8388608 bytes D0713 05:18:04.605418 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.607069 644066 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.607106 644066 usertrap_amd64.go:106] [ 895: 895] Map a usertrap vma at 60000 D0713 05:18:04.607190 644066 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001cc2480 1 D0713 05:18:04.607216 644066 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:04.607889 644066 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.607921 644066 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001cc2480 2 D0713 05:18:04.607935 644066 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:04.608686 644066 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.609212 644066 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001cc2480 3 D0713 05:18:04.609294 644066 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:04.615416 644066 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.615525 644066 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001cc2480 4 D0713 05:18:04.615543 644066 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:04.616755 644066 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.616801 644066 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001cc2480 5 D0713 05:18:04.616829 644066 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:04.617088 644066 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.617120 644066 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001cc2480 6 D0713 05:18:04.617133 644066 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:04.618245 644066 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.618403 644066 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001cc2480 7 D0713 05:18:04.618419 644066 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:04.618975 644066 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.619010 644066 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001cc2480 8 D0713 05:18:04.619023 644066 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:04.619302 644066 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.619325 644066 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001cc2480 9 D0713 05:18:04.619334 644066 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:04.619507 644066 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.619537 644066 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001cc2480 10 D0713 05:18:04.619551 644066 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:04.628507 644066 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.628554 644066 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001cc2480 11 D0713 05:18:04.628572 644066 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:04.630303 644066 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.630335 644066 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001cc2480 12 D0713 05:18:04.630351 644066 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:04.630392 644066 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.630399 644066 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc001cc2480 13 D0713 05:18:04.630406 644066 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:04.630423 644066 task_signals.go:470] [ 895: 895] Notified of signal 23 D0713 05:18:04.638195 644066 task_signals.go:220] [ 895: 895] Signal 23: delivering to handler D0713 05:18:04.638497 644066 task_signals.go:481] [ 895: 895] No task notified of signal 23 D0713 05:18:04.638561 644066 task_signals.go:220] [ 895: 895] Signal 23: delivering to handler D0713 05:18:04.648841 644066 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.648912 644066 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc001cc2480 14 D0713 05:18:04.648933 644066 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:04.649038 644066 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.649083 644066 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.649130 644066 task_signals.go:204] [ 895: 897] Signal 895, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.649156 644066 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.649164 644066 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.649171 644066 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.649197 644066 task_signals.go:204] [ 895: 898] Signal 895, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.649210 644066 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.649218 644066 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.649225 644066 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.649241 644066 task_signals.go:204] [ 895: 899] Signal 895, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.649259 644066 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.649274 644066 task_signals.go:204] [ 895: 896] Signal 895, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.649288 644066 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.649294 644066 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.649317 644066 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.651200 644066 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.651268 644066 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.651296 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.651373 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.651397 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.651571 644066 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.652170 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.653745 644066 syscalls.go:262] [ 900: 900] Allocating stack with size of 8388608 bytes D0713 05:18:04.653857 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.654862 644066 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.654915 644066 usertrap_amd64.go:106] [ 900: 900] Map a usertrap vma at 6a000 D0713 05:18:04.655043 644066 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001cc2b10 1 D0713 05:18:04.655121 644066 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 05:18:04.655534 644066 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.655558 644066 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001cc2b10 2 D0713 05:18:04.655570 644066 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 05:18:04.656350 644066 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.656388 644066 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001cc2b10 3 D0713 05:18:04.656403 644066 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 05:18:04.663626 644066 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.663660 644066 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001cc2b10 4 D0713 05:18:04.663672 644066 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 05:18:04.664880 644066 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.664930 644066 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001cc2b10 5 D0713 05:18:04.665003 644066 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 05:18:04.665110 644066 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.665128 644066 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001cc2b10 6 D0713 05:18:04.665135 644066 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 05:18:04.665737 644066 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.665770 644066 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001cc2b10 7 D0713 05:18:04.665780 644066 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 05:18:04.665996 644066 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.666019 644066 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc001cc2b10 8 D0713 05:18:04.666027 644066 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 05:18:04.666238 644066 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:04.666267 644066 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc001cc2b10 9 D0713 05:18:04.666280 644066 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b6e0 trap addr 6a2d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 05:18:04.666530 644066 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.666557 644066 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc001cc2b10 10 D0713 05:18:04.666576 644066 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 05:18:04.666620 644066 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.666651 644066 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc001cc2b10 11 D0713 05:18:04.666665 644066 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46af76 trap addr 6a370 ([184 35 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 05:18:04.674991 644066 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.675023 644066 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001cc2b10 12 D0713 05:18:04.675033 644066 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 05:18:04.677437 644066 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.677481 644066 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc001cc2b10 13 D0713 05:18:04.677495 644066 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b020 trap addr 6a410 ([184 39 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 05:18:04.677579 644066 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.677622 644066 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc001cc2b10 14 D0713 05:18:04.677637 644066 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b04f trap addr 6a460 ([184 234 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 05:18:04.677663 644066 task_signals.go:470] [ 900: 900] Notified of signal 23 D0713 05:18:04.677721 644066 task_signals.go:220] [ 900: 900] Signal 23: delivering to handler D0713 05:18:04.685484 644066 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.685520 644066 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc001cc2b10 15 D0713 05:18:04.685540 644066 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46ae44 trap addr 6a4b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0713 05:18:04.685633 644066 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.685661 644066 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.685686 644066 task_signals.go:204] [ 900: 904] Signal 900, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.685685 644066 task_signals.go:204] [ 900: 903] Signal 900, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.685678 644066 task_signals.go:204] [ 900: 901] Signal 900, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.685701 644066 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.685712 644066 task_signals.go:204] [ 900: 902] Signal 900, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.685724 644066 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.685738 644066 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.685746 644066 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.685764 644066 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.685771 644066 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.685783 644066 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.685792 644066 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.685800 644066 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.685821 644066 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.686998 644066 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.687029 644066 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.687046 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.687107 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.687134 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.687235 644066 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.687774 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.689208 644066 syscalls.go:262] [ 905: 905] Allocating stack with size of 8388608 bytes D0713 05:18:04.689307 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.690942 644066 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.690994 644066 usertrap_amd64.go:106] [ 905: 905] Map a usertrap vma at 69000 D0713 05:18:04.691079 644066 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d925a0 1 D0713 05:18:04.691115 644066 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:04.691371 644066 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.691394 644066 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d925a0 2 D0713 05:18:04.691403 644066 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:04.692116 644066 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.692170 644066 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d925a0 3 D0713 05:18:04.692190 644066 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:04.698864 644066 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.698896 644066 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d925a0 4 D0713 05:18:04.698907 644066 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:04.699915 644066 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.699944 644066 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d925a0 5 D0713 05:18:04.699953 644066 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:04.700004 644066 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.700018 644066 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d925a0 6 D0713 05:18:04.700026 644066 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:04.700204 644066 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.700224 644066 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d925a0 7 D0713 05:18:04.700230 644066 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:04.700347 644066 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.700376 644066 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc000d925a0 8 D0713 05:18:04.700385 644066 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:04.700551 644066 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.700576 644066 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d925a0 9 D0713 05:18:04.700587 644066 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:04.700600 644066 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.700607 644066 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc000d925a0 10 D0713 05:18:04.700617 644066 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:04.708210 644066 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.708252 644066 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d925a0 11 D0713 05:18:04.708262 644066 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:04.710789 644066 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.710814 644066 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc000d925a0 12 D0713 05:18:04.710824 644066 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:04.710883 644066 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.710912 644066 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc000d925a0 13 D0713 05:18:04.710925 644066 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:04.711008 644066 task_signals.go:470] [ 905: 905] Notified of signal 23 D0713 05:18:04.711107 644066 task_signals.go:220] [ 905: 905] Signal 23: delivering to handler D0713 05:18:04.721175 644066 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.721212 644066 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d925a0 14 D0713 05:18:04.721228 644066 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:04.721295 644066 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.721327 644066 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.721359 644066 task_signals.go:204] [ 905: 908] Signal 905, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.721383 644066 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.721392 644066 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.721359 644066 task_signals.go:204] [ 905: 906] Signal 905, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.721399 644066 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.721354 644066 task_signals.go:204] [ 905: 907] Signal 905, PID: 907, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.721382 644066 task_signals.go:204] [ 905: 909] Signal 905, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.721417 644066 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.721437 644066 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.721444 644066 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.721454 644066 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.721462 644066 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.721467 644066 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.721480 644066 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.722662 644066 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.722694 644066 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.722715 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.722745 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.722768 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.722841 644066 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.723562 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.724751 644066 syscalls.go:262] [ 910: 910] Allocating stack with size of 8388608 bytes D0713 05:18:04.724861 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.726410 644066 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.726440 644066 usertrap_amd64.go:106] [ 910: 910] Map a usertrap vma at 60000 D0713 05:18:04.726495 644066 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000d92810 1 D0713 05:18:04.726523 644066 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:04.726689 644066 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.726703 644066 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000d92810 2 D0713 05:18:04.726709 644066 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:04.727363 644066 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.727389 644066 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000d92810 3 D0713 05:18:04.727399 644066 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:04.733163 644066 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.733194 644066 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000d92810 4 D0713 05:18:04.733216 644066 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:04.734595 644066 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.734622 644066 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000d92810 5 D0713 05:18:04.734656 644066 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:04.734700 644066 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.734714 644066 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000d92810 6 D0713 05:18:04.734743 644066 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:04.735067 644066 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.735081 644066 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000d92810 7 D0713 05:18:04.735090 644066 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:04.735209 644066 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.735221 644066 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc000d92810 8 D0713 05:18:04.735232 644066 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:04.735450 644066 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.735476 644066 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc000d92810 9 D0713 05:18:04.735504 644066 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:04.735573 644066 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.735589 644066 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc000d92810 10 D0713 05:18:04.735597 644066 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46b020 trap addr 60320 ([184 39 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:04.735661 644066 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.735687 644066 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc000d92810 11 D0713 05:18:04.735698 644066 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46b04f trap addr 60370 ([184 234 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:04.735753 644066 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 05:18:04.735855 644066 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 05:18:04.735991 644066 usertrap_amd64.go:212] [ 910: 912] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.736015 644066 usertrap_amd64.go:122] [ 910: 912] Allocate a new trap: 0xc000d92810 12 D0713 05:18:04.736026 644066 usertrap_amd64.go:225] [ 910: 912] Apply the binary patch addr 46b57c trap addr 603c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:04.736041 644066 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 05:18:04.736210 644066 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 05:18:04.744143 644066 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.744178 644066 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000d92810 13 D0713 05:18:04.744194 644066 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:04.746690 644066 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 05:18:04.746790 644066 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 05:18:04.756362 644066 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.756409 644066 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000d92810 14 D0713 05:18:04.756424 644066 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:04.756469 644066 task_exit.go:204] [ 910: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.756495 644066 task_exit.go:204] [ 910: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.756511 644066 task_signals.go:204] [ 910: 914] Signal 910, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.756531 644066 task_signals.go:204] [ 910: 912] Signal 910, PID: 912, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.756543 644066 task_exit.go:204] [ 910: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.756522 644066 task_signals.go:204] [ 910: 915] Signal 910, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.756540 644066 task_signals.go:204] [ 910: 913] Signal 910, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.756552 644066 task_exit.go:204] [ 910: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.756566 644066 task_exit.go:204] [ 910: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.756587 644066 task_signals.go:204] [ 910: 911] Signal 910, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.756601 644066 task_exit.go:204] [ 910: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.756611 644066 task_exit.go:204] [ 910: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.756617 644066 task_exit.go:204] [ 910: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.756625 644066 task_exit.go:204] [ 910: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.756643 644066 task_exit.go:204] [ 910: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.756650 644066 task_exit.go:204] [ 910: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.756659 644066 task_exit.go:204] [ 910: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.756665 644066 task_exit.go:204] [ 910: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.756680 644066 task_exit.go:204] [ 910: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.756691 644066 task_exit.go:204] [ 910: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.758025 644066 task_exit.go:204] [ 910: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.758053 644066 task_exit.go:204] [ 910: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.758066 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.758093 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.758148 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.758202 644066 task_exit.go:204] [ 910: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.758746 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.760119 644066 syscalls.go:262] [ 916: 916] Allocating stack with size of 8388608 bytes D0713 05:18:04.760227 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.761509 644066 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.761551 644066 usertrap_amd64.go:106] [ 916: 916] Map a usertrap vma at 64000 D0713 05:18:04.761635 644066 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc001d22930 1 D0713 05:18:04.761662 644066 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:04.761904 644066 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.761926 644066 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc001d22930 2 D0713 05:18:04.761941 644066 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:04.762814 644066 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.762842 644066 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc001d22930 3 D0713 05:18:04.762853 644066 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:04.768423 644066 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.768463 644066 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc001d22930 4 D0713 05:18:04.768476 644066 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:04.769432 644066 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.769461 644066 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc001d22930 5 D0713 05:18:04.769475 644066 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:04.769541 644066 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.769549 644066 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc001d22930 6 D0713 05:18:04.769555 644066 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:04.769764 644066 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.769789 644066 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc001d22930 7 D0713 05:18:04.769799 644066 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:04.769967 644066 usertrap_amd64.go:212] [ 916: 917] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.769995 644066 usertrap_amd64.go:122] [ 916: 917] Allocate a new trap: 0xc001d22930 8 D0713 05:18:04.770005 644066 usertrap_amd64.go:225] [ 916: 917] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:04.770185 644066 usertrap_amd64.go:212] [ 916: 917] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.770239 644066 usertrap_amd64.go:122] [ 916: 917] Allocate a new trap: 0xc001d22930 9 D0713 05:18:04.770255 644066 usertrap_amd64.go:225] [ 916: 917] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:04.770314 644066 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.770334 644066 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc001d22930 10 D0713 05:18:04.770343 644066 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:04.777438 644066 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.777478 644066 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc001d22930 11 D0713 05:18:04.777493 644066 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:04.781588 644066 usertrap_amd64.go:212] [ 916: 917] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.781620 644066 usertrap_amd64.go:122] [ 916: 917] Allocate a new trap: 0xc001d22930 12 D0713 05:18:04.781640 644066 usertrap_amd64.go:225] [ 916: 917] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:04.781671 644066 usertrap_amd64.go:212] [ 916: 917] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.781694 644066 usertrap_amd64.go:122] [ 916: 917] Allocate a new trap: 0xc001d22930 13 D0713 05:18:04.781706 644066 usertrap_amd64.go:225] [ 916: 917] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:04.781788 644066 task_signals.go:470] [ 916: 916] Notified of signal 23 D0713 05:18:04.781865 644066 task_signals.go:220] [ 916: 916] Signal 23: delivering to handler D0713 05:18:04.787237 644066 usertrap_amd64.go:212] [ 916: 916] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.787270 644066 usertrap_amd64.go:122] [ 916: 916] Allocate a new trap: 0xc001d22930 14 D0713 05:18:04.787285 644066 usertrap_amd64.go:225] [ 916: 916] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:04.787345 644066 task_exit.go:204] [ 916: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.787371 644066 task_exit.go:204] [ 916: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.787373 644066 task_signals.go:204] [ 916: 918] Signal 916, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.787398 644066 task_signals.go:204] [ 916: 920] Signal 916, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.787407 644066 task_exit.go:204] [ 916: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.787399 644066 task_signals.go:204] [ 916: 919] Signal 916, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.787406 644066 task_signals.go:204] [ 916: 917] Signal 916, PID: 917, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.787421 644066 task_exit.go:204] [ 916: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.787434 644066 task_exit.go:204] [ 916: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.787443 644066 task_exit.go:204] [ 916: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.787449 644066 task_exit.go:204] [ 916: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.787461 644066 task_exit.go:204] [ 916: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.787516 644066 task_exit.go:204] [ 916: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.787535 644066 task_exit.go:204] [ 916: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.787551 644066 task_exit.go:204] [ 916: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.787561 644066 task_exit.go:204] [ 916: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.788502 644066 task_exit.go:204] [ 916: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.788535 644066 task_exit.go:204] [ 916: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.788548 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.788572 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.788579 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.788653 644066 task_exit.go:204] [ 916: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.789188 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.790363 644066 syscalls.go:262] [ 921: 921] Allocating stack with size of 8388608 bytes D0713 05:18:04.790454 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.791230 644066 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.791272 644066 usertrap_amd64.go:106] [ 921: 921] Map a usertrap vma at 65000 D0713 05:18:04.791429 644066 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000d92b10 1 D0713 05:18:04.791464 644066 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:04.791888 644066 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.791906 644066 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000d92b10 2 D0713 05:18:04.791919 644066 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:04.792647 644066 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.792676 644066 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000d92b10 3 D0713 05:18:04.792688 644066 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:04.798312 644066 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.798365 644066 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000d92b10 4 D0713 05:18:04.798402 644066 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:04.799330 644066 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.799352 644066 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000d92b10 5 D0713 05:18:04.799363 644066 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:04.799393 644066 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.799400 644066 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000d92b10 6 D0713 05:18:04.799407 644066 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:04.799570 644066 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.799621 644066 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000d92b10 7 D0713 05:18:04.799653 644066 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:04.799901 644066 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.800011 644066 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc000d92b10 8 D0713 05:18:04.800033 644066 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:04.800104 644066 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.800117 644066 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000d92b10 9 D0713 05:18:04.800127 644066 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:04.800141 644066 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.800148 644066 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc000d92b10 10 D0713 05:18:04.800159 644066 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:04.800425 644066 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.800457 644066 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc000d92b10 11 D0713 05:18:04.800469 644066 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:04.800521 644066 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.800538 644066 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc000d92b10 12 D0713 05:18:04.800546 644066 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:04.800600 644066 task_signals.go:470] [ 921: 921] Notified of signal 23 D0713 05:18:04.800652 644066 task_signals.go:220] [ 921: 921] Signal 23: delivering to handler D0713 05:18:04.806849 644066 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.806874 644066 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000d92b10 13 D0713 05:18:04.806885 644066 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:04.810906 644066 task_signals.go:470] [ 921: 921] Notified of signal 23 D0713 05:18:04.810957 644066 task_signals.go:179] [ 921: 921] Restarting syscall 202: interrupted by signal 23 D0713 05:18:04.810974 644066 task_signals.go:220] [ 921: 921] Signal 23: delivering to handler D0713 05:18:04.816926 644066 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.816995 644066 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc000d92b10 14 D0713 05:18:04.817011 644066 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:04.817092 644066 task_exit.go:204] [ 921: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.817115 644066 task_exit.go:204] [ 921: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.817143 644066 task_signals.go:204] [ 921: 922] Signal 921, PID: 922, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.817160 644066 task_exit.go:204] [ 921: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.817178 644066 task_exit.go:204] [ 921: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.817185 644066 task_exit.go:204] [ 921: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.817201 644066 task_signals.go:204] [ 921: 923] Signal 921, PID: 923, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.817210 644066 task_exit.go:204] [ 921: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.817218 644066 task_exit.go:204] [ 921: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.817224 644066 task_exit.go:204] [ 921: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.817239 644066 task_signals.go:204] [ 921: 924] Signal 921, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.817260 644066 task_exit.go:204] [ 921: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.817267 644066 task_exit.go:204] [ 921: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.817274 644066 task_exit.go:204] [ 921: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.817292 644066 task_signals.go:204] [ 921: 925] Signal 921, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.817302 644066 task_exit.go:204] [ 921: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.818764 644066 task_exit.go:204] [ 921: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.818840 644066 task_exit.go:204] [ 921: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.818889 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.818990 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.819015 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.819074 644066 task_exit.go:204] [ 921: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.819654 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.821552 644066 syscalls.go:262] [ 926: 926] Allocating stack with size of 8388608 bytes D0713 05:18:04.821668 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.823691 644066 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.823734 644066 usertrap_amd64.go:106] [ 926: 926] Map a usertrap vma at 60000 D0713 05:18:04.823849 644066 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001d22b40 1 D0713 05:18:04.823879 644066 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:04.824091 644066 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.824114 644066 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001d22b40 2 D0713 05:18:04.824124 644066 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:04.825318 644066 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.825346 644066 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001d22b40 3 D0713 05:18:04.825358 644066 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:04.834738 644066 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.834786 644066 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001d22b40 4 D0713 05:18:04.834800 644066 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:04.835879 644066 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.835926 644066 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001d22b40 5 D0713 05:18:04.835946 644066 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:04.836074 644066 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.836098 644066 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001d22b40 6 D0713 05:18:04.836108 644066 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:04.836595 644066 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.836613 644066 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001d22b40 7 D0713 05:18:04.836621 644066 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:04.836842 644066 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.836867 644066 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc001d22b40 8 D0713 05:18:04.836882 644066 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:04.837077 644066 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.837099 644066 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc001d22b40 9 D0713 05:18:04.837125 644066 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:04.837184 644066 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.837203 644066 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001d22b40 10 D0713 05:18:04.837212 644066 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:04.846409 644066 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.846548 644066 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001d22b40 11 D0713 05:18:04.846583 644066 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:04.847528 644066 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.847565 644066 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc001d22b40 12 D0713 05:18:04.847578 644066 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:04.847613 644066 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.847621 644066 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc001d22b40 13 D0713 05:18:04.847629 644066 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:04.847646 644066 task_signals.go:470] [ 926: 926] Notified of signal 23 D0713 05:18:04.849629 644066 task_signals.go:220] [ 926: 926] Signal 23: delivering to handler D0713 05:18:04.859354 644066 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.859403 644066 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc001d22b40 14 D0713 05:18:04.859422 644066 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:04.859479 644066 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.859506 644066 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.859536 644066 task_signals.go:204] [ 926: 929] Signal 926, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.859673 644066 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.859705 644066 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.859527 644066 task_signals.go:204] [ 926: 927] Signal 926, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.859713 644066 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.859571 644066 task_signals.go:204] [ 926: 930] Signal 926, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.859793 644066 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.859571 644066 task_signals.go:204] [ 926: 928] Signal 926, PID: 928, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.859834 644066 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.859852 644066 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.859867 644066 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.859882 644066 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.859934 644066 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.859957 644066 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.861286 644066 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.861321 644066 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.861338 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.861377 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.861388 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.861480 644066 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.862253 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.864007 644066 syscalls.go:262] [ 931: 931] Allocating stack with size of 8388608 bytes D0713 05:18:04.864143 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.866579 644066 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.866662 644066 usertrap_amd64.go:106] [ 931: 931] Map a usertrap vma at 65000 D0713 05:18:04.868542 644066 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc001d22bd0 1 D0713 05:18:04.868640 644066 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:04.869603 644066 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.869633 644066 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc001d22bd0 2 D0713 05:18:04.869650 644066 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:04.870280 644066 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.870311 644066 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc001d22bd0 3 D0713 05:18:04.870330 644066 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:04.876866 644066 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.876890 644066 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc001d22bd0 4 D0713 05:18:04.876904 644066 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:04.878254 644066 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.878301 644066 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc001d22bd0 5 D0713 05:18:04.878318 644066 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:04.878662 644066 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.878691 644066 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc001d22bd0 6 D0713 05:18:04.878699 644066 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:04.878969 644066 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.878993 644066 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc001d22bd0 7 D0713 05:18:04.879011 644066 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:04.879197 644066 usertrap_amd64.go:212] [ 931: 932] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.879218 644066 usertrap_amd64.go:122] [ 931: 932] Allocate a new trap: 0xc001d22bd0 8 D0713 05:18:04.879231 644066 usertrap_amd64.go:225] [ 931: 932] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:04.879493 644066 usertrap_amd64.go:212] [ 931: 932] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.879503 644066 usertrap_amd64.go:122] [ 931: 932] Allocate a new trap: 0xc001d22bd0 9 D0713 05:18:04.879512 644066 usertrap_amd64.go:225] [ 931: 932] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:04.879522 644066 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.879528 644066 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc001d22bd0 10 D0713 05:18:04.879535 644066 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:04.889702 644066 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.890019 644066 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc001d22bd0 11 D0713 05:18:04.890052 644066 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:04.890120 644066 usertrap_amd64.go:212] [ 931: 932] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.890127 644066 usertrap_amd64.go:122] [ 931: 932] Allocate a new trap: 0xc001d22bd0 12 D0713 05:18:04.890136 644066 usertrap_amd64.go:225] [ 931: 932] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:04.890195 644066 usertrap_amd64.go:212] [ 931: 932] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.890219 644066 usertrap_amd64.go:122] [ 931: 932] Allocate a new trap: 0xc001d22bd0 13 D0713 05:18:04.890232 644066 usertrap_amd64.go:225] [ 931: 932] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:04.890297 644066 task_signals.go:470] [ 931: 931] Notified of signal 23 D0713 05:18:04.890332 644066 task_signals.go:220] [ 931: 931] Signal 23: delivering to handler D0713 05:18:04.890483 644066 task_signals.go:470] [ 931: 931] Notified of signal 23 D0713 05:18:04.890535 644066 task_signals.go:220] [ 931: 931] Signal 23: delivering to handler D0713 05:18:04.905290 644066 task_signals.go:470] [ 931: 931] Notified of signal 23 D0713 05:18:04.905383 644066 task_signals.go:220] [ 931: 931] Signal 23: delivering to handler D0713 05:18:04.909974 644066 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.910012 644066 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc001d22bd0 14 D0713 05:18:04.910027 644066 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:04.910094 644066 task_exit.go:204] [ 931: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.910121 644066 task_exit.go:204] [ 931: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.910153 644066 task_signals.go:204] [ 931: 932] Signal 931, PID: 932, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.910168 644066 task_exit.go:204] [ 931: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.910173 644066 task_exit.go:204] [ 931: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.910177 644066 task_exit.go:204] [ 931: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.910200 644066 task_signals.go:204] [ 931: 933] Signal 931, PID: 933, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.910220 644066 task_exit.go:204] [ 931: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.910228 644066 task_exit.go:204] [ 931: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.910233 644066 task_exit.go:204] [ 931: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.910250 644066 task_signals.go:204] [ 931: 934] Signal 931, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.910265 644066 task_exit.go:204] [ 931: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.910277 644066 task_exit.go:204] [ 931: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.910283 644066 task_exit.go:204] [ 931: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.910295 644066 task_signals.go:204] [ 931: 935] Signal 931, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.910309 644066 task_exit.go:204] [ 931: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.911673 644066 task_exit.go:204] [ 931: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.911709 644066 task_exit.go:204] [ 931: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.911725 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.911792 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.911802 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.911971 644066 task_exit.go:204] [ 931: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.912513 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.914075 644066 syscalls.go:262] [ 936: 936] Allocating stack with size of 8388608 bytes D0713 05:18:04.914172 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.921903 644066 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.921963 644066 usertrap_amd64.go:106] [ 936: 936] Map a usertrap vma at 69000 D0713 05:18:04.922041 644066 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc001317ec0 1 D0713 05:18:04.922078 644066 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:04.922463 644066 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.922477 644066 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc001317ec0 2 D0713 05:18:04.922503 644066 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:04.922918 644066 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.922948 644066 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc001317ec0 3 D0713 05:18:04.922979 644066 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:04.929155 644066 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.929227 644066 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc001317ec0 4 D0713 05:18:04.929248 644066 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:04.930382 644066 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.930416 644066 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc001317ec0 5 D0713 05:18:04.930434 644066 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:04.930473 644066 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.930481 644066 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc001317ec0 6 D0713 05:18:04.930494 644066 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:04.930748 644066 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.930773 644066 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc001317ec0 7 D0713 05:18:04.930783 644066 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:04.930946 644066 usertrap_amd64.go:212] [ 936: 937] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.930973 644066 usertrap_amd64.go:122] [ 936: 937] Allocate a new trap: 0xc001317ec0 8 D0713 05:18:04.930986 644066 usertrap_amd64.go:225] [ 936: 937] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:04.931159 644066 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.931176 644066 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc001317ec0 9 D0713 05:18:04.931211 644066 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:04.931225 644066 usertrap_amd64.go:212] [ 936: 937] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.931231 644066 usertrap_amd64.go:122] [ 936: 937] Allocate a new trap: 0xc001317ec0 10 D0713 05:18:04.931237 644066 usertrap_amd64.go:225] [ 936: 937] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:04.941527 644066 usertrap_amd64.go:212] [ 936: 937] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.941564 644066 usertrap_amd64.go:122] [ 936: 937] Allocate a new trap: 0xc001317ec0 11 D0713 05:18:04.941578 644066 usertrap_amd64.go:225] [ 936: 937] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:04.941625 644066 usertrap_amd64.go:212] [ 936: 937] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.941635 644066 usertrap_amd64.go:122] [ 936: 937] Allocate a new trap: 0xc001317ec0 12 D0713 05:18:04.941643 644066 usertrap_amd64.go:225] [ 936: 937] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:04.941659 644066 task_signals.go:470] [ 936: 936] Notified of signal 23 D0713 05:18:04.941700 644066 task_signals.go:220] [ 936: 936] Signal 23: delivering to handler D0713 05:18:04.942614 644066 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.942643 644066 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc001317ec0 13 D0713 05:18:04.942656 644066 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:04.952846 644066 task_signals.go:470] [ 936: 936] Notified of signal 23 D0713 05:18:04.953348 644066 task_signals.go:220] [ 936: 936] Signal 23: delivering to handler I0713 05:18:04.953701 644066 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0713 05:18:04.953780 644066 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.953793 644066 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc001317ec0 14 D0713 05:18:04.953810 644066 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:04.953866 644066 task_exit.go:204] [ 936: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.953896 644066 task_exit.go:204] [ 936: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.953926 644066 task_signals.go:204] [ 936: 937] Signal 936, PID: 937, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.953946 644066 task_exit.go:204] [ 936: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.953955 644066 task_exit.go:204] [ 936: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.953961 644066 task_exit.go:204] [ 936: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.953979 644066 task_signals.go:204] [ 936: 938] Signal 936, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.953993 644066 task_exit.go:204] [ 936: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.953997 644066 task_exit.go:204] [ 936: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.954004 644066 task_exit.go:204] [ 936: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.954014 644066 task_signals.go:204] [ 936: 939] Signal 936, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.954026 644066 task_exit.go:204] [ 936: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.954031 644066 task_exit.go:204] [ 936: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.954034 644066 task_exit.go:204] [ 936: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.954043 644066 task_signals.go:204] [ 936: 940] Signal 936, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.954055 644066 task_exit.go:204] [ 936: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.954059 644066 task_exit.go:204] [ 936: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.954063 644066 task_exit.go:204] [ 936: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.954074 644066 task_signals.go:204] [ 936: 941] Signal 936, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.954086 644066 task_exit.go:204] [ 936: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.955934 644066 task_exit.go:204] [ 936: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.955961 644066 task_exit.go:204] [ 936: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.955991 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.956060 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.956136 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.956374 644066 task_exit.go:204] [ 936: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.956623 644066 task_signals.go:470] [ 6: 10] Notified of signal 23 D0713 05:18:04.956709 644066 task_signals.go:220] [ 6: 10] Signal 23: delivering to handler D0713 05:18:04.957147 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.958768 644066 syscalls.go:262] [ 942: 942] Allocating stack with size of 8388608 bytes D0713 05:18:04.958964 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:04.960591 644066 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:04.960639 644066 usertrap_amd64.go:106] [ 942: 942] Map a usertrap vma at 62000 D0713 05:18:04.960710 644066 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d23140 1 D0713 05:18:04.960741 644066 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:04.961205 644066 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:04.961248 644066 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d23140 2 D0713 05:18:04.961267 644066 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:04.962004 644066 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:04.962098 644066 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d23140 3 D0713 05:18:04.962115 644066 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:04.968433 644066 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:04.968547 644066 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d23140 4 D0713 05:18:04.968576 644066 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:04.969838 644066 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:04.969889 644066 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d23140 5 D0713 05:18:04.969905 644066 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:04.969980 644066 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b214:sysno 13 D0713 05:18:04.969991 644066 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d23140 6 D0713 05:18:04.970001 644066 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:04.970444 644066 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:04.970469 644066 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d23140 7 D0713 05:18:04.970482 644066 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:04.970683 644066 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:04.970697 644066 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc001d23140 8 D0713 05:18:04.970709 644066 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:04.970902 644066 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46af76:sysno 35 D0713 05:18:04.970929 644066 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc001d23140 9 D0713 05:18:04.970942 644066 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:04.971301 644066 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:04.971321 644066 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d23140 10 D0713 05:18:04.971333 644066 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:04.980084 644066 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46af29:sysno 293 D0713 05:18:04.980124 644066 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d23140 11 D0713 05:18:04.980136 644066 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:04.983856 644066 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46b020:sysno 39 D0713 05:18:04.983908 644066 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc001d23140 12 D0713 05:18:04.983922 644066 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:04.983972 644066 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:04.983982 644066 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc001d23140 13 D0713 05:18:04.983991 644066 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:04.984018 644066 task_signals.go:470] [ 942: 942] Notified of signal 23 D0713 05:18:04.984092 644066 task_signals.go:220] [ 942: 942] Signal 23: delivering to handler D0713 05:18:04.991696 644066 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:04.991740 644066 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc001d23140 14 D0713 05:18:04.991751 644066 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:04.991839 644066 task_exit.go:204] [ 942: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.991891 644066 task_exit.go:204] [ 942: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.991924 644066 task_signals.go:204] [ 942: 944] Signal 942, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.991943 644066 task_signals.go:204] [ 942: 946] Signal 942, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.991959 644066 task_exit.go:204] [ 942: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.991971 644066 task_exit.go:204] [ 942: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.991982 644066 task_exit.go:204] [ 942: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.991989 644066 task_exit.go:204] [ 942: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.992010 644066 task_signals.go:204] [ 942: 945] Signal 942, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.992020 644066 task_exit.go:204] [ 942: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.992029 644066 task_exit.go:204] [ 942: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.992035 644066 task_exit.go:204] [ 942: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.992049 644066 task_signals.go:204] [ 942: 943] Signal 942, PID: 943, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:04.992059 644066 task_exit.go:204] [ 942: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:04.992232 644066 task_exit.go:204] [ 942: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.992266 644066 task_exit.go:204] [ 942: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.993427 644066 task_exit.go:204] [ 942: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:04.993465 644066 task_exit.go:204] [ 942: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:04.993488 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:04.993520 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:04.993548 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:04.993612 644066 task_exit.go:204] [ 942: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.002033 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.003123 644066 syscalls.go:262] [ 947: 947] Allocating stack with size of 8388608 bytes D0713 05:18:05.003241 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.004652 644066 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.004789 644066 usertrap_amd64.go:106] [ 947: 947] Map a usertrap vma at 69000 D0713 05:18:05.005112 644066 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000f88ea0 1 D0713 05:18:05.005158 644066 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:05.005577 644066 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.005604 644066 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000f88ea0 2 D0713 05:18:05.005616 644066 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:05.006512 644066 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.006544 644066 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000f88ea0 3 D0713 05:18:05.006556 644066 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:05.014547 644066 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.014586 644066 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000f88ea0 4 D0713 05:18:05.014603 644066 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:05.015802 644066 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.015832 644066 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000f88ea0 5 D0713 05:18:05.015850 644066 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:05.016198 644066 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.016223 644066 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000f88ea0 6 D0713 05:18:05.016233 644066 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:05.016750 644066 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.016780 644066 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000f88ea0 7 D0713 05:18:05.016790 644066 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:05.017016 644066 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.017043 644066 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc000f88ea0 8 D0713 05:18:05.017053 644066 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:05.017333 644066 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.017358 644066 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc000f88ea0 9 D0713 05:18:05.017368 644066 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:05.017542 644066 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.017563 644066 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000f88ea0 10 D0713 05:18:05.017574 644066 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:05.025963 644066 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.026050 644066 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000f88ea0 11 D0713 05:18:05.026065 644066 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:05.028821 644066 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.028867 644066 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc000f88ea0 12 D0713 05:18:05.028888 644066 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:05.029145 644066 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.029184 644066 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc000f88ea0 13 D0713 05:18:05.029219 644066 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:05.029258 644066 task_signals.go:470] [ 947: 947] Notified of signal 23 D0713 05:18:05.029321 644066 task_signals.go:220] [ 947: 947] Signal 23: delivering to handler I0713 05:18:05.038956 644066 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0713 05:18:05.039034 644066 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.039054 644066 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc000f88ea0 14 D0713 05:18:05.039065 644066 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:05.039136 644066 task_exit.go:204] [ 947: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.039166 644066 task_exit.go:204] [ 947: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.039190 644066 task_signals.go:204] [ 947: 948] Signal 947, PID: 948, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.039211 644066 task_exit.go:204] [ 947: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.039226 644066 task_exit.go:204] [ 947: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.039232 644066 task_exit.go:204] [ 947: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.039262 644066 task_signals.go:204] [ 947: 949] Signal 947, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.039282 644066 task_exit.go:204] [ 947: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.039290 644066 task_exit.go:204] [ 947: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.039295 644066 task_exit.go:204] [ 947: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.039321 644066 task_signals.go:204] [ 947: 950] Signal 947, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.039340 644066 task_exit.go:204] [ 947: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.039347 644066 task_exit.go:204] [ 947: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.039353 644066 task_exit.go:204] [ 947: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.039372 644066 task_signals.go:204] [ 947: 951] Signal 947, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.039389 644066 task_exit.go:204] [ 947: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.040775 644066 task_exit.go:204] [ 947: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.040810 644066 task_exit.go:204] [ 947: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.040826 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.040898 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.040908 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.041106 644066 task_exit.go:204] [ 947: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.041606 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.043009 644066 syscalls.go:262] [ 952: 952] Allocating stack with size of 8388608 bytes D0713 05:18:05.043098 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.046223 644066 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.046307 644066 usertrap_amd64.go:106] [ 952: 952] Map a usertrap vma at 67000 D0713 05:18:05.046410 644066 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000d93350 1 D0713 05:18:05.046455 644066 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:05.046826 644066 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.046847 644066 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000d93350 2 D0713 05:18:05.046857 644066 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:05.047358 644066 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.047384 644066 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000d93350 3 D0713 05:18:05.047395 644066 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:05.057383 644066 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.057445 644066 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000d93350 4 D0713 05:18:05.057462 644066 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:05.059641 644066 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.059688 644066 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000d93350 5 D0713 05:18:05.059702 644066 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:05.059772 644066 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.059786 644066 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000d93350 6 D0713 05:18:05.059797 644066 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:05.060246 644066 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.060314 644066 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000d93350 7 D0713 05:18:05.060340 644066 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:05.060634 644066 usertrap_amd64.go:212] [ 952: 953] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.060691 644066 usertrap_amd64.go:122] [ 952: 953] Allocate a new trap: 0xc000d93350 8 D0713 05:18:05.060762 644066 usertrap_amd64.go:225] [ 952: 953] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:05.061127 644066 usertrap_amd64.go:212] [ 952: 954] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:05.061152 644066 usertrap_amd64.go:122] [ 952: 954] Allocate a new trap: 0xc000d93350 9 D0713 05:18:05.061163 644066 usertrap_amd64.go:225] [ 952: 954] Apply the binary patch addr 46b6e0 trap addr 672d0 ([184 24 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:05.061249 644066 usertrap_amd64.go:212] [ 952: 954] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.061297 644066 usertrap_amd64.go:122] [ 952: 954] Allocate a new trap: 0xc000d93350 10 D0713 05:18:05.061319 644066 usertrap_amd64.go:225] [ 952: 954] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:05.061352 644066 usertrap_amd64.go:212] [ 952: 953] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.061360 644066 usertrap_amd64.go:122] [ 952: 953] Allocate a new trap: 0xc000d93350 11 D0713 05:18:05.061368 644066 usertrap_amd64.go:225] [ 952: 953] Apply the binary patch addr 46af76 trap addr 67370 ([184 35 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:05.061950 644066 usertrap_amd64.go:212] [ 952: 953] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.061978 644066 usertrap_amd64.go:122] [ 952: 953] Allocate a new trap: 0xc000d93350 12 D0713 05:18:05.061988 644066 usertrap_amd64.go:225] [ 952: 953] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:05.063991 644066 usertrap_amd64.go:212] [ 952: 953] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.064025 644066 usertrap_amd64.go:122] [ 952: 953] Allocate a new trap: 0xc000d93350 13 D0713 05:18:05.064037 644066 usertrap_amd64.go:225] [ 952: 953] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:05.064073 644066 task_signals.go:470] [ 952: 952] Notified of signal 23 D0713 05:18:05.064139 644066 task_signals.go:220] [ 952: 952] Signal 23: delivering to handler D0713 05:18:05.070296 644066 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.070334 644066 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000d93350 14 D0713 05:18:05.070350 644066 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46af29 trap addr 67460 ([184 37 1 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:05.074444 644066 task_signals.go:470] [ 952: 952] Notified of signal 23 D0713 05:18:05.074594 644066 task_signals.go:220] [ 952: 952] Signal 23: delivering to handler I0713 05:18:05.082073 644066 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0713 05:18:05.082132 644066 usertrap_amd64.go:212] [ 952: 952] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.082148 644066 usertrap_amd64.go:122] [ 952: 952] Allocate a new trap: 0xc000d93350 15 D0713 05:18:05.082174 644066 usertrap_amd64.go:225] [ 952: 952] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 05:18:05.082228 644066 task_exit.go:204] [ 952: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.082253 644066 task_exit.go:204] [ 952: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.082278 644066 task_signals.go:204] [ 952: 954] Signal 952, PID: 954, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.082299 644066 task_exit.go:204] [ 952: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.082294 644066 task_signals.go:204] [ 952: 956] Signal 952, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.082308 644066 task_exit.go:204] [ 952: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.082341 644066 task_exit.go:204] [ 952: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.082365 644066 task_signals.go:204] [ 952: 953] Signal 952, PID: 953, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.082377 644066 task_exit.go:204] [ 952: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.082387 644066 task_signals.go:204] [ 952: 955] Signal 952, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.082405 644066 task_exit.go:204] [ 952: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.082412 644066 task_exit.go:204] [ 952: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.082455 644066 task_exit.go:204] [ 952: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.082499 644066 task_exit.go:204] [ 952: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.082513 644066 task_exit.go:204] [ 952: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.082527 644066 task_exit.go:204] [ 952: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.083825 644066 task_exit.go:204] [ 952: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.083843 644066 task_exit.go:204] [ 952: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.083859 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.083929 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.083974 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.084083 644066 task_exit.go:204] [ 952: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.085344 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.086755 644066 syscalls.go:262] [ 957: 957] Allocating stack with size of 8388608 bytes D0713 05:18:05.086889 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.088173 644066 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.088214 644066 usertrap_amd64.go:106] [ 957: 957] Map a usertrap vma at 62000 D0713 05:18:05.088294 644066 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc001cc3b30 1 D0713 05:18:05.088318 644066 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:05.088571 644066 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.088599 644066 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc001cc3b30 2 D0713 05:18:05.088614 644066 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:05.089063 644066 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.089092 644066 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc001cc3b30 3 D0713 05:18:05.089103 644066 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:05.095379 644066 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.095473 644066 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc001cc3b30 4 D0713 05:18:05.095499 644066 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:05.096541 644066 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.096570 644066 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc001cc3b30 5 D0713 05:18:05.096582 644066 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:05.096648 644066 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.096660 644066 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc001cc3b30 6 D0713 05:18:05.096668 644066 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:05.097186 644066 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.097212 644066 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc001cc3b30 7 D0713 05:18:05.097224 644066 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:05.097477 644066 usertrap_amd64.go:212] [ 957: 958] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.097504 644066 usertrap_amd64.go:122] [ 957: 958] Allocate a new trap: 0xc001cc3b30 8 D0713 05:18:05.097515 644066 usertrap_amd64.go:225] [ 957: 958] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:05.097749 644066 usertrap_amd64.go:212] [ 957: 958] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.097765 644066 usertrap_amd64.go:122] [ 957: 958] Allocate a new trap: 0xc001cc3b30 9 D0713 05:18:05.097775 644066 usertrap_amd64.go:225] [ 957: 958] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:05.097794 644066 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.097800 644066 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc001cc3b30 10 D0713 05:18:05.097812 644066 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:05.104923 644066 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.105023 644066 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc001cc3b30 11 D0713 05:18:05.105036 644066 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:05.108461 644066 usertrap_amd64.go:212] [ 957: 958] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.108507 644066 usertrap_amd64.go:122] [ 957: 958] Allocate a new trap: 0xc001cc3b30 12 D0713 05:18:05.108522 644066 usertrap_amd64.go:225] [ 957: 958] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:05.108592 644066 usertrap_amd64.go:212] [ 957: 958] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.108623 644066 usertrap_amd64.go:122] [ 957: 958] Allocate a new trap: 0xc001cc3b30 13 D0713 05:18:05.108637 644066 usertrap_amd64.go:225] [ 957: 958] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:05.108690 644066 task_signals.go:470] [ 957: 957] Notified of signal 23 D0713 05:18:05.109339 644066 task_signals.go:220] [ 957: 957] Signal 23: delivering to handler I0713 05:18:05.116663 644066 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0713 05:18:05.116802 644066 usertrap_amd64.go:212] [ 957: 957] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.116889 644066 usertrap_amd64.go:122] [ 957: 957] Allocate a new trap: 0xc001cc3b30 14 D0713 05:18:05.116919 644066 usertrap_amd64.go:225] [ 957: 957] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 05:18:05.117058 644066 task_exit.go:204] [ 957: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.117185 644066 task_exit.go:204] [ 957: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.117233 644066 task_signals.go:204] [ 957: 959] Signal 957, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.117246 644066 task_exit.go:204] [ 957: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.117257 644066 task_exit.go:204] [ 957: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.117264 644066 task_exit.go:204] [ 957: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.117300 644066 task_signals.go:204] [ 957: 958] Signal 957, PID: 958, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.117331 644066 task_exit.go:204] [ 957: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.117342 644066 task_exit.go:204] [ 957: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.117351 644066 task_exit.go:204] [ 957: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.117376 644066 task_signals.go:204] [ 957: 961] Signal 957, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.117446 644066 task_exit.go:204] [ 957: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.117490 644066 task_exit.go:204] [ 957: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.117497 644066 task_exit.go:204] [ 957: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.117405 644066 task_signals.go:204] [ 957: 960] Signal 957, PID: 960, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.117521 644066 task_exit.go:204] [ 957: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.118879 644066 task_exit.go:204] [ 957: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.118992 644066 task_exit.go:204] [ 957: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.119114 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.119325 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.119349 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.119433 644066 task_exit.go:204] [ 957: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.120182 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.121626 644066 syscalls.go:262] [ 962: 962] Allocating stack with size of 8388608 bytes D0713 05:18:05.121811 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.124557 644066 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.124602 644066 usertrap_amd64.go:106] [ 962: 962] Map a usertrap vma at 68000 D0713 05:18:05.125053 644066 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc000f89710 1 D0713 05:18:05.125087 644066 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:05.125397 644066 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.125420 644066 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc000f89710 2 D0713 05:18:05.125431 644066 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:05.125960 644066 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.125978 644066 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc000f89710 3 D0713 05:18:05.125989 644066 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:05.131901 644066 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.131934 644066 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc000f89710 4 D0713 05:18:05.131947 644066 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:05.133013 644066 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.133049 644066 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc000f89710 5 D0713 05:18:05.133065 644066 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:05.133117 644066 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.133127 644066 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc000f89710 6 D0713 05:18:05.133135 644066 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:05.133347 644066 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.133377 644066 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc000f89710 7 D0713 05:18:05.133386 644066 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:05.133583 644066 usertrap_amd64.go:212] [ 962: 963] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.133608 644066 usertrap_amd64.go:122] [ 962: 963] Allocate a new trap: 0xc000f89710 8 D0713 05:18:05.133621 644066 usertrap_amd64.go:225] [ 962: 963] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:05.133814 644066 usertrap_amd64.go:212] [ 962: 963] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.133828 644066 usertrap_amd64.go:122] [ 962: 963] Allocate a new trap: 0xc000f89710 9 D0713 05:18:05.133844 644066 usertrap_amd64.go:225] [ 962: 963] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:05.133879 644066 usertrap_amd64.go:212] [ 962: 964] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:05.133892 644066 usertrap_amd64.go:122] [ 962: 964] Allocate a new trap: 0xc000f89710 10 D0713 05:18:05.133903 644066 usertrap_amd64.go:225] [ 962: 964] Apply the binary patch addr 46b6e0 trap addr 68320 ([184 24 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:05.134083 644066 usertrap_amd64.go:212] [ 962: 964] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.134150 644066 usertrap_amd64.go:122] [ 962: 964] Allocate a new trap: 0xc000f89710 11 D0713 05:18:05.134176 644066 usertrap_amd64.go:225] [ 962: 964] Apply the binary patch addr 46b57c trap addr 68370 ([184 202 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:05.142310 644066 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.142336 644066 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc000f89710 12 D0713 05:18:05.142344 644066 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46af29 trap addr 683c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:05.145052 644066 usertrap_amd64.go:212] [ 962: 963] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.145085 644066 usertrap_amd64.go:122] [ 962: 963] Allocate a new trap: 0xc000f89710 13 D0713 05:18:05.145099 644066 usertrap_amd64.go:225] [ 962: 963] Apply the binary patch addr 46b020 trap addr 68410 ([184 39 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:05.146870 644066 usertrap_amd64.go:212] [ 962: 963] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.146898 644066 usertrap_amd64.go:122] [ 962: 963] Allocate a new trap: 0xc000f89710 14 D0713 05:18:05.146910 644066 usertrap_amd64.go:225] [ 962: 963] Apply the binary patch addr 46b04f trap addr 68460 ([184 234 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:05.146993 644066 task_signals.go:470] [ 962: 962] Notified of signal 23 D0713 05:18:05.147064 644066 task_signals.go:220] [ 962: 962] Signal 23: delivering to handler I0713 05:18:05.153559 644066 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0713 05:18:05.153627 644066 usertrap_amd64.go:212] [ 962: 962] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.153685 644066 usertrap_amd64.go:122] [ 962: 962] Allocate a new trap: 0xc000f89710 15 D0713 05:18:05.153728 644066 usertrap_amd64.go:225] [ 962: 962] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 05:18:05.153769 644066 task_exit.go:204] [ 962: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.153833 644066 task_exit.go:204] [ 962: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.153887 644066 task_signals.go:204] [ 962: 966] Signal 962, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.153915 644066 task_exit.go:204] [ 962: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.153910 644066 task_signals.go:204] [ 962: 965] Signal 962, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.153926 644066 task_exit.go:204] [ 962: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.153932 644066 task_exit.go:204] [ 962: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.153891 644066 task_signals.go:204] [ 962: 964] Signal 962, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.153951 644066 task_exit.go:204] [ 962: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.153959 644066 task_signals.go:204] [ 962: 963] Signal 962, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.153972 644066 task_exit.go:204] [ 962: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.153978 644066 task_exit.go:204] [ 962: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.153988 644066 task_exit.go:204] [ 962: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.154014 644066 task_exit.go:204] [ 962: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.154022 644066 task_exit.go:204] [ 962: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.154039 644066 task_exit.go:204] [ 962: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.155251 644066 task_exit.go:204] [ 962: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.155287 644066 task_exit.go:204] [ 962: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.155303 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.155474 644066 task_exit.go:204] [ 962: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.155876 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.155898 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.156431 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.157798 644066 syscalls.go:262] [ 967: 967] Allocating stack with size of 8388608 bytes D0713 05:18:05.157927 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.158884 644066 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.158961 644066 usertrap_amd64.go:106] [ 967: 967] Map a usertrap vma at 60000 D0713 05:18:05.159074 644066 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc000d93950 1 D0713 05:18:05.159111 644066 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:05.159532 644066 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.159570 644066 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc000d93950 2 D0713 05:18:05.159584 644066 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:05.160189 644066 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.160218 644066 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc000d93950 3 D0713 05:18:05.160233 644066 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:05.165832 644066 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.165868 644066 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc000d93950 4 D0713 05:18:05.165882 644066 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:05.167118 644066 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.167176 644066 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc000d93950 5 D0713 05:18:05.167198 644066 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:05.167276 644066 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.167288 644066 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc000d93950 6 D0713 05:18:05.167297 644066 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:05.167704 644066 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.167730 644066 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc000d93950 7 D0713 05:18:05.167739 644066 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:05.168630 644066 usertrap_amd64.go:212] [ 967: 968] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.168661 644066 usertrap_amd64.go:122] [ 967: 968] Allocate a new trap: 0xc000d93950 8 D0713 05:18:05.168670 644066 usertrap_amd64.go:225] [ 967: 968] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:05.169041 644066 usertrap_amd64.go:212] [ 967: 968] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.169069 644066 usertrap_amd64.go:122] [ 967: 968] Allocate a new trap: 0xc000d93950 9 D0713 05:18:05.169082 644066 usertrap_amd64.go:225] [ 967: 968] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:05.169115 644066 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.169123 644066 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc000d93950 10 D0713 05:18:05.169132 644066 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:05.178366 644066 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.178410 644066 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc000d93950 11 D0713 05:18:05.178444 644066 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:05.180988 644066 usertrap_amd64.go:212] [ 967: 968] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.181016 644066 usertrap_amd64.go:122] [ 967: 968] Allocate a new trap: 0xc000d93950 12 D0713 05:18:05.181031 644066 usertrap_amd64.go:225] [ 967: 968] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:05.181105 644066 usertrap_amd64.go:212] [ 967: 968] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.181114 644066 usertrap_amd64.go:122] [ 967: 968] Allocate a new trap: 0xc000d93950 13 D0713 05:18:05.181121 644066 usertrap_amd64.go:225] [ 967: 968] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:05.181333 644066 task_signals.go:470] [ 967: 967] Notified of signal 23 D0713 05:18:05.181383 644066 task_signals.go:220] [ 967: 967] Signal 23: delivering to handler I0713 05:18:05.191239 644066 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0713 05:18:05.191336 644066 usertrap_amd64.go:212] [ 967: 967] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.191360 644066 usertrap_amd64.go:122] [ 967: 967] Allocate a new trap: 0xc000d93950 14 D0713 05:18:05.191383 644066 usertrap_amd64.go:225] [ 967: 967] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:05.191423 644066 task_exit.go:204] [ 967: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.191450 644066 task_exit.go:204] [ 967: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.191495 644066 task_signals.go:204] [ 967: 968] Signal 967, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.191520 644066 task_exit.go:204] [ 967: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.191526 644066 task_exit.go:204] [ 967: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.191530 644066 task_exit.go:204] [ 967: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.191550 644066 task_signals.go:204] [ 967: 969] Signal 967, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.191557 644066 task_exit.go:204] [ 967: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.191562 644066 task_exit.go:204] [ 967: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.191565 644066 task_exit.go:204] [ 967: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.191582 644066 task_signals.go:204] [ 967: 970] Signal 967, PID: 970, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.191588 644066 task_exit.go:204] [ 967: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.191592 644066 task_exit.go:204] [ 967: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.191597 644066 task_exit.go:204] [ 967: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.191609 644066 task_signals.go:204] [ 967: 971] Signal 967, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.191629 644066 task_exit.go:204] [ 967: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.192747 644066 task_exit.go:204] [ 967: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.192762 644066 task_exit.go:204] [ 967: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.192774 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.192844 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.192873 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.193057 644066 task_exit.go:204] [ 967: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.193986 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.195482 644066 syscalls.go:262] [ 972: 972] Allocating stack with size of 8388608 bytes D0713 05:18:05.195606 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.196928 644066 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.197086 644066 usertrap_amd64.go:106] [ 972: 972] Map a usertrap vma at 61000 D0713 05:18:05.197225 644066 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc0007fa030 1 D0713 05:18:05.197355 644066 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:05.197647 644066 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.197711 644066 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc0007fa030 2 D0713 05:18:05.197733 644066 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:05.198306 644066 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.198327 644066 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc0007fa030 3 D0713 05:18:05.198343 644066 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:05.207675 644066 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.207702 644066 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc0007fa030 4 D0713 05:18:05.207717 644066 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:05.209733 644066 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.209760 644066 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc0007fa030 5 D0713 05:18:05.209772 644066 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:05.209817 644066 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.209824 644066 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc0007fa030 6 D0713 05:18:05.209831 644066 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:05.210020 644066 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.210042 644066 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc0007fa030 7 D0713 05:18:05.210052 644066 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:05.210269 644066 usertrap_amd64.go:212] [ 972: 973] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.210290 644066 usertrap_amd64.go:122] [ 972: 973] Allocate a new trap: 0xc0007fa030 8 D0713 05:18:05.210300 644066 usertrap_amd64.go:225] [ 972: 973] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:05.210526 644066 usertrap_amd64.go:212] [ 972: 973] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.210599 644066 usertrap_amd64.go:122] [ 972: 973] Allocate a new trap: 0xc0007fa030 9 D0713 05:18:05.210619 644066 usertrap_amd64.go:225] [ 972: 973] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:05.210700 644066 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.210715 644066 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc0007fa030 10 D0713 05:18:05.210725 644066 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:05.220172 644066 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.220211 644066 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc0007fa030 11 D0713 05:18:05.220223 644066 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:05.222910 644066 usertrap_amd64.go:212] [ 972: 973] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.222943 644066 usertrap_amd64.go:122] [ 972: 973] Allocate a new trap: 0xc0007fa030 12 D0713 05:18:05.222963 644066 usertrap_amd64.go:225] [ 972: 973] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:05.223006 644066 usertrap_amd64.go:212] [ 972: 973] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.223032 644066 usertrap_amd64.go:122] [ 972: 973] Allocate a new trap: 0xc0007fa030 13 D0713 05:18:05.223043 644066 usertrap_amd64.go:225] [ 972: 973] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:05.223092 644066 task_signals.go:470] [ 972: 972] Notified of signal 23 D0713 05:18:05.223180 644066 task_signals.go:220] [ 972: 972] Signal 23: delivering to handler D0713 05:18:05.233726 644066 task_signals.go:470] [ 972: 972] Notified of signal 23 D0713 05:18:05.234416 644066 task_signals.go:220] [ 972: 972] Signal 23: delivering to handler I0713 05:18:05.238512 644066 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0713 05:18:05.238595 644066 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.238610 644066 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc0007fa030 14 D0713 05:18:05.238624 644066 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:05.238685 644066 task_exit.go:204] [ 972: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.238721 644066 task_exit.go:204] [ 972: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.238753 644066 task_signals.go:204] [ 972: 973] Signal 972, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.238768 644066 task_exit.go:204] [ 972: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.238775 644066 task_exit.go:204] [ 972: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.238779 644066 task_exit.go:204] [ 972: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.238800 644066 task_signals.go:204] [ 972: 974] Signal 972, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.238821 644066 task_exit.go:204] [ 972: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.238830 644066 task_exit.go:204] [ 972: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.238835 644066 task_exit.go:204] [ 972: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.238854 644066 task_signals.go:204] [ 972: 975] Signal 972, PID: 975, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.238864 644066 task_exit.go:204] [ 972: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.238874 644066 task_exit.go:204] [ 972: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.238881 644066 task_exit.go:204] [ 972: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.238896 644066 task_signals.go:204] [ 972: 976] Signal 972, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.238917 644066 task_exit.go:204] [ 972: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.240280 644066 task_exit.go:204] [ 972: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.240324 644066 task_exit.go:204] [ 972: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.240342 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.240387 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.240407 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.240552 644066 task_exit.go:204] [ 972: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.241025 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.242434 644066 syscalls.go:262] [ 977: 977] Allocating stack with size of 8388608 bytes D0713 05:18:05.242534 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.243862 644066 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.243903 644066 usertrap_amd64.go:106] [ 977: 977] Map a usertrap vma at 61000 D0713 05:18:05.244059 644066 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001d235c0 1 D0713 05:18:05.244091 644066 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:05.244517 644066 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.244561 644066 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001d235c0 2 D0713 05:18:05.244580 644066 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:05.245577 644066 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.245603 644066 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001d235c0 3 D0713 05:18:05.245613 644066 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:05.252154 644066 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.252259 644066 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001d235c0 4 D0713 05:18:05.252318 644066 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:05.253621 644066 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.253646 644066 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001d235c0 5 D0713 05:18:05.253655 644066 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:05.253714 644066 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.253747 644066 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001d235c0 6 D0713 05:18:05.253755 644066 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:05.254128 644066 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.254172 644066 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001d235c0 7 D0713 05:18:05.254188 644066 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:05.254392 644066 usertrap_amd64.go:212] [ 977: 978] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.254422 644066 usertrap_amd64.go:122] [ 977: 978] Allocate a new trap: 0xc001d235c0 8 D0713 05:18:05.254441 644066 usertrap_amd64.go:225] [ 977: 978] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:05.254609 644066 usertrap_amd64.go:212] [ 977: 978] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.254617 644066 usertrap_amd64.go:122] [ 977: 978] Allocate a new trap: 0xc001d235c0 9 D0713 05:18:05.254629 644066 usertrap_amd64.go:225] [ 977: 978] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:05.254785 644066 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.254804 644066 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001d235c0 10 D0713 05:18:05.254817 644066 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:05.262244 644066 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.262280 644066 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001d235c0 11 D0713 05:18:05.262296 644066 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:05.265096 644066 usertrap_amd64.go:212] [ 977: 978] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.265184 644066 usertrap_amd64.go:122] [ 977: 978] Allocate a new trap: 0xc001d235c0 12 D0713 05:18:05.265211 644066 usertrap_amd64.go:225] [ 977: 978] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:05.265347 644066 usertrap_amd64.go:212] [ 977: 978] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.265388 644066 usertrap_amd64.go:122] [ 977: 978] Allocate a new trap: 0xc001d235c0 13 D0713 05:18:05.265407 644066 usertrap_amd64.go:225] [ 977: 978] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:05.265501 644066 task_signals.go:470] [ 977: 977] Notified of signal 23 D0713 05:18:05.265612 644066 task_signals.go:220] [ 977: 977] Signal 23: delivering to handler D0713 05:18:05.273119 644066 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.273161 644066 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc001d235c0 14 D0713 05:18:05.273173 644066 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:05.273245 644066 task_exit.go:204] [ 977: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.273281 644066 task_exit.go:204] [ 977: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.273299 644066 task_signals.go:204] [ 977: 978] Signal 977, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.273334 644066 task_exit.go:204] [ 977: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.273333 644066 task_signals.go:204] [ 977: 979] Signal 977, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.273345 644066 task_exit.go:204] [ 977: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.273307 644066 task_signals.go:204] [ 977: 980] Signal 977, PID: 980, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.273350 644066 task_exit.go:204] [ 977: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.273319 644066 task_signals.go:204] [ 977: 981] Signal 977, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.273425 644066 task_exit.go:204] [ 977: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.273478 644066 task_exit.go:204] [ 977: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.273538 644066 task_exit.go:204] [ 977: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.273564 644066 task_exit.go:204] [ 977: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.273609 644066 task_exit.go:204] [ 977: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.273614 644066 task_exit.go:204] [ 977: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.273624 644066 task_exit.go:204] [ 977: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.274982 644066 task_exit.go:204] [ 977: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.275019 644066 task_exit.go:204] [ 977: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.275035 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.275101 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.275134 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.275329 644066 task_exit.go:204] [ 977: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.276140 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.277638 644066 syscalls.go:262] [ 982: 982] Allocating stack with size of 8388608 bytes D0713 05:18:05.277747 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.279314 644066 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.279364 644066 usertrap_amd64.go:106] [ 982: 982] Map a usertrap vma at 65000 D0713 05:18:05.279514 644066 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0018e00f0 1 D0713 05:18:05.279556 644066 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:05.280063 644066 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.280169 644066 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0018e00f0 2 D0713 05:18:05.280195 644066 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:05.281040 644066 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.281075 644066 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0018e00f0 3 D0713 05:18:05.281091 644066 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:05.288474 644066 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.288510 644066 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0018e00f0 4 D0713 05:18:05.288533 644066 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:05.289585 644066 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.289612 644066 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0018e00f0 5 D0713 05:18:05.289622 644066 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:05.289686 644066 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.289695 644066 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0018e00f0 6 D0713 05:18:05.289704 644066 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:05.289912 644066 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.289944 644066 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0018e00f0 7 D0713 05:18:05.289953 644066 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:05.290133 644066 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.290159 644066 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc0018e00f0 8 D0713 05:18:05.290170 644066 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:05.290369 644066 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.290407 644066 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc0018e00f0 9 D0713 05:18:05.290423 644066 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:05.290543 644066 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.290560 644066 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0018e00f0 10 D0713 05:18:05.290573 644066 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:05.297260 644066 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.297290 644066 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0018e00f0 11 D0713 05:18:05.297303 644066 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:05.300788 644066 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.300823 644066 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc0018e00f0 12 D0713 05:18:05.300838 644066 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:05.301132 644066 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.301151 644066 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc0018e00f0 13 D0713 05:18:05.301163 644066 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:05.301279 644066 task_signals.go:470] [ 982: 982] Notified of signal 23 D0713 05:18:05.301316 644066 task_signals.go:220] [ 982: 982] Signal 23: delivering to handler D0713 05:18:05.306845 644066 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.306863 644066 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc0018e00f0 14 D0713 05:18:05.306873 644066 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:05.306936 644066 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.306984 644066 task_signals.go:204] [ 982: 983] Signal 982, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.306987 644066 task_signals.go:204] [ 982: 986] Signal 982, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.307011 644066 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.307053 644066 task_signals.go:204] [ 982: 984] Signal 982, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.307069 644066 task_signals.go:204] [ 982: 985] Signal 982, PID: 985, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.307093 644066 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.307103 644066 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.307115 644066 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.307129 644066 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.307148 644066 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.307154 644066 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.307163 644066 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.307180 644066 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.307197 644066 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.307217 644066 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.308302 644066 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.308332 644066 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.308347 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.308380 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.308395 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.308582 644066 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.309271 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.310353 644066 syscalls.go:262] [ 987: 987] Allocating stack with size of 8388608 bytes D0713 05:18:05.310441 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.311598 644066 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.311644 644066 usertrap_amd64.go:106] [ 987: 987] Map a usertrap vma at 66000 D0713 05:18:05.311767 644066 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0007fa840 1 D0713 05:18:05.311801 644066 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:05.312127 644066 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.312156 644066 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0007fa840 2 D0713 05:18:05.312168 644066 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:05.312898 644066 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.312925 644066 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0007fa840 3 D0713 05:18:05.312934 644066 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:05.321356 644066 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.321445 644066 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0007fa840 4 D0713 05:18:05.321485 644066 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:05.322486 644066 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.322516 644066 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0007fa840 5 D0713 05:18:05.322528 644066 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:05.322588 644066 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.322595 644066 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0007fa840 6 D0713 05:18:05.322600 644066 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:05.322877 644066 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.322901 644066 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0007fa840 7 D0713 05:18:05.322967 644066 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:05.323441 644066 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.323479 644066 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc0007fa840 8 D0713 05:18:05.323574 644066 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:05.324069 644066 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.324113 644066 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc0007fa840 9 D0713 05:18:05.324131 644066 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:05.324187 644066 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.324195 644066 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0007fa840 10 D0713 05:18:05.324257 644066 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:05.332394 644066 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.332423 644066 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0007fa840 11 D0713 05:18:05.332431 644066 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:05.334910 644066 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.334933 644066 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc0007fa840 12 D0713 05:18:05.334941 644066 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:05.334995 644066 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.335001 644066 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc0007fa840 13 D0713 05:18:05.335007 644066 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:05.335375 644066 task_signals.go:470] [ 987: 987] Notified of signal 23 D0713 05:18:05.335485 644066 task_signals.go:220] [ 987: 987] Signal 23: delivering to handler D0713 05:18:05.342693 644066 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.342733 644066 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0007fa840 14 D0713 05:18:05.342745 644066 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:05.342820 644066 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.342885 644066 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.342960 644066 task_signals.go:204] [ 987: 988] Signal 987, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.343000 644066 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.342933 644066 task_signals.go:204] [ 987: 991] Signal 987, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.343020 644066 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.343028 644066 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.343045 644066 task_signals.go:204] [ 987: 989] Signal 987, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.343064 644066 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.343111 644066 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.343127 644066 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.343151 644066 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.343216 644066 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.343248 644066 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.343289 644066 task_signals.go:204] [ 987: 990] Signal 987, PID: 990, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.343310 644066 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.344508 644066 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.344537 644066 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.344675 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.344913 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.344997 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.345636 644066 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitZombie to TaskExitDead I0713 05:18:05.345943 644066 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0713 05:18:05.347430 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.349448 644066 syscalls.go:262] [ 992: 992] Allocating stack with size of 8388608 bytes D0713 05:18:05.349649 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.350724 644066 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.350842 644066 usertrap_amd64.go:106] [ 992: 992] Map a usertrap vma at 66000 D0713 05:18:05.350961 644066 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc000b089f0 1 D0713 05:18:05.351004 644066 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:05.352002 644066 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.352031 644066 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc000b089f0 2 D0713 05:18:05.352045 644066 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:05.352725 644066 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.352754 644066 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc000b089f0 3 D0713 05:18:05.352772 644066 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:05.359308 644066 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.359350 644066 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc000b089f0 4 D0713 05:18:05.359365 644066 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:05.361612 644066 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.361717 644066 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc000b089f0 5 D0713 05:18:05.361734 644066 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:05.361856 644066 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.361879 644066 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc000b089f0 6 D0713 05:18:05.361888 644066 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:05.362433 644066 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.362528 644066 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc000b089f0 7 D0713 05:18:05.362572 644066 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:05.362874 644066 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.362902 644066 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc000b089f0 8 D0713 05:18:05.362913 644066 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:05.363238 644066 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.363270 644066 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc000b089f0 9 D0713 05:18:05.363282 644066 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:05.363346 644066 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.363379 644066 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc000b089f0 10 D0713 05:18:05.363399 644066 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:05.371955 644066 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.371999 644066 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc000b089f0 11 D0713 05:18:05.372015 644066 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:05.375796 644066 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.375840 644066 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc000b089f0 12 D0713 05:18:05.375853 644066 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:05.375871 644066 usertrap_amd64.go:212] [ 992: 993] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.375877 644066 usertrap_amd64.go:122] [ 992: 993] Allocate a new trap: 0xc000b089f0 13 D0713 05:18:05.375884 644066 usertrap_amd64.go:225] [ 992: 993] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:05.375906 644066 task_signals.go:470] [ 992: 992] Notified of signal 23 D0713 05:18:05.375966 644066 task_signals.go:220] [ 992: 992] Signal 23: delivering to handler I0713 05:18:05.382600 644066 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0713 05:18:05.382753 644066 usertrap_amd64.go:212] [ 992: 992] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.382795 644066 usertrap_amd64.go:122] [ 992: 992] Allocate a new trap: 0xc000b089f0 14 D0713 05:18:05.382813 644066 usertrap_amd64.go:225] [ 992: 992] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:05.383025 644066 task_exit.go:204] [ 992: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.383075 644066 task_exit.go:204] [ 992: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.383093 644066 task_signals.go:204] [ 992: 993] Signal 992, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.383099 644066 task_signals.go:204] [ 992: 995] Signal 992, PID: 995, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.383114 644066 task_exit.go:204] [ 992: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.383126 644066 task_signals.go:204] [ 992: 994] Signal 992, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.383138 644066 task_signals.go:204] [ 992: 997] Signal 992, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.383152 644066 task_signals.go:204] [ 992: 996] Signal 992, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.383164 644066 task_exit.go:204] [ 992: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.383171 644066 task_exit.go:204] [ 992: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.383193 644066 task_exit.go:204] [ 992: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.383211 644066 task_exit.go:204] [ 992: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.383217 644066 task_exit.go:204] [ 992: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.383226 644066 task_exit.go:204] [ 992: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.383241 644066 task_exit.go:204] [ 992: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.383257 644066 task_exit.go:204] [ 992: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.383266 644066 task_exit.go:204] [ 992: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.383273 644066 task_exit.go:204] [ 992: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.383279 644066 task_exit.go:204] [ 992: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.383333 644066 task_exit.go:204] [ 992: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.384599 644066 task_exit.go:204] [ 992: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.384653 644066 task_exit.go:204] [ 992: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.384673 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.384757 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.384788 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.384923 644066 task_exit.go:204] [ 992: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.386637 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.388350 644066 syscalls.go:262] [ 998: 998] Allocating stack with size of 8388608 bytes D0713 05:18:05.388444 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.389789 644066 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.389830 644066 usertrap_amd64.go:106] [ 998: 998] Map a usertrap vma at 60000 D0713 05:18:05.389926 644066 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0007facf0 1 D0713 05:18:05.389985 644066 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:05.390429 644066 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.390462 644066 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0007facf0 2 D0713 05:18:05.390476 644066 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:05.391349 644066 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.391380 644066 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0007facf0 3 D0713 05:18:05.391391 644066 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:05.399331 644066 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.399437 644066 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0007facf0 4 D0713 05:18:05.399460 644066 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:05.400743 644066 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.400786 644066 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0007facf0 5 D0713 05:18:05.400802 644066 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:05.400858 644066 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.400868 644066 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0007facf0 6 D0713 05:18:05.400875 644066 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:05.401246 644066 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.401279 644066 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0007facf0 7 D0713 05:18:05.401291 644066 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:05.401496 644066 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.401543 644066 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc0007facf0 8 D0713 05:18:05.401561 644066 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:05.401771 644066 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.401808 644066 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc0007facf0 9 D0713 05:18:05.401820 644066 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:05.401931 644066 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.401953 644066 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0007facf0 10 D0713 05:18:05.402001 644066 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:05.411439 644066 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.411477 644066 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0007facf0 11 D0713 05:18:05.411491 644066 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:05.414226 644066 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.414264 644066 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc0007facf0 12 D0713 05:18:05.414279 644066 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:05.414514 644066 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.414536 644066 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc0007facf0 13 D0713 05:18:05.414547 644066 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:05.414702 644066 task_signals.go:470] [ 998: 998] Notified of signal 23 D0713 05:18:05.415202 644066 task_signals.go:220] [ 998: 998] Signal 23: delivering to handler I0713 05:18:05.424249 644066 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0713 05:18:05.424363 644066 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.424411 644066 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc0007facf0 14 D0713 05:18:05.424426 644066 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:05.424609 644066 task_exit.go:204] [ 998: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.424642 644066 task_exit.go:204] [ 998: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.424703 644066 task_signals.go:204] [ 998: 1003] Signal 998, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.424727 644066 task_signals.go:204] [ 998: 999] Signal 998, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.424736 644066 task_exit.go:204] [ 998: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.424716 644066 task_signals.go:204] [ 998: 1001] Signal 998, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.424747 644066 task_exit.go:204] [ 998: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.424751 644066 task_exit.go:204] [ 998: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.424775 644066 task_exit.go:204] [ 998: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.424781 644066 task_signals.go:204] [ 998: 1000] Signal 998, PID: 1000, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.424791 644066 task_signals.go:204] [ 998: 1002] Signal 998, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.424811 644066 task_exit.go:204] [ 998: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.424818 644066 task_exit.go:204] [ 998: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.424841 644066 task_exit.go:204] [ 998: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.424851 644066 task_exit.go:204] [ 998: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.424857 644066 task_exit.go:204] [ 998: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.424867 644066 task_exit.go:204] [ 998: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.424890 644066 task_exit.go:204] [ 998: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.424896 644066 task_exit.go:204] [ 998: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.424905 644066 task_exit.go:204] [ 998: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.426099 644066 task_exit.go:204] [ 998: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.426194 644066 task_exit.go:204] [ 998: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.426234 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.426349 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.426365 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.426478 644066 task_exit.go:204] [ 998: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.427738 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.429601 644066 syscalls.go:262] [ 1004: 1004] Allocating stack with size of 8388608 bytes D0713 05:18:05.429755 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.431748 644066 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.431786 644066 usertrap_amd64.go:106] [ 1004: 1004] Map a usertrap vma at 64000 D0713 05:18:05.431911 644066 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0018e0c30 1 D0713 05:18:05.431975 644066 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:05.432336 644066 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.432363 644066 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0018e0c30 2 D0713 05:18:05.432375 644066 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:05.433043 644066 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.433072 644066 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0018e0c30 3 D0713 05:18:05.433080 644066 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:05.439655 644066 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.439706 644066 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0018e0c30 4 D0713 05:18:05.439719 644066 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:05.441833 644066 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.441855 644066 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0018e0c30 5 D0713 05:18:05.441870 644066 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:05.441943 644066 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.441974 644066 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0018e0c30 6 D0713 05:18:05.441985 644066 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:05.442455 644066 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.442474 644066 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0018e0c30 7 D0713 05:18:05.442483 644066 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:05.442699 644066 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.442731 644066 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc0018e0c30 8 D0713 05:18:05.442747 644066 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:05.443242 644066 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.443265 644066 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc0018e0c30 9 D0713 05:18:05.443276 644066 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:05.443307 644066 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.443315 644066 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0018e0c30 10 D0713 05:18:05.443341 644066 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:05.453390 644066 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.453421 644066 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0018e0c30 11 D0713 05:18:05.453434 644066 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:05.453753 644066 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.453780 644066 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc0018e0c30 12 D0713 05:18:05.453792 644066 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:05.453860 644066 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.453873 644066 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc0018e0c30 13 D0713 05:18:05.453879 644066 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:05.453898 644066 task_signals.go:470] [ 1004: 1004] Notified of signal 23 D0713 05:18:05.454019 644066 task_signals.go:220] [ 1004: 1004] Signal 23: delivering to handler D0713 05:18:05.464909 644066 task_signals.go:470] [ 1004: 1004] Notified of signal 23 D0713 05:18:05.465070 644066 task_signals.go:220] [ 1004: 1004] Signal 23: delivering to handler D0713 05:18:05.465387 644066 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.465443 644066 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc0018e0c30 14 D0713 05:18:05.465461 644066 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:05.465532 644066 task_exit.go:204] [ 1004: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.465567 644066 task_exit.go:204] [ 1004: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.465576 644066 task_signals.go:204] [ 1004: 1006] Signal 1004, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.465598 644066 task_signals.go:204] [ 1004: 1008] Signal 1004, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.465598 644066 task_signals.go:204] [ 1004: 1007] Signal 1004, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.465609 644066 task_exit.go:204] [ 1004: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.465626 644066 task_signals.go:204] [ 1004: 1005] Signal 1004, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.465634 644066 task_exit.go:204] [ 1004: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.465692 644066 task_exit.go:204] [ 1004: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.465742 644066 task_exit.go:204] [ 1004: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.465779 644066 task_exit.go:204] [ 1004: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.465796 644066 task_exit.go:204] [ 1004: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.465815 644066 task_exit.go:204] [ 1004: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.465841 644066 task_exit.go:204] [ 1004: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.465857 644066 task_exit.go:204] [ 1004: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.465869 644066 task_exit.go:204] [ 1004: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.467070 644066 task_exit.go:204] [ 1004: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.467091 644066 task_exit.go:204] [ 1004: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.467102 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.467128 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.467136 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.467290 644066 task_exit.go:204] [ 1004: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.467924 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.469654 644066 syscalls.go:262] [ 1009: 1009] Allocating stack with size of 8388608 bytes D0713 05:18:05.469806 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.471407 644066 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.471564 644066 usertrap_amd64.go:106] [ 1009: 1009] Map a usertrap vma at 61000 D0713 05:18:05.471736 644066 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0018e0ed0 1 D0713 05:18:05.471784 644066 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:05.472121 644066 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.472153 644066 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0018e0ed0 2 D0713 05:18:05.472165 644066 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:05.472714 644066 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.472754 644066 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0018e0ed0 3 D0713 05:18:05.472765 644066 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:05.483820 644066 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.483868 644066 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0018e0ed0 4 D0713 05:18:05.483883 644066 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:05.485886 644066 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.485922 644066 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0018e0ed0 5 D0713 05:18:05.485933 644066 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:05.486844 644066 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.486865 644066 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0018e0ed0 6 D0713 05:18:05.486876 644066 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:05.489421 644066 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.489489 644066 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0018e0ed0 7 D0713 05:18:05.489509 644066 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:05.490142 644066 usertrap_amd64.go:212] [ 1009: 1011] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.490175 644066 usertrap_amd64.go:122] [ 1009: 1011] Allocate a new trap: 0xc0018e0ed0 8 D0713 05:18:05.490190 644066 usertrap_amd64.go:225] [ 1009: 1011] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:05.490237 644066 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.490265 644066 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0018e0ed0 9 D0713 05:18:05.490288 644066 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:05.490506 644066 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.490534 644066 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0018e0ed0 10 D0713 05:18:05.490546 644066 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:05.491139 644066 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.491229 644066 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0018e0ed0 11 D0713 05:18:05.491263 644066 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:05.491300 644066 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.491309 644066 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0018e0ed0 12 D0713 05:18:05.491317 644066 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:05.491391 644066 task_signals.go:470] [ 1009: 1009] Notified of signal 23 D0713 05:18:05.491451 644066 task_signals.go:220] [ 1009: 1009] Signal 23: delivering to handler D0713 05:18:05.502408 644066 task_signals.go:470] [ 1009: 1009] Notified of signal 23 D0713 05:18:05.502492 644066 task_signals.go:220] [ 1009: 1009] Signal 23: delivering to handler D0713 05:18:05.503211 644066 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.503237 644066 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0018e0ed0 13 D0713 05:18:05.503252 644066 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:05.513641 644066 task_signals.go:470] [ 1009: 1009] Notified of signal 23 D0713 05:18:05.514365 644066 task_signals.go:220] [ 1009: 1009] Signal 23: delivering to handler D0713 05:18:05.514808 644066 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.514849 644066 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0018e0ed0 14 D0713 05:18:05.514863 644066 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:05.514963 644066 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.515003 644066 task_signals.go:204] [ 1009: 1010] Signal 1009, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.515021 644066 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.515040 644066 task_signals.go:204] [ 1009: 1011] Signal 1009, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.515044 644066 task_signals.go:204] [ 1009: 1012] Signal 1009, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.515065 644066 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.515074 644066 task_signals.go:204] [ 1009: 1013] Signal 1009, PID: 1013, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.515088 644066 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.515095 644066 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.515111 644066 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.515118 644066 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.515133 644066 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.515146 644066 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.515169 644066 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.515183 644066 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.515193 644066 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.516422 644066 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.516457 644066 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.516471 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.516556 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.516622 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.516720 644066 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.517765 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.519900 644066 syscalls.go:262] [ 1014: 1014] Allocating stack with size of 8388608 bytes D0713 05:18:05.520126 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.521987 644066 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.522050 644066 usertrap_amd64.go:106] [ 1014: 1014] Map a usertrap vma at 63000 D0713 05:18:05.522169 644066 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000a4e660 1 D0713 05:18:05.522232 644066 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:05.522777 644066 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.522821 644066 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000a4e660 2 D0713 05:18:05.522837 644066 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:05.524021 644066 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.524046 644066 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000a4e660 3 D0713 05:18:05.524078 644066 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:05.531279 644066 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.531305 644066 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000a4e660 4 D0713 05:18:05.531318 644066 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:05.532409 644066 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.532447 644066 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000a4e660 5 D0713 05:18:05.532458 644066 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:05.532516 644066 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.532533 644066 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000a4e660 6 D0713 05:18:05.532540 644066 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:05.532727 644066 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.532740 644066 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000a4e660 7 D0713 05:18:05.532749 644066 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:05.532899 644066 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.532924 644066 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc000a4e660 8 D0713 05:18:05.532933 644066 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:05.533443 644066 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.533512 644066 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc000a4e660 9 D0713 05:18:05.533532 644066 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:05.533866 644066 usertrap_amd64.go:212] [ 1014: 1017] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.533896 644066 usertrap_amd64.go:122] [ 1014: 1017] Allocate a new trap: 0xc000a4e660 10 D0713 05:18:05.533908 644066 usertrap_amd64.go:225] [ 1014: 1017] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:05.543636 644066 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.543664 644066 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000a4e660 11 D0713 05:18:05.543673 644066 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:05.546223 644066 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.546259 644066 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc000a4e660 12 D0713 05:18:05.546273 644066 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:05.546450 644066 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.546495 644066 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc000a4e660 13 D0713 05:18:05.546516 644066 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:05.546586 644066 task_signals.go:470] [ 1014: 1014] Notified of signal 23 D0713 05:18:05.546700 644066 task_signals.go:220] [ 1014: 1014] Signal 23: delivering to handler D0713 05:18:05.555289 644066 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.555320 644066 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000a4e660 14 D0713 05:18:05.555334 644066 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:05.555390 644066 task_exit.go:204] [ 1014: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.555442 644066 task_exit.go:204] [ 1014: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.555472 644066 task_signals.go:204] [ 1014: 1016] Signal 1014, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.555503 644066 task_exit.go:204] [ 1014: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.555511 644066 task_exit.go:204] [ 1014: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.555517 644066 task_exit.go:204] [ 1014: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.555534 644066 task_signals.go:204] [ 1014: 1015] Signal 1014, PID: 1015, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.555546 644066 task_exit.go:204] [ 1014: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.555554 644066 task_exit.go:204] [ 1014: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.555559 644066 task_exit.go:204] [ 1014: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.555596 644066 task_signals.go:204] [ 1014: 1017] Signal 1014, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.555628 644066 task_signals.go:204] [ 1014: 1018] Signal 1014, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.555631 644066 task_exit.go:204] [ 1014: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.555669 644066 task_exit.go:204] [ 1014: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.555681 644066 task_exit.go:204] [ 1014: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.555697 644066 task_exit.go:204] [ 1014: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.557148 644066 task_exit.go:204] [ 1014: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.557180 644066 task_exit.go:204] [ 1014: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.557195 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.557634 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.557694 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.557770 644066 task_exit.go:204] [ 1014: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.558724 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.560677 644066 syscalls.go:262] [ 1019: 1019] Allocating stack with size of 8388608 bytes D0713 05:18:05.560800 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.562512 644066 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.562555 644066 usertrap_amd64.go:106] [ 1019: 1019] Map a usertrap vma at 61000 D0713 05:18:05.562648 644066 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc0007faf90 1 D0713 05:18:05.562681 644066 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:05.563057 644066 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.563166 644066 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc0007faf90 2 D0713 05:18:05.563196 644066 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:05.564014 644066 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.564098 644066 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc0007faf90 3 D0713 05:18:05.564125 644066 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:05.572761 644066 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.572819 644066 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc0007faf90 4 D0713 05:18:05.572840 644066 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:05.574266 644066 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.574311 644066 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc0007faf90 5 D0713 05:18:05.574326 644066 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:05.574487 644066 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.574518 644066 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc0007faf90 6 D0713 05:18:05.574539 644066 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:05.575074 644066 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.575104 644066 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc0007faf90 7 D0713 05:18:05.575115 644066 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:05.575349 644066 usertrap_amd64.go:212] [ 1019: 1020] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.575369 644066 usertrap_amd64.go:122] [ 1019: 1020] Allocate a new trap: 0xc0007faf90 8 D0713 05:18:05.575379 644066 usertrap_amd64.go:225] [ 1019: 1020] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:05.575611 644066 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.575629 644066 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc0007faf90 9 D0713 05:18:05.575638 644066 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:05.575801 644066 usertrap_amd64.go:212] [ 1019: 1020] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.575831 644066 usertrap_amd64.go:122] [ 1019: 1020] Allocate a new trap: 0xc0007faf90 10 D0713 05:18:05.575848 644066 usertrap_amd64.go:225] [ 1019: 1020] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:05.576644 644066 usertrap_amd64.go:212] [ 1019: 1020] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.576673 644066 usertrap_amd64.go:122] [ 1019: 1020] Allocate a new trap: 0xc0007faf90 11 D0713 05:18:05.576682 644066 usertrap_amd64.go:225] [ 1019: 1020] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:05.576763 644066 usertrap_amd64.go:212] [ 1019: 1020] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.576783 644066 usertrap_amd64.go:122] [ 1019: 1020] Allocate a new trap: 0xc0007faf90 12 D0713 05:18:05.576796 644066 usertrap_amd64.go:225] [ 1019: 1020] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:05.576850 644066 task_signals.go:470] [ 1019: 1019] Notified of signal 23 D0713 05:18:05.576931 644066 task_signals.go:220] [ 1019: 1019] Signal 23: delivering to handler D0713 05:18:05.583403 644066 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.583427 644066 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc0007faf90 13 D0713 05:18:05.583436 644066 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:05.587227 644066 task_signals.go:470] [ 1019: 1019] Notified of signal 23 D0713 05:18:05.587459 644066 task_signals.go:220] [ 1019: 1019] Signal 23: delivering to handler D0713 05:18:05.595041 644066 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.595078 644066 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc0007faf90 14 D0713 05:18:05.595091 644066 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:05.595118 644066 task_exit.go:204] [ 1019: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.595138 644066 task_exit.go:204] [ 1019: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.595158 644066 task_signals.go:204] [ 1019: 1021] Signal 1019, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.595163 644066 task_signals.go:204] [ 1019: 1022] Signal 1019, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.595205 644066 task_signals.go:204] [ 1019: 1020] Signal 1019, PID: 1020, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.595204 644066 task_exit.go:204] [ 1019: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.595239 644066 task_exit.go:204] [ 1019: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.595253 644066 task_exit.go:204] [ 1019: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.595273 644066 task_signals.go:204] [ 1019: 1023] Signal 1019, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.595285 644066 task_exit.go:204] [ 1019: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.595312 644066 task_exit.go:204] [ 1019: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.595318 644066 task_exit.go:204] [ 1019: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.595358 644066 task_exit.go:204] [ 1019: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.595364 644066 task_exit.go:204] [ 1019: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.595369 644066 task_exit.go:204] [ 1019: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.595376 644066 task_exit.go:204] [ 1019: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.596509 644066 task_exit.go:204] [ 1019: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.596531 644066 task_exit.go:204] [ 1019: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.596545 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.596617 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.596626 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.596770 644066 task_exit.go:204] [ 1019: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.596931 644066 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 05:18:05.597134 644066 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:18:05.597683 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.599330 644066 syscalls.go:262] [ 1024: 1024] Allocating stack with size of 8388608 bytes D0713 05:18:05.599443 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.600514 644066 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.600549 644066 usertrap_amd64.go:106] [ 1024: 1024] Map a usertrap vma at 60000 D0713 05:18:05.600645 644066 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc00040c4b0 1 D0713 05:18:05.600669 644066 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:05.602924 644066 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.602982 644066 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc00040c4b0 2 D0713 05:18:05.602996 644066 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:05.603844 644066 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.603877 644066 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc00040c4b0 3 D0713 05:18:05.603890 644066 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:05.611716 644066 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.611752 644066 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc00040c4b0 4 D0713 05:18:05.611763 644066 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:05.615395 644066 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.615426 644066 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc00040c4b0 5 D0713 05:18:05.615438 644066 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:05.615483 644066 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.615499 644066 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc00040c4b0 6 D0713 05:18:05.615508 644066 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:05.615919 644066 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.615948 644066 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc00040c4b0 7 D0713 05:18:05.615966 644066 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:05.616147 644066 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.616168 644066 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc00040c4b0 8 D0713 05:18:05.616178 644066 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:05.616387 644066 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.616405 644066 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc00040c4b0 9 D0713 05:18:05.616416 644066 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:05.616526 644066 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.616538 644066 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc00040c4b0 10 D0713 05:18:05.616547 644066 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:05.627974 644066 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.628014 644066 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc00040c4b0 11 D0713 05:18:05.628029 644066 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:05.628081 644066 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.628090 644066 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc00040c4b0 12 D0713 05:18:05.628099 644066 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:05.628504 644066 task_signals.go:470] [ 1024: 1024] Notified of signal 23 D0713 05:18:05.628618 644066 task_signals.go:220] [ 1024: 1024] Signal 23: delivering to handler D0713 05:18:05.628733 644066 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.628753 644066 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc00040c4b0 13 D0713 05:18:05.628766 644066 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:05.640662 644066 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.640721 644066 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc00040c4b0 14 D0713 05:18:05.640739 644066 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:05.640749 644066 task_signals.go:470] [ 1024: 1024] Notified of signal 23 D0713 05:18:05.640823 644066 task_exit.go:204] [ 1024: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.640877 644066 task_signals.go:204] [ 1024: 1027] Signal 1024, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.640893 644066 task_exit.go:204] [ 1024: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.641040 644066 task_signals.go:204] [ 1024: 1025] Signal 1024, PID: 1025, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.641064 644066 task_signals.go:204] [ 1024: 1026] Signal 1024, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.641076 644066 task_exit.go:204] [ 1024: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.641089 644066 task_signals.go:204] [ 1024: 1028] Signal 1024, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.641115 644066 task_exit.go:204] [ 1024: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.641130 644066 task_exit.go:204] [ 1024: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.641143 644066 task_exit.go:204] [ 1024: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.641151 644066 task_exit.go:204] [ 1024: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.641157 644066 task_exit.go:204] [ 1024: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.641166 644066 task_exit.go:204] [ 1024: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.641183 644066 task_exit.go:204] [ 1024: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.641190 644066 task_exit.go:204] [ 1024: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.641199 644066 task_exit.go:204] [ 1024: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.642548 644066 task_exit.go:204] [ 1024: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.642580 644066 task_exit.go:204] [ 1024: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.642593 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.642628 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.642638 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.643003 644066 task_exit.go:204] [ 1024: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.643216 644066 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 05:18:05.643347 644066 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:18:05.644012 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.645992 644066 syscalls.go:262] [ 1029: 1029] Allocating stack with size of 8388608 bytes D0713 05:18:05.646125 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.647356 644066 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.647415 644066 usertrap_amd64.go:106] [ 1029: 1029] Map a usertrap vma at 66000 D0713 05:18:05.647548 644066 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0018e1320 1 D0713 05:18:05.647589 644066 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:05.647919 644066 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.647953 644066 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0018e1320 2 D0713 05:18:05.647963 644066 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:05.648607 644066 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.648637 644066 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0018e1320 3 D0713 05:18:05.648648 644066 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:05.666392 644066 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.666433 644066 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0018e1320 4 D0713 05:18:05.666449 644066 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:05.668371 644066 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.668404 644066 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0018e1320 5 D0713 05:18:05.668420 644066 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:05.668507 644066 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.668516 644066 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0018e1320 6 D0713 05:18:05.668524 644066 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:05.669133 644066 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.669160 644066 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0018e1320 7 D0713 05:18:05.669170 644066 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:05.670563 644066 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.670592 644066 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0018e1320 8 D0713 05:18:05.670603 644066 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:05.670812 644066 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.670835 644066 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0018e1320 9 D0713 05:18:05.670843 644066 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:05.671073 644066 usertrap_amd64.go:212] [ 1029: 1032] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.671135 644066 usertrap_amd64.go:122] [ 1029: 1032] Allocate a new trap: 0xc0018e1320 10 D0713 05:18:05.671209 644066 usertrap_amd64.go:225] [ 1029: 1032] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:05.672326 644066 usertrap_amd64.go:212] [ 1029: 1031] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:05.672339 644066 usertrap_amd64.go:122] [ 1029: 1031] Allocate a new trap: 0xc0018e1320 11 D0713 05:18:05.672350 644066 usertrap_amd64.go:225] [ 1029: 1031] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:05.681955 644066 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.681985 644066 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0018e1320 12 D0713 05:18:05.682000 644066 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:05.682689 644066 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.682714 644066 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0018e1320 13 D0713 05:18:05.682727 644066 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b020 trap addr 66410 ([184 39 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:05.685033 644066 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.685065 644066 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0018e1320 14 D0713 05:18:05.685080 644066 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b04f trap addr 66460 ([184 234 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:05.685115 644066 task_signals.go:470] [ 1029: 1029] Notified of signal 23 D0713 05:18:05.685166 644066 task_signals.go:220] [ 1029: 1029] Signal 23: delivering to handler D0713 05:18:05.693669 644066 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.693698 644066 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0018e1320 15 D0713 05:18:05.693710 644066 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 05:18:05.693748 644066 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.693771 644066 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.693808 644066 task_signals.go:204] [ 1029: 1030] Signal 1029, PID: 1030, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.693832 644066 task_signals.go:204] [ 1029: 1034] Signal 1029, PID: 1034, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.693833 644066 task_signals.go:204] [ 1029: 1033] Signal 1029, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.693808 644066 task_signals.go:204] [ 1029: 1031] Signal 1029, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.693837 644066 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.693858 644066 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.693866 644066 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.693890 644066 task_exit.go:204] [ 1029: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.693907 644066 task_exit.go:204] [ 1029: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.693914 644066 task_exit.go:204] [ 1029: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.693923 644066 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.693930 644066 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.693936 644066 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.693946 644066 task_signals.go:204] [ 1029: 1032] Signal 1029, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.693953 644066 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.693977 644066 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.693992 644066 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.694010 644066 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.695314 644066 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.695341 644066 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.695355 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.695425 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.695458 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.695551 644066 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.696202 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.697646 644066 syscalls.go:262] [ 1035: 1035] Allocating stack with size of 8388608 bytes D0713 05:18:05.697788 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.699470 644066 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.699531 644066 usertrap_amd64.go:106] [ 1035: 1035] Map a usertrap vma at 67000 D0713 05:18:05.699603 644066 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00040cae0 1 D0713 05:18:05.699638 644066 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:05.699968 644066 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.699997 644066 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00040cae0 2 D0713 05:18:05.700009 644066 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:05.701029 644066 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.701061 644066 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00040cae0 3 D0713 05:18:05.701074 644066 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:05.707070 644066 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.707133 644066 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00040cae0 4 D0713 05:18:05.707169 644066 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:05.708782 644066 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.708802 644066 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00040cae0 5 D0713 05:18:05.708814 644066 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:05.708860 644066 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.708868 644066 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00040cae0 6 D0713 05:18:05.708875 644066 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:05.709206 644066 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.709229 644066 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00040cae0 7 D0713 05:18:05.709237 644066 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:05.709390 644066 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.709409 644066 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc00040cae0 8 D0713 05:18:05.709418 644066 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:05.709563 644066 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.709587 644066 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc00040cae0 9 D0713 05:18:05.709596 644066 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:05.709872 644066 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.710040 644066 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00040cae0 10 D0713 05:18:05.710052 644066 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:05.721277 644066 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.721332 644066 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc00040cae0 11 D0713 05:18:05.721356 644066 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:05.721381 644066 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.721389 644066 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc00040cae0 12 D0713 05:18:05.721454 644066 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:05.721779 644066 task_signals.go:470] [ 1035: 1035] Notified of signal 23 D0713 05:18:05.721856 644066 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler D0713 05:18:05.721983 644066 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.722004 644066 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00040cae0 13 D0713 05:18:05.722014 644066 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:05.732927 644066 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.732998 644066 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc00040cae0 14 D0713 05:18:05.733012 644066 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:05.733071 644066 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.733090 644066 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.733120 644066 task_signals.go:204] [ 1035: 1036] Signal 1035, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.733125 644066 task_signals.go:204] [ 1035: 1040] Signal 1035, PID: 1040, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.733139 644066 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.733148 644066 task_exit.go:204] [ 1035: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.733159 644066 task_exit.go:204] [ 1035: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.733164 644066 task_exit.go:204] [ 1035: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.733191 644066 task_signals.go:204] [ 1035: 1038] Signal 1035, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.733210 644066 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.733215 644066 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.733218 644066 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.733228 644066 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.733231 644066 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.733239 644066 task_signals.go:204] [ 1035: 1037] Signal 1035, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.733245 644066 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.733251 644066 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.733256 644066 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.733264 644066 task_signals.go:204] [ 1035: 1039] Signal 1035, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.733337 644066 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.734658 644066 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.734690 644066 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.734705 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.734736 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.734746 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.734870 644066 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.735552 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.738167 644066 syscalls.go:262] [ 1041: 1041] Allocating stack with size of 8388608 bytes D0713 05:18:05.738254 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.746564 644066 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.746618 644066 usertrap_amd64.go:106] [ 1041: 1041] Map a usertrap vma at 64000 D0713 05:18:05.746695 644066 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0006a2fc0 1 D0713 05:18:05.746727 644066 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:05.748556 644066 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.748583 644066 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0006a2fc0 2 D0713 05:18:05.748593 644066 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:05.749429 644066 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.749455 644066 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0006a2fc0 3 D0713 05:18:05.749473 644066 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:05.755576 644066 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.755599 644066 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0006a2fc0 4 D0713 05:18:05.755617 644066 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:05.756604 644066 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.756625 644066 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0006a2fc0 5 D0713 05:18:05.756634 644066 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:05.756682 644066 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.756690 644066 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0006a2fc0 6 D0713 05:18:05.756698 644066 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:05.756902 644066 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.756922 644066 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0006a2fc0 7 D0713 05:18:05.756929 644066 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:05.757163 644066 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.757188 644066 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0006a2fc0 8 D0713 05:18:05.757199 644066 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:05.757411 644066 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.757440 644066 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0006a2fc0 9 D0713 05:18:05.757451 644066 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:05.757469 644066 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.757479 644066 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0006a2fc0 10 D0713 05:18:05.757489 644066 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:05.765919 644066 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.765951 644066 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0006a2fc0 11 D0713 05:18:05.765961 644066 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:05.768701 644066 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.768729 644066 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0006a2fc0 12 D0713 05:18:05.768741 644066 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:05.768860 644066 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.768882 644066 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0006a2fc0 13 D0713 05:18:05.768892 644066 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:05.769051 644066 task_signals.go:470] [ 1041: 1041] Notified of signal 23 D0713 05:18:05.769127 644066 task_signals.go:220] [ 1041: 1041] Signal 23: delivering to handler I0713 05:18:05.778946 644066 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0713 05:18:05.779096 644066 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.779117 644066 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0006a2fc0 14 D0713 05:18:05.779125 644066 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:05.779239 644066 task_exit.go:204] [ 1041: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.779271 644066 task_exit.go:204] [ 1041: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.779290 644066 task_signals.go:204] [ 1041: 1043] Signal 1041, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.779286 644066 task_signals.go:204] [ 1041: 1042] Signal 1041, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.779324 644066 task_signals.go:204] [ 1041: 1045] Signal 1041, PID: 1045, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.779345 644066 task_exit.go:204] [ 1041: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.779388 644066 task_signals.go:204] [ 1041: 1044] Signal 1041, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.779419 644066 task_exit.go:204] [ 1041: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.779428 644066 task_exit.go:204] [ 1041: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.779443 644066 task_exit.go:204] [ 1041: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.779452 644066 task_exit.go:204] [ 1041: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.779456 644066 task_exit.go:204] [ 1041: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.779462 644066 task_exit.go:204] [ 1041: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.779466 644066 task_exit.go:204] [ 1041: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.779469 644066 task_exit.go:204] [ 1041: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.779485 644066 task_exit.go:204] [ 1041: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.780731 644066 task_exit.go:204] [ 1041: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.780757 644066 task_exit.go:204] [ 1041: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.780786 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.781098 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.781125 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.781194 644066 task_exit.go:204] [ 1041: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.781889 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.783462 644066 syscalls.go:262] [ 1046: 1046] Allocating stack with size of 8388608 bytes D0713 05:18:05.783561 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.784346 644066 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.784377 644066 usertrap_amd64.go:106] [ 1046: 1046] Map a usertrap vma at 60000 D0713 05:18:05.784461 644066 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000b08fc0 1 D0713 05:18:05.784500 644066 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:05.784754 644066 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.784769 644066 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000b08fc0 2 D0713 05:18:05.784777 644066 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:05.785289 644066 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.785317 644066 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000b08fc0 3 D0713 05:18:05.785328 644066 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:05.791687 644066 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.791706 644066 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000b08fc0 4 D0713 05:18:05.791718 644066 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:05.792892 644066 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.792918 644066 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000b08fc0 5 D0713 05:18:05.792926 644066 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:05.793013 644066 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.793031 644066 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000b08fc0 6 D0713 05:18:05.793038 644066 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:05.793187 644066 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.793204 644066 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000b08fc0 7 D0713 05:18:05.793214 644066 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:05.793357 644066 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.793393 644066 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc000b08fc0 8 D0713 05:18:05.793418 644066 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:05.793772 644066 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.793805 644066 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000b08fc0 9 D0713 05:18:05.793819 644066 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:05.793842 644066 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.793895 644066 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc000b08fc0 10 D0713 05:18:05.793907 644066 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:05.801438 644066 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.801462 644066 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000b08fc0 11 D0713 05:18:05.801473 644066 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:05.804122 644066 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.804186 644066 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc000b08fc0 12 D0713 05:18:05.804202 644066 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:05.804238 644066 usertrap_amd64.go:212] [ 1046: 1048] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:05.804257 644066 usertrap_amd64.go:122] [ 1046: 1048] Allocate a new trap: 0xc000b08fc0 13 D0713 05:18:05.804265 644066 usertrap_amd64.go:225] [ 1046: 1048] Apply the binary patch addr 46b6e0 trap addr 60410 ([184 24 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:05.804286 644066 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.804292 644066 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc000b08fc0 14 D0713 05:18:05.804299 644066 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b04f trap addr 60460 ([184 234 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:05.804332 644066 task_signals.go:470] [ 1046: 1046] Notified of signal 23 D0713 05:18:05.804408 644066 task_signals.go:179] [ 1046: 1046] Restarting syscall 202: interrupted by signal 23 D0713 05:18:05.804429 644066 task_signals.go:220] [ 1046: 1046] Signal 23: delivering to handler I0713 05:18:05.812520 644066 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0713 05:18:05.812614 644066 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.812628 644066 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc000b08fc0 15 D0713 05:18:05.812640 644066 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 05:18:05.812694 644066 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.812728 644066 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.812754 644066 task_signals.go:204] [ 1046: 1049] Signal 1046, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.812767 644066 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.812773 644066 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.812777 644066 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.812754 644066 task_signals.go:204] [ 1046: 1048] Signal 1046, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.812815 644066 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.812861 644066 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.812878 644066 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.812864 644066 task_signals.go:204] [ 1046: 1050] Signal 1046, PID: 1050, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.812915 644066 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.812931 644066 task_signals.go:204] [ 1046: 1047] Signal 1046, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.812978 644066 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.813020 644066 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.813036 644066 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.814748 644066 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.814785 644066 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.814800 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.814847 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.814881 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.814955 644066 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.815669 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.817241 644066 syscalls.go:262] [ 1051: 1051] Allocating stack with size of 8388608 bytes D0713 05:18:05.817373 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.818360 644066 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.818460 644066 usertrap_amd64.go:106] [ 1051: 1051] Map a usertrap vma at 60000 D0713 05:18:05.818588 644066 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0006a32c0 1 D0713 05:18:05.818628 644066 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:05.819105 644066 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.819125 644066 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0006a32c0 2 D0713 05:18:05.819136 644066 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:05.819835 644066 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.819907 644066 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0006a32c0 3 D0713 05:18:05.819932 644066 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:05.826261 644066 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.826291 644066 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0006a32c0 4 D0713 05:18:05.826301 644066 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:05.827323 644066 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.827366 644066 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0006a32c0 5 D0713 05:18:05.827381 644066 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:05.827477 644066 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.827500 644066 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0006a32c0 6 D0713 05:18:05.827510 644066 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:05.828127 644066 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.828157 644066 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0006a32c0 7 D0713 05:18:05.828167 644066 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:05.828301 644066 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.828335 644066 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc0006a32c0 8 D0713 05:18:05.828344 644066 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:05.828505 644066 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.828530 644066 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc0006a32c0 9 D0713 05:18:05.828538 644066 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:05.828586 644066 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.828611 644066 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0006a32c0 10 D0713 05:18:05.828623 644066 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:05.835702 644066 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.835729 644066 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0006a32c0 11 D0713 05:18:05.835737 644066 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:05.838870 644066 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.838911 644066 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc0006a32c0 12 D0713 05:18:05.838933 644066 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:05.839031 644066 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.839057 644066 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc0006a32c0 13 D0713 05:18:05.839070 644066 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:05.839115 644066 task_signals.go:470] [ 1051: 1051] Notified of signal 23 D0713 05:18:05.839252 644066 task_signals.go:220] [ 1051: 1051] Signal 23: delivering to handler I0713 05:18:05.845829 644066 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0713 05:18:05.845940 644066 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.845954 644066 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc0006a32c0 14 D0713 05:18:05.845967 644066 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:05.846065 644066 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.846093 644066 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.846119 644066 task_signals.go:204] [ 1051: 1054] Signal 1051, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.846121 644066 task_signals.go:204] [ 1051: 1053] Signal 1051, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.846144 644066 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.846193 644066 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.846232 644066 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.846235 644066 task_signals.go:204] [ 1051: 1055] Signal 1051, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.846258 644066 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.846257 644066 task_signals.go:204] [ 1051: 1052] Signal 1051, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.846269 644066 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.846275 644066 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.846290 644066 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.846310 644066 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.846331 644066 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.846349 644066 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.847495 644066 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.847522 644066 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.847534 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.847563 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.847570 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.847763 644066 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.847863 644066 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 05:18:05.847960 644066 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:18:05.848503 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.850128 644066 syscalls.go:262] [ 1056: 1056] Allocating stack with size of 8388608 bytes D0713 05:18:05.850257 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.851359 644066 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.851424 644066 usertrap_amd64.go:106] [ 1056: 1056] Map a usertrap vma at 60000 D0713 05:18:05.851586 644066 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0018e16e0 1 D0713 05:18:05.851626 644066 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:05.852221 644066 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.852248 644066 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0018e16e0 2 D0713 05:18:05.852264 644066 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:05.853479 644066 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.853506 644066 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0018e16e0 3 D0713 05:18:05.853519 644066 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:05.859594 644066 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.859640 644066 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0018e16e0 4 D0713 05:18:05.859655 644066 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:05.860718 644066 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.860752 644066 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0018e16e0 5 D0713 05:18:05.860809 644066 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:05.860921 644066 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.860980 644066 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0018e16e0 6 D0713 05:18:05.860991 644066 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:05.861242 644066 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.861264 644066 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0018e16e0 7 D0713 05:18:05.861273 644066 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:05.861463 644066 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.861483 644066 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0018e16e0 8 D0713 05:18:05.861519 644066 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:05.861725 644066 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.861796 644066 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0018e16e0 9 D0713 05:18:05.861841 644066 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:05.861884 644066 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.861893 644066 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0018e16e0 10 D0713 05:18:05.861898 644066 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:05.862579 644066 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.862609 644066 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0018e16e0 11 D0713 05:18:05.862619 644066 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:05.862668 644066 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.862683 644066 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0018e16e0 12 D0713 05:18:05.862691 644066 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:05.862710 644066 task_signals.go:470] [ 1056: 1056] Notified of signal 23 D0713 05:18:05.862792 644066 task_signals.go:220] [ 1056: 1056] Signal 23: delivering to handler D0713 05:18:05.870257 644066 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.870319 644066 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0018e16e0 13 D0713 05:18:05.870340 644066 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:05.873198 644066 task_signals.go:470] [ 1056: 1056] Notified of signal 23 D0713 05:18:05.873276 644066 task_signals.go:220] [ 1056: 1056] Signal 23: delivering to handler I0713 05:18:05.881299 644066 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0713 05:18:05.881387 644066 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.881400 644066 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0018e16e0 14 D0713 05:18:05.881422 644066 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:05.881519 644066 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.881547 644066 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.881568 644066 task_signals.go:204] [ 1056: 1058] Signal 1056, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.881567 644066 task_signals.go:204] [ 1056: 1057] Signal 1056, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.881582 644066 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.881585 644066 task_signals.go:204] [ 1056: 1060] Signal 1056, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.881598 644066 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.881631 644066 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.881674 644066 task_signals.go:204] [ 1056: 1059] Signal 1056, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.881689 644066 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.881698 644066 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.881749 644066 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.881758 644066 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.881772 644066 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.881793 644066 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.881809 644066 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.882956 644066 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.882986 644066 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.882999 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.883095 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.883162 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.883272 644066 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.883903 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.884106 644066 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 05:18:05.885533 644066 syscalls.go:262] [ 1061: 1061] Allocating stack with size of 8388608 bytes D0713 05:18:05.885652 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.885780 644066 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:18:05.885897 644066 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 05:18:05.885929 644066 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:18:05.887358 644066 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.887400 644066 usertrap_amd64.go:106] [ 1061: 1061] Map a usertrap vma at 66000 D0713 05:18:05.887496 644066 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000a4edb0 1 D0713 05:18:05.887535 644066 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:05.887872 644066 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.887901 644066 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000a4edb0 2 D0713 05:18:05.887913 644066 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:05.889620 644066 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.889644 644066 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000a4edb0 3 D0713 05:18:05.889656 644066 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:05.896324 644066 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.896358 644066 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000a4edb0 4 D0713 05:18:05.896380 644066 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:05.898540 644066 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.898575 644066 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000a4edb0 5 D0713 05:18:05.898590 644066 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:05.898742 644066 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.898762 644066 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000a4edb0 6 D0713 05:18:05.898777 644066 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:05.899303 644066 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.899322 644066 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000a4edb0 7 D0713 05:18:05.899329 644066 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:05.899528 644066 usertrap_amd64.go:212] [ 1061: 1062] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.899549 644066 usertrap_amd64.go:122] [ 1061: 1062] Allocate a new trap: 0xc000a4edb0 8 D0713 05:18:05.899559 644066 usertrap_amd64.go:225] [ 1061: 1062] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:05.899872 644066 usertrap_amd64.go:212] [ 1061: 1062] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.899909 644066 usertrap_amd64.go:122] [ 1061: 1062] Allocate a new trap: 0xc000a4edb0 9 D0713 05:18:05.899921 644066 usertrap_amd64.go:225] [ 1061: 1062] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:05.899972 644066 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.900071 644066 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000a4edb0 10 D0713 05:18:05.900128 644066 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:05.900683 644066 usertrap_amd64.go:212] [ 1061: 1062] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.900713 644066 usertrap_amd64.go:122] [ 1061: 1062] Allocate a new trap: 0xc000a4edb0 11 D0713 05:18:05.900724 644066 usertrap_amd64.go:225] [ 1061: 1062] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:05.900783 644066 usertrap_amd64.go:212] [ 1061: 1062] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.900803 644066 usertrap_amd64.go:122] [ 1061: 1062] Allocate a new trap: 0xc000a4edb0 12 D0713 05:18:05.900811 644066 usertrap_amd64.go:225] [ 1061: 1062] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:05.900909 644066 task_signals.go:470] [ 1061: 1061] Notified of signal 23 D0713 05:18:05.901011 644066 task_signals.go:220] [ 1061: 1061] Signal 23: delivering to handler D0713 05:18:05.909086 644066 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.909127 644066 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000a4edb0 13 D0713 05:18:05.909140 644066 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:05.912048 644066 task_signals.go:470] [ 1061: 1061] Notified of signal 23 D0713 05:18:05.912392 644066 task_signals.go:220] [ 1061: 1061] Signal 23: delivering to handler D0713 05:18:05.912516 644066 task_signals.go:481] [ 1061: 1061] No task notified of signal 23 D0713 05:18:05.912649 644066 task_signals.go:220] [ 1061: 1061] Signal 23: delivering to handler D0713 05:18:05.921824 644066 usertrap_amd64.go:212] [ 1061: 1061] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.921879 644066 usertrap_amd64.go:122] [ 1061: 1061] Allocate a new trap: 0xc000a4edb0 14 D0713 05:18:05.921897 644066 usertrap_amd64.go:225] [ 1061: 1061] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:05.921962 644066 task_exit.go:204] [ 1061: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.922037 644066 task_signals.go:204] [ 1061: 1063] Signal 1061, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.922066 644066 task_signals.go:204] [ 1061: 1062] Signal 1061, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.922100 644066 task_signals.go:204] [ 1061: 1065] Signal 1061, PID: 1065, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.922115 644066 task_signals.go:204] [ 1061: 1064] Signal 1061, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.922127 644066 task_exit.go:204] [ 1061: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.922158 644066 task_exit.go:204] [ 1061: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.922204 644066 task_exit.go:204] [ 1061: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.922209 644066 task_exit.go:204] [ 1061: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.922221 644066 task_exit.go:204] [ 1061: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.922228 644066 task_exit.go:204] [ 1061: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.922231 644066 task_exit.go:204] [ 1061: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.922238 644066 task_exit.go:204] [ 1061: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.922244 644066 task_exit.go:204] [ 1061: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.922247 644066 task_exit.go:204] [ 1061: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.922253 644066 task_exit.go:204] [ 1061: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.923523 644066 task_exit.go:204] [ 1061: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.923542 644066 task_exit.go:204] [ 1061: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.923557 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.927293 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.927324 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.927482 644066 task_exit.go:204] [ 1061: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.927884 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.929119 644066 syscalls.go:262] [ 1066: 1066] Allocating stack with size of 8388608 bytes D0713 05:18:05.929270 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.930573 644066 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.930626 644066 usertrap_amd64.go:106] [ 1066: 1066] Map a usertrap vma at 69000 D0713 05:18:05.930767 644066 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a4f320 1 D0713 05:18:05.930811 644066 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:05.931280 644066 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.931310 644066 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a4f320 2 D0713 05:18:05.931324 644066 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:05.933614 644066 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.933645 644066 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a4f320 3 D0713 05:18:05.933657 644066 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:05.940076 644066 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:05.940134 644066 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a4f320 4 D0713 05:18:05.940154 644066 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:05.941466 644066 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:05.941518 644066 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a4f320 5 D0713 05:18:05.941536 644066 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:05.941597 644066 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b214:sysno 13 D0713 05:18:05.941611 644066 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a4f320 6 D0713 05:18:05.941622 644066 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:05.941951 644066 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:05.941975 644066 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a4f320 7 D0713 05:18:05.941986 644066 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:05.942205 644066 usertrap_amd64.go:212] [ 1066: 1067] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:05.942241 644066 usertrap_amd64.go:122] [ 1066: 1067] Allocate a new trap: 0xc000a4f320 8 D0713 05:18:05.942256 644066 usertrap_amd64.go:225] [ 1066: 1067] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:05.942407 644066 usertrap_amd64.go:212] [ 1066: 1067] Found the pattern at ip 46af76:sysno 35 D0713 05:18:05.942427 644066 usertrap_amd64.go:122] [ 1066: 1067] Allocate a new trap: 0xc000a4f320 9 D0713 05:18:05.942436 644066 usertrap_amd64.go:225] [ 1066: 1067] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:05.942657 644066 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:05.942678 644066 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a4f320 10 D0713 05:18:05.942704 644066 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:05.942790 644066 usertrap_amd64.go:212] [ 1066: 1067] Found the pattern at ip 46b020:sysno 39 D0713 05:18:05.942808 644066 usertrap_amd64.go:122] [ 1066: 1067] Allocate a new trap: 0xc000a4f320 11 D0713 05:18:05.942820 644066 usertrap_amd64.go:225] [ 1066: 1067] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:05.942891 644066 usertrap_amd64.go:212] [ 1066: 1067] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:05.942911 644066 usertrap_amd64.go:122] [ 1066: 1067] Allocate a new trap: 0xc000a4f320 12 D0713 05:18:05.942932 644066 usertrap_amd64.go:225] [ 1066: 1067] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:05.942968 644066 task_signals.go:470] [ 1066: 1069] Notified of signal 23 D0713 05:18:05.943053 644066 task_signals.go:179] [ 1066: 1069] Restarting syscall 202: interrupted by signal 23 D0713 05:18:05.943085 644066 task_signals.go:220] [ 1066: 1069] Signal 23: delivering to handler D0713 05:18:05.943443 644066 task_signals.go:470] [ 1066: 1066] Notified of signal 23 D0713 05:18:05.943507 644066 task_signals.go:220] [ 1066: 1066] Signal 23: delivering to handler D0713 05:18:05.962402 644066 task_signals.go:470] [ 1066: 1066] Notified of signal 23 D0713 05:18:05.962466 644066 task_signals.go:220] [ 1066: 1066] Signal 23: delivering to handler D0713 05:18:05.967815 644066 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46af29:sysno 293 D0713 05:18:05.967856 644066 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a4f320 13 D0713 05:18:05.967874 644066 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:05.973768 644066 task_signals.go:470] [ 1066: 1066] Notified of signal 23 D0713 05:18:05.973861 644066 task_signals.go:220] [ 1066: 1066] Signal 23: delivering to handler D0713 05:18:05.980701 644066 usertrap_amd64.go:212] [ 1066: 1066] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:05.980808 644066 usertrap_amd64.go:122] [ 1066: 1066] Allocate a new trap: 0xc000a4f320 14 D0713 05:18:05.980829 644066 usertrap_amd64.go:225] [ 1066: 1066] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:05.980887 644066 task_exit.go:204] [ 1066: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.980983 644066 task_exit.go:204] [ 1066: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.981019 644066 task_signals.go:204] [ 1066: 1069] Signal 1066, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.981022 644066 task_signals.go:204] [ 1066: 1070] Signal 1066, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.981054 644066 task_signals.go:204] [ 1066: 1067] Signal 1066, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.981094 644066 task_exit.go:204] [ 1066: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.981123 644066 task_signals.go:204] [ 1066: 1068] Signal 1066, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:05.981150 644066 task_exit.go:204] [ 1066: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.981168 644066 task_exit.go:204] [ 1066: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.981219 644066 task_exit.go:204] [ 1066: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.981238 644066 task_exit.go:204] [ 1066: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.981245 644066 task_exit.go:204] [ 1066: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.981257 644066 task_exit.go:204] [ 1066: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.981277 644066 task_exit.go:204] [ 1066: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.981293 644066 task_exit.go:204] [ 1066: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.981303 644066 task_exit.go:204] [ 1066: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:05.984164 644066 task_exit.go:204] [ 1066: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:05.984191 644066 task_exit.go:204] [ 1066: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.984207 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:05.984247 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:05.984263 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:05.984382 644066 task_exit.go:204] [ 1066: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:05.985600 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.987320 644066 syscalls.go:262] [ 1071: 1071] Allocating stack with size of 8388608 bytes D0713 05:18:05.987591 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:05.988254 644066 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:05.988340 644066 usertrap_amd64.go:106] [ 1071: 1071] Map a usertrap vma at 64000 D0713 05:18:05.988402 644066 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0018e1950 1 D0713 05:18:05.988434 644066 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:05.988608 644066 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:05.988625 644066 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0018e1950 2 D0713 05:18:05.988636 644066 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:05.989206 644066 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:05.989234 644066 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0018e1950 3 D0713 05:18:05.989246 644066 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:06.000443 644066 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.000507 644066 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0018e1950 4 D0713 05:18:06.000525 644066 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:06.001821 644066 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.001856 644066 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0018e1950 5 D0713 05:18:06.001870 644066 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:06.002042 644066 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.002059 644066 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0018e1950 6 D0713 05:18:06.002069 644066 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:06.002377 644066 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.002394 644066 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0018e1950 7 D0713 05:18:06.002402 644066 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:06.002655 644066 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.002713 644066 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc0018e1950 8 D0713 05:18:06.002733 644066 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:06.003124 644066 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.003141 644066 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0018e1950 9 D0713 05:18:06.003151 644066 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:06.003168 644066 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.003173 644066 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc0018e1950 10 D0713 05:18:06.003185 644066 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:06.012054 644066 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.012103 644066 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0018e1950 11 D0713 05:18:06.012117 644066 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:06.014717 644066 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.014759 644066 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc0018e1950 12 D0713 05:18:06.014773 644066 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:06.014869 644066 usertrap_amd64.go:212] [ 1071: 1072] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.014908 644066 usertrap_amd64.go:122] [ 1071: 1072] Allocate a new trap: 0xc0018e1950 13 D0713 05:18:06.014924 644066 usertrap_amd64.go:225] [ 1071: 1072] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:06.015041 644066 task_signals.go:470] [ 1071: 1071] Notified of signal 23 D0713 05:18:06.015171 644066 task_signals.go:220] [ 1071: 1071] Signal 23: delivering to handler D0713 05:18:06.023527 644066 usertrap_amd64.go:212] [ 1071: 1071] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.023576 644066 usertrap_amd64.go:122] [ 1071: 1071] Allocate a new trap: 0xc0018e1950 14 D0713 05:18:06.023590 644066 usertrap_amd64.go:225] [ 1071: 1071] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:06.023654 644066 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.023678 644066 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.023707 644066 task_signals.go:204] [ 1071: 1074] Signal 1071, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.023741 644066 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.023718 644066 task_signals.go:204] [ 1071: 1072] Signal 1071, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.023727 644066 task_signals.go:204] [ 1071: 1075] Signal 1071, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.023751 644066 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.023775 644066 task_exit.go:204] [ 1071: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.023822 644066 task_signals.go:204] [ 1071: 1073] Signal 1071, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.023825 644066 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.023883 644066 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.023892 644066 task_exit.go:204] [ 1071: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.023909 644066 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.023951 644066 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.023959 644066 task_exit.go:204] [ 1071: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.023972 644066 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.025316 644066 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.025339 644066 task_exit.go:204] [ 1071: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.025355 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.025394 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.025408 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.025585 644066 task_exit.go:204] [ 1071: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.026156 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.027714 644066 syscalls.go:262] [ 1076: 1076] Allocating stack with size of 8388608 bytes D0713 05:18:06.027893 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.029502 644066 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.029607 644066 usertrap_amd64.go:106] [ 1076: 1076] Map a usertrap vma at 68000 D0713 05:18:06.029718 644066 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00040d3b0 1 D0713 05:18:06.029765 644066 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:06.030160 644066 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.030207 644066 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00040d3b0 2 D0713 05:18:06.030222 644066 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:06.030929 644066 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.030958 644066 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00040d3b0 3 D0713 05:18:06.030969 644066 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:06.037648 644066 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.037760 644066 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00040d3b0 4 D0713 05:18:06.037779 644066 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:06.039221 644066 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.039268 644066 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00040d3b0 5 D0713 05:18:06.039280 644066 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:06.039335 644066 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.039341 644066 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00040d3b0 6 D0713 05:18:06.039347 644066 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:06.039587 644066 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.039611 644066 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00040d3b0 7 D0713 05:18:06.039657 644066 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:06.039984 644066 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.040036 644066 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc00040d3b0 8 D0713 05:18:06.040055 644066 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:06.040432 644066 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.040594 644066 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc00040d3b0 9 D0713 05:18:06.040624 644066 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:06.040753 644066 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.040778 644066 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00040d3b0 10 D0713 05:18:06.040795 644066 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:06.048332 644066 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.048378 644066 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00040d3b0 11 D0713 05:18:06.048393 644066 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:06.053042 644066 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.053104 644066 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc00040d3b0 12 D0713 05:18:06.053129 644066 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:06.053159 644066 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.053178 644066 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc00040d3b0 13 D0713 05:18:06.053215 644066 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:06.053287 644066 task_signals.go:470] [ 1076: 1076] Notified of signal 23 D0713 05:18:06.053342 644066 task_signals.go:220] [ 1076: 1076] Signal 23: delivering to handler D0713 05:18:06.059436 644066 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.059475 644066 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc00040d3b0 14 D0713 05:18:06.059489 644066 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:06.059538 644066 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.059562 644066 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.059583 644066 task_signals.go:204] [ 1076: 1081] Signal 1076, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.059599 644066 task_signals.go:204] [ 1076: 1077] Signal 1076, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.059594 644066 task_signals.go:204] [ 1076: 1080] Signal 1076, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.059580 644066 task_signals.go:204] [ 1076: 1079] Signal 1076, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.059610 644066 task_exit.go:204] [ 1076: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.059639 644066 task_signals.go:204] [ 1076: 1078] Signal 1076, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.059661 644066 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.059679 644066 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.059712 644066 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.059740 644066 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.059757 644066 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.059778 644066 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.059791 644066 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.059800 644066 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.059806 644066 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.059819 644066 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.059891 644066 task_exit.go:204] [ 1076: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.059914 644066 task_exit.go:204] [ 1076: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.061140 644066 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.061194 644066 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.061214 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.061245 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.061257 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.061497 644066 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.062068 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.063453 644066 syscalls.go:262] [ 1082: 1082] Allocating stack with size of 8388608 bytes D0713 05:18:06.063548 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.066079 644066 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.066117 644066 usertrap_amd64.go:106] [ 1082: 1082] Map a usertrap vma at 60000 D0713 05:18:06.066187 644066 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc0006a3b00 1 D0713 05:18:06.066218 644066 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:06.066527 644066 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.066556 644066 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc0006a3b00 2 D0713 05:18:06.066568 644066 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:06.067231 644066 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.067259 644066 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc0006a3b00 3 D0713 05:18:06.067271 644066 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:06.075520 644066 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.075587 644066 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc0006a3b00 4 D0713 05:18:06.075608 644066 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:06.077223 644066 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.077293 644066 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc0006a3b00 5 D0713 05:18:06.077318 644066 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:06.077396 644066 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.077435 644066 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc0006a3b00 6 D0713 05:18:06.077447 644066 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:06.077968 644066 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.077997 644066 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc0006a3b00 7 D0713 05:18:06.078010 644066 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:06.078328 644066 usertrap_amd64.go:212] [ 1082: 1083] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.078370 644066 usertrap_amd64.go:122] [ 1082: 1083] Allocate a new trap: 0xc0006a3b00 8 D0713 05:18:06.078388 644066 usertrap_amd64.go:225] [ 1082: 1083] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:06.078856 644066 usertrap_amd64.go:212] [ 1082: 1083] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.078880 644066 usertrap_amd64.go:122] [ 1082: 1083] Allocate a new trap: 0xc0006a3b00 9 D0713 05:18:06.078901 644066 usertrap_amd64.go:225] [ 1082: 1083] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:06.078923 644066 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.078935 644066 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc0006a3b00 10 D0713 05:18:06.078987 644066 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:06.087760 644066 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.087812 644066 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc0006a3b00 11 D0713 05:18:06.087837 644066 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:06.090521 644066 usertrap_amd64.go:212] [ 1082: 1083] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.090570 644066 usertrap_amd64.go:122] [ 1082: 1083] Allocate a new trap: 0xc0006a3b00 12 D0713 05:18:06.090591 644066 usertrap_amd64.go:225] [ 1082: 1083] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:06.090635 644066 usertrap_amd64.go:212] [ 1082: 1083] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.090647 644066 usertrap_amd64.go:122] [ 1082: 1083] Allocate a new trap: 0xc0006a3b00 13 D0713 05:18:06.090658 644066 usertrap_amd64.go:225] [ 1082: 1083] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:06.090733 644066 task_signals.go:470] [ 1082: 1082] Notified of signal 23 D0713 05:18:06.090829 644066 task_signals.go:220] [ 1082: 1082] Signal 23: delivering to handler D0713 05:18:06.099952 644066 usertrap_amd64.go:212] [ 1082: 1082] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.100015 644066 usertrap_amd64.go:122] [ 1082: 1082] Allocate a new trap: 0xc0006a3b00 14 D0713 05:18:06.100030 644066 usertrap_amd64.go:225] [ 1082: 1082] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:06.100131 644066 task_exit.go:204] [ 1082: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.100159 644066 task_exit.go:204] [ 1082: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.100188 644066 task_signals.go:204] [ 1082: 1084] Signal 1082, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.100215 644066 task_signals.go:204] [ 1082: 1086] Signal 1082, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.100218 644066 task_exit.go:204] [ 1082: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.100240 644066 task_signals.go:204] [ 1082: 1083] Signal 1082, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.100315 644066 task_signals.go:204] [ 1082: 1085] Signal 1082, PID: 1085, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.100331 644066 task_exit.go:204] [ 1082: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.100339 644066 task_exit.go:204] [ 1082: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.100353 644066 task_exit.go:204] [ 1082: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.100358 644066 task_exit.go:204] [ 1082: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.100361 644066 task_exit.go:204] [ 1082: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.100369 644066 task_exit.go:204] [ 1082: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.100377 644066 task_exit.go:204] [ 1082: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.100383 644066 task_exit.go:204] [ 1082: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.100392 644066 task_exit.go:204] [ 1082: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.101949 644066 task_exit.go:204] [ 1082: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.102032 644066 task_exit.go:204] [ 1082: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.102055 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.102101 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.102115 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.102433 644066 task_exit.go:204] [ 1082: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.102669 644066 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 05:18:06.102786 644066 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 05:18:06.103391 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.105227 644066 syscalls.go:262] [ 1087: 1087] Allocating stack with size of 8388608 bytes D0713 05:18:06.105355 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.106702 644066 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.106739 644066 usertrap_amd64.go:106] [ 1087: 1087] Map a usertrap vma at 61000 D0713 05:18:06.106842 644066 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc0007fb920 1 D0713 05:18:06.106873 644066 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:06.107416 644066 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.107468 644066 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc0007fb920 2 D0713 05:18:06.107487 644066 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:06.108213 644066 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.108241 644066 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc0007fb920 3 D0713 05:18:06.108255 644066 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:06.115978 644066 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.116019 644066 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc0007fb920 4 D0713 05:18:06.116035 644066 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:06.117300 644066 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.117336 644066 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc0007fb920 5 D0713 05:18:06.117351 644066 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:06.117538 644066 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.117566 644066 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc0007fb920 6 D0713 05:18:06.117580 644066 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:06.119543 644066 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.119574 644066 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc0007fb920 7 D0713 05:18:06.119587 644066 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:06.119807 644066 usertrap_amd64.go:212] [ 1087: 1088] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.119835 644066 usertrap_amd64.go:122] [ 1087: 1088] Allocate a new trap: 0xc0007fb920 8 D0713 05:18:06.119842 644066 usertrap_amd64.go:225] [ 1087: 1088] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:06.120003 644066 usertrap_amd64.go:212] [ 1087: 1088] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.120025 644066 usertrap_amd64.go:122] [ 1087: 1088] Allocate a new trap: 0xc0007fb920 9 D0713 05:18:06.120032 644066 usertrap_amd64.go:225] [ 1087: 1088] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:06.120099 644066 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.120126 644066 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc0007fb920 10 D0713 05:18:06.120140 644066 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:06.131526 644066 usertrap_amd64.go:212] [ 1087: 1088] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.131584 644066 usertrap_amd64.go:122] [ 1087: 1088] Allocate a new trap: 0xc0007fb920 11 D0713 05:18:06.131604 644066 usertrap_amd64.go:225] [ 1087: 1088] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:06.131694 644066 usertrap_amd64.go:212] [ 1087: 1088] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.131704 644066 usertrap_amd64.go:122] [ 1087: 1088] Allocate a new trap: 0xc0007fb920 12 D0713 05:18:06.131715 644066 usertrap_amd64.go:225] [ 1087: 1088] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:06.131734 644066 task_signals.go:470] [ 1087: 1087] Notified of signal 23 D0713 05:18:06.131786 644066 task_signals.go:220] [ 1087: 1087] Signal 23: delivering to handler D0713 05:18:06.139011 644066 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.139061 644066 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc0007fb920 13 D0713 05:18:06.139076 644066 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:06.143036 644066 task_signals.go:470] [ 1087: 1087] Notified of signal 23 D0713 05:18:06.143117 644066 task_signals.go:220] [ 1087: 1087] Signal 23: delivering to handler I0713 05:18:06.153210 644066 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0713 05:18:06.153309 644066 usertrap_amd64.go:212] [ 1087: 1087] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.153328 644066 usertrap_amd64.go:122] [ 1087: 1087] Allocate a new trap: 0xc0007fb920 14 D0713 05:18:06.153347 644066 usertrap_amd64.go:225] [ 1087: 1087] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:06.153415 644066 task_exit.go:204] [ 1087: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.153453 644066 task_exit.go:204] [ 1087: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.153487 644066 task_signals.go:204] [ 1087: 1088] Signal 1087, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.153499 644066 task_exit.go:204] [ 1087: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.153505 644066 task_exit.go:204] [ 1087: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.153508 644066 task_exit.go:204] [ 1087: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.153526 644066 task_signals.go:204] [ 1087: 1089] Signal 1087, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.153549 644066 task_exit.go:204] [ 1087: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.153574 644066 task_exit.go:204] [ 1087: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.153580 644066 task_exit.go:204] [ 1087: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.153613 644066 task_signals.go:204] [ 1087: 1090] Signal 1087, PID: 1090, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.153628 644066 task_exit.go:204] [ 1087: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.153633 644066 task_exit.go:204] [ 1087: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.153637 644066 task_exit.go:204] [ 1087: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.153646 644066 task_signals.go:204] [ 1087: 1091] Signal 1087, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.153660 644066 task_exit.go:204] [ 1087: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.155139 644066 task_exit.go:204] [ 1087: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.155220 644066 task_exit.go:204] [ 1087: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.155242 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.155342 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.155374 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.155538 644066 task_exit.go:204] [ 1087: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.156462 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.158782 644066 syscalls.go:262] [ 1092: 1092] Allocating stack with size of 8388608 bytes D0713 05:18:06.159108 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.163556 644066 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.163622 644066 usertrap_amd64.go:106] [ 1092: 1092] Map a usertrap vma at 68000 D0713 05:18:06.163790 644066 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0018e1d70 1 D0713 05:18:06.163869 644066 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:06.164148 644066 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.164180 644066 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0018e1d70 2 D0713 05:18:06.164193 644066 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:06.164930 644066 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.165027 644066 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0018e1d70 3 D0713 05:18:06.165044 644066 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:06.172015 644066 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.172065 644066 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0018e1d70 4 D0713 05:18:06.172080 644066 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:06.173216 644066 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.173257 644066 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0018e1d70 5 D0713 05:18:06.173293 644066 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:06.173372 644066 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.173403 644066 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0018e1d70 6 D0713 05:18:06.173412 644066 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:06.174061 644066 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.174092 644066 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0018e1d70 7 D0713 05:18:06.174102 644066 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:06.174331 644066 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.174356 644066 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc0018e1d70 8 D0713 05:18:06.174367 644066 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:06.174640 644066 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.174667 644066 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc0018e1d70 9 D0713 05:18:06.174677 644066 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:06.175139 644066 usertrap_amd64.go:212] [ 1092: 1095] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.175208 644066 usertrap_amd64.go:122] [ 1092: 1095] Allocate a new trap: 0xc0018e1d70 10 D0713 05:18:06.175226 644066 usertrap_amd64.go:225] [ 1092: 1095] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:06.183649 644066 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.183694 644066 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0018e1d70 11 D0713 05:18:06.183707 644066 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:06.187001 644066 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.187045 644066 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc0018e1d70 12 D0713 05:18:06.187077 644066 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:06.187174 644066 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.187273 644066 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc0018e1d70 13 D0713 05:18:06.187296 644066 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:06.187355 644066 task_signals.go:470] [ 1092: 1092] Notified of signal 23 D0713 05:18:06.187460 644066 task_signals.go:220] [ 1092: 1092] Signal 23: delivering to handler I0713 05:18:06.195748 644066 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0713 05:18:06.195849 644066 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.195868 644066 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc0018e1d70 14 D0713 05:18:06.195883 644066 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:06.195947 644066 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.195975 644066 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.196001 644066 task_signals.go:204] [ 1092: 1093] Signal 1092, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.196024 644066 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.196043 644066 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.196056 644066 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.196071 644066 task_signals.go:204] [ 1092: 1094] Signal 1092, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.196079 644066 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.196083 644066 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.196087 644066 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.196096 644066 task_signals.go:204] [ 1092: 1095] Signal 1092, PID: 1095, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.196110 644066 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.196114 644066 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.196118 644066 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.196127 644066 task_signals.go:204] [ 1092: 1096] Signal 1092, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.196152 644066 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.196160 644066 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.196167 644066 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.196187 644066 task_signals.go:204] [ 1092: 1097] Signal 1092, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.196200 644066 task_exit.go:204] [ 1092: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.197425 644066 task_exit.go:204] [ 1092: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.197455 644066 task_exit.go:204] [ 1092: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.197487 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.197561 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.197595 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.197729 644066 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.198688 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.200459 644066 syscalls.go:262] [ 1098: 1098] Allocating stack with size of 8388608 bytes D0713 05:18:06.200570 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.201972 644066 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.202016 644066 usertrap_amd64.go:106] [ 1098: 1098] Map a usertrap vma at 69000 D0713 05:18:06.202120 644066 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000b09950 1 D0713 05:18:06.202144 644066 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:06.202455 644066 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.202485 644066 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000b09950 2 D0713 05:18:06.202497 644066 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:06.203293 644066 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.203322 644066 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000b09950 3 D0713 05:18:06.203334 644066 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:06.210025 644066 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.210066 644066 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000b09950 4 D0713 05:18:06.210082 644066 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:06.211409 644066 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.211472 644066 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000b09950 5 D0713 05:18:06.211495 644066 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:06.211593 644066 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.211613 644066 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000b09950 6 D0713 05:18:06.211621 644066 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:06.212146 644066 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.212189 644066 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000b09950 7 D0713 05:18:06.212202 644066 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:06.212423 644066 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.212450 644066 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc000b09950 8 D0713 05:18:06.212460 644066 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:06.212629 644066 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.212661 644066 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc000b09950 9 D0713 05:18:06.212671 644066 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:06.212753 644066 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.212775 644066 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc000b09950 10 D0713 05:18:06.212783 644066 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b020 trap addr 69320 ([184 39 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:06.212823 644066 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.212845 644066 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc000b09950 11 D0713 05:18:06.212853 644066 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b04f trap addr 69370 ([184 234 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:06.212919 644066 task_signals.go:470] [ 1098: 1098] Notified of signal 23 D0713 05:18:06.213258 644066 task_signals.go:220] [ 1098: 1098] Signal 23: delivering to handler D0713 05:18:06.213421 644066 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.213462 644066 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000b09950 12 D0713 05:18:06.213479 644066 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b57c trap addr 693c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:06.223069 644066 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.223118 644066 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000b09950 13 D0713 05:18:06.223137 644066 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:06.224170 644066 task_signals.go:470] [ 1098: 1098] Notified of signal 23 D0713 05:18:06.225930 644066 task_signals.go:220] [ 1098: 1098] Signal 23: delivering to handler D0713 05:18:06.235216 644066 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.235264 644066 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc000b09950 14 D0713 05:18:06.235280 644066 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:06.235341 644066 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.235365 644066 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.235394 644066 task_signals.go:204] [ 1098: 1101] Signal 1098, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.235437 644066 task_signals.go:204] [ 1098: 1099] Signal 1098, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.235407 644066 task_signals.go:204] [ 1098: 1102] Signal 1098, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.235437 644066 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.235490 644066 task_signals.go:204] [ 1098: 1100] Signal 1098, PID: 1100, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.235515 644066 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.235527 644066 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.235549 644066 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.235567 644066 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.235589 644066 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.235600 644066 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.235651 644066 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.235664 644066 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.235680 644066 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.237251 644066 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.237281 644066 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.237296 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.239637 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.239660 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.239771 644066 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.240569 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.241865 644066 syscalls.go:262] [ 1103: 1103] Allocating stack with size of 8388608 bytes D0713 05:18:06.241992 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.250791 644066 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.250859 644066 usertrap_amd64.go:106] [ 1103: 1103] Map a usertrap vma at 63000 D0713 05:18:06.251029 644066 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc000a4fc80 1 D0713 05:18:06.251079 644066 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:06.251530 644066 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.251549 644066 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc000a4fc80 2 D0713 05:18:06.251558 644066 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:06.252378 644066 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.252423 644066 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc000a4fc80 3 D0713 05:18:06.252441 644066 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 05:18:06.261249 644066 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.261292 644066 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc000a4fc80 4 D0713 05:18:06.261310 644066 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:06.262520 644066 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.262578 644066 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc000a4fc80 5 D0713 05:18:06.262592 644066 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:06.262634 644066 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.262641 644066 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc000a4fc80 6 D0713 05:18:06.262648 644066 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:06.262860 644066 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.262870 644066 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc000a4fc80 7 D0713 05:18:06.262878 644066 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:06.263074 644066 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.263095 644066 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc000a4fc80 8 D0713 05:18:06.263105 644066 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:06.263348 644066 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.263374 644066 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc000a4fc80 9 D0713 05:18:06.263385 644066 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:06.263981 644066 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.264003 644066 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc000a4fc80 10 D0713 05:18:06.264015 644066 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:06.274654 644066 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.274710 644066 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc000a4fc80 11 D0713 05:18:06.274728 644066 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:06.274773 644066 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.274810 644066 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc000a4fc80 12 D0713 05:18:06.274823 644066 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:06.274920 644066 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.274943 644066 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc000a4fc80 13 D0713 05:18:06.274952 644066 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:06.274981 644066 task_signals.go:470] [ 1103: 1103] Notified of signal 23 D0713 05:18:06.275014 644066 task_signals.go:220] [ 1103: 1103] Signal 23: delivering to handler D0713 05:18:06.275136 644066 task_signals.go:470] [ 1103: 1103] Notified of signal 23 D0713 05:18:06.275220 644066 task_signals.go:220] [ 1103: 1103] Signal 23: delivering to handler D0713 05:18:06.285353 644066 task_signals.go:470] [ 1103: 1103] Notified of signal 23 D0713 05:18:06.285417 644066 task_signals.go:179] [ 1103: 1103] Restarting syscall 202: interrupted by signal 23 D0713 05:18:06.285439 644066 task_signals.go:220] [ 1103: 1103] Signal 23: delivering to handler D0713 05:18:06.288405 644066 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.288443 644066 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc000a4fc80 14 D0713 05:18:06.288482 644066 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:06.288539 644066 task_exit.go:204] [ 1103: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.288580 644066 task_exit.go:204] [ 1103: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.288584 644066 task_signals.go:204] [ 1103: 1104] Signal 1103, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.288608 644066 task_signals.go:204] [ 1103: 1107] Signal 1103, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.288612 644066 task_signals.go:204] [ 1103: 1105] Signal 1103, PID: 1105, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.288623 644066 task_signals.go:204] [ 1103: 1106] Signal 1103, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.288636 644066 task_exit.go:204] [ 1103: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.288649 644066 task_exit.go:204] [ 1103: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.288655 644066 task_exit.go:204] [ 1103: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.288670 644066 task_exit.go:204] [ 1103: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.288699 644066 task_exit.go:204] [ 1103: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.288707 644066 task_exit.go:204] [ 1103: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.288719 644066 task_exit.go:204] [ 1103: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.288727 644066 task_exit.go:204] [ 1103: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.288733 644066 task_exit.go:204] [ 1103: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.288742 644066 task_exit.go:204] [ 1103: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.290216 644066 task_exit.go:204] [ 1103: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.290285 644066 task_exit.go:204] [ 1103: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.290357 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.290435 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.290502 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.290705 644066 task_exit.go:204] [ 1103: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.291634 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.293750 644066 syscalls.go:262] [ 1108: 1108] Allocating stack with size of 8388608 bytes D0713 05:18:06.293931 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.296055 644066 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.296211 644066 usertrap_amd64.go:106] [ 1108: 1108] Map a usertrap vma at 67000 D0713 05:18:06.296462 644066 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0005ba1e0 1 D0713 05:18:06.296501 644066 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:06.296741 644066 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.296764 644066 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0005ba1e0 2 D0713 05:18:06.296776 644066 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:06.297364 644066 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.297393 644066 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0005ba1e0 3 D0713 05:18:06.297404 644066 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:06.305219 644066 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.305345 644066 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0005ba1e0 4 D0713 05:18:06.305365 644066 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:06.307283 644066 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.307311 644066 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0005ba1e0 5 D0713 05:18:06.307327 644066 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:06.307395 644066 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.307402 644066 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0005ba1e0 6 D0713 05:18:06.307410 644066 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:06.307643 644066 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.307659 644066 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0005ba1e0 7 D0713 05:18:06.307667 644066 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:06.307906 644066 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.307925 644066 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc0005ba1e0 8 D0713 05:18:06.307934 644066 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:06.308201 644066 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.308223 644066 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc0005ba1e0 9 D0713 05:18:06.308232 644066 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:06.308253 644066 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.308259 644066 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0005ba1e0 10 D0713 05:18:06.308265 644066 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:06.319017 644066 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.319083 644066 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0005ba1e0 11 D0713 05:18:06.319105 644066 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:06.319652 644066 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.319707 644066 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc0005ba1e0 12 D0713 05:18:06.319720 644066 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:06.320032 644066 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.320052 644066 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc0005ba1e0 13 D0713 05:18:06.320060 644066 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:06.320104 644066 task_signals.go:470] [ 1108: 1108] Notified of signal 23 D0713 05:18:06.320243 644066 task_signals.go:220] [ 1108: 1108] Signal 23: delivering to handler D0713 05:18:06.330482 644066 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.330530 644066 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc0005ba1e0 14 D0713 05:18:06.330547 644066 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:06.330598 644066 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.330635 644066 task_signals.go:204] [ 1108: 1111] Signal 1108, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.330635 644066 task_signals.go:204] [ 1108: 1110] Signal 1108, PID: 1110, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.330664 644066 task_signals.go:204] [ 1108: 1112] Signal 1108, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.330668 644066 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.330698 644066 task_signals.go:481] [ 1108: 1108] No task notified of signal 23 D0713 05:18:06.330709 644066 task_signals.go:204] [ 1108: 1109] Signal 1108, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.330717 644066 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.330725 644066 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.330729 644066 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.330738 644066 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.330750 644066 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.330754 644066 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.330761 644066 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.330767 644066 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.330771 644066 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.330777 644066 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.332172 644066 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.332204 644066 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.332219 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.332286 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.332311 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.332443 644066 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.333521 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.334952 644066 syscalls.go:262] [ 1113: 1113] Allocating stack with size of 8388608 bytes D0713 05:18:06.335070 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.336228 644066 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.336270 644066 usertrap_amd64.go:106] [ 1113: 1113] Map a usertrap vma at 66000 D0713 05:18:06.336372 644066 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0002fbf20 1 D0713 05:18:06.336393 644066 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:06.336792 644066 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.336825 644066 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0002fbf20 2 D0713 05:18:06.336837 644066 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:06.337794 644066 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.337823 644066 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0002fbf20 3 D0713 05:18:06.337835 644066 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:06.344429 644066 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.344466 644066 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0002fbf20 4 D0713 05:18:06.344479 644066 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:06.345614 644066 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.345632 644066 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0002fbf20 5 D0713 05:18:06.345645 644066 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:06.345703 644066 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.345730 644066 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0002fbf20 6 D0713 05:18:06.345738 644066 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:06.346017 644066 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.346044 644066 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0002fbf20 7 D0713 05:18:06.346053 644066 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:06.346234 644066 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.346255 644066 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc0002fbf20 8 D0713 05:18:06.346265 644066 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:06.346436 644066 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.346465 644066 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc0002fbf20 9 D0713 05:18:06.346477 644066 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:06.346502 644066 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.346511 644066 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0002fbf20 10 D0713 05:18:06.346530 644066 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:06.347048 644066 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.347069 644066 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc0002fbf20 11 D0713 05:18:06.347080 644066 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:06.347248 644066 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.347312 644066 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc0002fbf20 12 D0713 05:18:06.347333 644066 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:06.347367 644066 task_signals.go:470] [ 1113: 1113] Notified of signal 23 D0713 05:18:06.347405 644066 task_signals.go:220] [ 1113: 1113] Signal 23: delivering to handler D0713 05:18:06.354266 644066 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.354291 644066 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0002fbf20 13 D0713 05:18:06.354303 644066 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:06.358256 644066 task_signals.go:470] [ 1113: 1113] Notified of signal 23 D0713 05:18:06.358303 644066 task_signals.go:220] [ 1113: 1113] Signal 23: delivering to handler D0713 05:18:06.365533 644066 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.365575 644066 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc0002fbf20 14 D0713 05:18:06.365591 644066 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:06.365647 644066 task_exit.go:204] [ 1113: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.365676 644066 task_exit.go:204] [ 1113: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.365699 644066 task_signals.go:204] [ 1113: 1117] Signal 1113, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.365723 644066 task_exit.go:204] [ 1113: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.365721 644066 task_signals.go:204] [ 1113: 1114] Signal 1113, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.365732 644066 task_exit.go:204] [ 1113: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.365694 644066 task_signals.go:204] [ 1113: 1115] Signal 1113, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.365739 644066 task_exit.go:204] [ 1113: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.365703 644066 task_signals.go:204] [ 1113: 1116] Signal 1113, PID: 1116, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.365751 644066 task_exit.go:204] [ 1113: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.365798 644066 task_exit.go:204] [ 1113: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.365804 644066 task_exit.go:204] [ 1113: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.365816 644066 task_exit.go:204] [ 1113: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.365825 644066 task_exit.go:204] [ 1113: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.365829 644066 task_exit.go:204] [ 1113: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.365834 644066 task_exit.go:204] [ 1113: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.367020 644066 task_exit.go:204] [ 1113: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.367047 644066 task_exit.go:204] [ 1113: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.367067 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.367097 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.367106 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.367217 644066 task_exit.go:204] [ 1113: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.367639 644066 task_signals.go:470] [ 6: 10] Notified of signal 23 D0713 05:18:06.367684 644066 task_signals.go:220] [ 6: 10] Signal 23: delivering to handler D0713 05:18:06.367934 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.369587 644066 syscalls.go:262] [ 1118: 1118] Allocating stack with size of 8388608 bytes D0713 05:18:06.369767 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.372713 644066 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.372810 644066 usertrap_amd64.go:106] [ 1118: 1118] Map a usertrap vma at 67000 D0713 05:18:06.377023 644066 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc001786150 1 D0713 05:18:06.377125 644066 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 05:18:06.377799 644066 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.377826 644066 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc001786150 2 D0713 05:18:06.377841 644066 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 05:18:06.378370 644066 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.378394 644066 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc001786150 3 D0713 05:18:06.378413 644066 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 05:18:06.384810 644066 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.384839 644066 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc001786150 4 D0713 05:18:06.384853 644066 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 05:18:06.385991 644066 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.386052 644066 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc001786150 5 D0713 05:18:06.386072 644066 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 05:18:06.386128 644066 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.386140 644066 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc001786150 6 D0713 05:18:06.386151 644066 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 05:18:06.386615 644066 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.386631 644066 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc001786150 7 D0713 05:18:06.386638 644066 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 05:18:06.386796 644066 usertrap_amd64.go:212] [ 1118: 1119] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.386812 644066 usertrap_amd64.go:122] [ 1118: 1119] Allocate a new trap: 0xc001786150 8 D0713 05:18:06.386823 644066 usertrap_amd64.go:225] [ 1118: 1119] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 05:18:06.387057 644066 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.387084 644066 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc001786150 9 D0713 05:18:06.387096 644066 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 05:18:06.387107 644066 usertrap_amd64.go:212] [ 1118: 1119] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.387112 644066 usertrap_amd64.go:122] [ 1118: 1119] Allocate a new trap: 0xc001786150 10 D0713 05:18:06.387118 644066 usertrap_amd64.go:225] [ 1118: 1119] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 05:18:06.395898 644066 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.395934 644066 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc001786150 11 D0713 05:18:06.395948 644066 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 05:18:06.398757 644066 usertrap_amd64.go:212] [ 1118: 1119] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.398810 644066 usertrap_amd64.go:122] [ 1118: 1119] Allocate a new trap: 0xc001786150 12 D0713 05:18:06.398829 644066 usertrap_amd64.go:225] [ 1118: 1119] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 05:18:06.398972 644066 usertrap_amd64.go:212] [ 1118: 1119] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.398996 644066 usertrap_amd64.go:122] [ 1118: 1119] Allocate a new trap: 0xc001786150 13 D0713 05:18:06.399006 644066 usertrap_amd64.go:225] [ 1118: 1119] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 05:18:06.399051 644066 task_signals.go:470] [ 1118: 1118] Notified of signal 23 D0713 05:18:06.399170 644066 task_signals.go:220] [ 1118: 1118] Signal 23: delivering to handler D0713 05:18:06.407920 644066 usertrap_amd64.go:212] [ 1118: 1118] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.407985 644066 usertrap_amd64.go:122] [ 1118: 1118] Allocate a new trap: 0xc001786150 14 D0713 05:18:06.408002 644066 usertrap_amd64.go:225] [ 1118: 1118] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 05:18:06.408042 644066 task_exit.go:204] [ 1118: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.408082 644066 task_exit.go:204] [ 1118: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.408106 644066 task_signals.go:204] [ 1118: 1119] Signal 1118, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.408138 644066 task_exit.go:204] [ 1118: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.408147 644066 task_exit.go:204] [ 1118: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.408153 644066 task_exit.go:204] [ 1118: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.408124 644066 task_signals.go:204] [ 1118: 1122] Signal 1118, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.408174 644066 task_exit.go:204] [ 1118: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.408199 644066 task_exit.go:204] [ 1118: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.408206 644066 task_exit.go:204] [ 1118: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.408106 644066 task_signals.go:204] [ 1118: 1120] Signal 1118, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.408228 644066 task_exit.go:204] [ 1118: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.408236 644066 task_exit.go:204] [ 1118: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.408241 644066 task_exit.go:204] [ 1118: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.408125 644066 task_signals.go:204] [ 1118: 1121] Signal 1118, PID: 1121, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.408254 644066 task_exit.go:204] [ 1118: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.409678 644066 task_exit.go:204] [ 1118: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.409723 644066 task_exit.go:204] [ 1118: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.409746 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.409778 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.409797 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.409887 644066 task_exit.go:204] [ 1118: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.410617 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.411901 644066 syscalls.go:262] [ 1123: 1123] Allocating stack with size of 8388608 bytes D0713 05:18:06.412010 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.413780 644066 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.413832 644066 usertrap_amd64.go:106] [ 1123: 1123] Map a usertrap vma at 65000 D0713 05:18:06.413921 644066 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc001216210 1 D0713 05:18:06.413966 644066 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:06.414417 644066 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.414440 644066 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc001216210 2 D0713 05:18:06.414454 644066 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:06.415114 644066 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.415133 644066 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc001216210 3 D0713 05:18:06.415141 644066 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:06.422092 644066 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.422157 644066 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc001216210 4 D0713 05:18:06.422181 644066 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:06.423417 644066 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.423471 644066 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc001216210 5 D0713 05:18:06.423491 644066 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:06.423578 644066 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.423597 644066 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc001216210 6 D0713 05:18:06.423609 644066 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:06.423861 644066 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.423887 644066 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc001216210 7 D0713 05:18:06.423906 644066 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:06.424124 644066 usertrap_amd64.go:212] [ 1123: 1124] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.424151 644066 usertrap_amd64.go:122] [ 1123: 1124] Allocate a new trap: 0xc001216210 8 D0713 05:18:06.424164 644066 usertrap_amd64.go:225] [ 1123: 1124] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:06.424390 644066 usertrap_amd64.go:212] [ 1123: 1124] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.424421 644066 usertrap_amd64.go:122] [ 1123: 1124] Allocate a new trap: 0xc001216210 9 D0713 05:18:06.424432 644066 usertrap_amd64.go:225] [ 1123: 1124] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:06.424475 644066 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.424485 644066 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc001216210 10 D0713 05:18:06.424494 644066 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:06.433568 644066 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.433637 644066 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc001216210 11 D0713 05:18:06.433652 644066 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:06.436537 644066 usertrap_amd64.go:212] [ 1123: 1124] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.436587 644066 usertrap_amd64.go:122] [ 1123: 1124] Allocate a new trap: 0xc001216210 12 D0713 05:18:06.436604 644066 usertrap_amd64.go:225] [ 1123: 1124] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:06.436748 644066 usertrap_amd64.go:212] [ 1123: 1124] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.436791 644066 usertrap_amd64.go:122] [ 1123: 1124] Allocate a new trap: 0xc001216210 13 D0713 05:18:06.436807 644066 usertrap_amd64.go:225] [ 1123: 1124] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:06.436861 644066 task_signals.go:470] [ 1123: 1123] Notified of signal 23 D0713 05:18:06.437162 644066 task_signals.go:220] [ 1123: 1123] Signal 23: delivering to handler D0713 05:18:06.446158 644066 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.446201 644066 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc001216210 14 D0713 05:18:06.446220 644066 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:06.446281 644066 task_exit.go:204] [ 1123: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.446308 644066 task_exit.go:204] [ 1123: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.446338 644066 task_signals.go:204] [ 1123: 1124] Signal 1123, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.446371 644066 task_exit.go:204] [ 1123: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.446389 644066 task_exit.go:204] [ 1123: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.446396 644066 task_exit.go:204] [ 1123: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.446415 644066 task_signals.go:204] [ 1123: 1125] Signal 1123, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.446429 644066 task_exit.go:204] [ 1123: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.446416 644066 task_signals.go:204] [ 1123: 1127] Signal 1123, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.446436 644066 task_exit.go:204] [ 1123: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.446442 644066 task_exit.go:204] [ 1123: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.446453 644066 task_signals.go:204] [ 1123: 1126] Signal 1123, PID: 1126, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.446463 644066 task_exit.go:204] [ 1123: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.446483 644066 task_exit.go:204] [ 1123: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.446497 644066 task_exit.go:204] [ 1123: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.446514 644066 task_exit.go:204] [ 1123: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.448248 644066 task_exit.go:204] [ 1123: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.448316 644066 task_exit.go:204] [ 1123: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.448337 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.448373 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.448401 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.448592 644066 task_exit.go:204] [ 1123: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.449364 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.451466 644066 syscalls.go:262] [ 1128: 1128] Allocating stack with size of 8388608 bytes D0713 05:18:06.451611 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.454153 644066 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.454205 644066 usertrap_amd64.go:106] [ 1128: 1128] Map a usertrap vma at 61000 D0713 05:18:06.454278 644066 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0012163c0 1 D0713 05:18:06.454309 644066 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 05:18:06.454750 644066 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.454787 644066 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0012163c0 2 D0713 05:18:06.454800 644066 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 05:18:06.455759 644066 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.455789 644066 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0012163c0 3 D0713 05:18:06.455803 644066 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 05:18:06.463881 644066 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.463957 644066 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0012163c0 4 D0713 05:18:06.463979 644066 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 05:18:06.465380 644066 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.465414 644066 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0012163c0 5 D0713 05:18:06.465428 644066 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 05:18:06.465475 644066 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.465482 644066 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0012163c0 6 D0713 05:18:06.465489 644066 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 05:18:06.465684 644066 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.465703 644066 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0012163c0 7 D0713 05:18:06.465712 644066 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 05:18:06.465885 644066 usertrap_amd64.go:212] [ 1128: 1129] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.465900 644066 usertrap_amd64.go:122] [ 1128: 1129] Allocate a new trap: 0xc0012163c0 8 D0713 05:18:06.465910 644066 usertrap_amd64.go:225] [ 1128: 1129] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 05:18:06.466101 644066 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.466129 644066 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0012163c0 9 D0713 05:18:06.466139 644066 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 05:18:06.466200 644066 usertrap_amd64.go:212] [ 1128: 1129] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.466211 644066 usertrap_amd64.go:122] [ 1128: 1129] Allocate a new trap: 0xc0012163c0 10 D0713 05:18:06.466241 644066 usertrap_amd64.go:225] [ 1128: 1129] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 05:18:06.466946 644066 usertrap_amd64.go:212] [ 1128: 1129] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.466995 644066 usertrap_amd64.go:122] [ 1128: 1129] Allocate a new trap: 0xc0012163c0 11 D0713 05:18:06.467010 644066 usertrap_amd64.go:225] [ 1128: 1129] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 05:18:06.467371 644066 usertrap_amd64.go:212] [ 1128: 1129] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.467472 644066 usertrap_amd64.go:122] [ 1128: 1129] Allocate a new trap: 0xc0012163c0 12 D0713 05:18:06.467538 644066 usertrap_amd64.go:225] [ 1128: 1129] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 05:18:06.467564 644066 task_signals.go:470] [ 1128: 1128] Notified of signal 23 D0713 05:18:06.467635 644066 task_signals.go:220] [ 1128: 1128] Signal 23: delivering to handler D0713 05:18:06.476204 644066 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.476249 644066 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0012163c0 13 D0713 05:18:06.476262 644066 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 05:18:06.477938 644066 task_signals.go:470] [ 1128: 1128] Notified of signal 23 D0713 05:18:06.478927 644066 task_signals.go:220] [ 1128: 1128] Signal 23: delivering to handler D0713 05:18:06.487467 644066 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.487511 644066 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0012163c0 14 D0713 05:18:06.487526 644066 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 05:18:06.487593 644066 task_exit.go:204] [ 1128: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.487701 644066 task_exit.go:204] [ 1128: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.487739 644066 task_signals.go:204] [ 1128: 1130] Signal 1128, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.487759 644066 task_exit.go:204] [ 1128: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.487764 644066 task_exit.go:204] [ 1128: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.487769 644066 task_exit.go:204] [ 1128: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.487782 644066 task_signals.go:204] [ 1128: 1129] Signal 1128, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.487791 644066 task_exit.go:204] [ 1128: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.487799 644066 task_exit.go:204] [ 1128: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.487805 644066 task_exit.go:204] [ 1128: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.487817 644066 task_signals.go:204] [ 1128: 1131] Signal 1128, PID: 1131, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.487826 644066 task_exit.go:204] [ 1128: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.487833 644066 task_exit.go:204] [ 1128: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.487850 644066 task_exit.go:204] [ 1128: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.487864 644066 task_signals.go:204] [ 1128: 1132] Signal 1128, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.487893 644066 task_exit.go:204] [ 1128: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.489323 644066 task_exit.go:204] [ 1128: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.489361 644066 task_exit.go:204] [ 1128: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.489378 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.489413 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.489423 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.489491 644066 task_exit.go:204] [ 1128: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.490336 644066 task_stop.go:118] [ 6: 19] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.492321 644066 syscalls.go:262] [ 1133: 1133] Allocating stack with size of 8388608 bytes D0713 05:18:06.492810 644066 task_stop.go:138] [ 6: 19] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.497751 644066 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.497878 644066 usertrap_amd64.go:106] [ 1133: 1133] Map a usertrap vma at 68000 D0713 05:18:06.498069 644066 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc001786570 1 D0713 05:18:06.498151 644066 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 05:18:06.498637 644066 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.498710 644066 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc001786570 2 D0713 05:18:06.498771 644066 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 05:18:06.499915 644066 task_signals.go:481] [ 6: 19] No task notified of signal 23 D0713 05:18:06.500997 644066 task_signals.go:220] [ 6: 19] Signal 23: delivering to handler D0713 05:18:06.501152 644066 task_signals.go:470] [ 6: 19] Notified of signal 23 D0713 05:18:06.501185 644066 task_signals.go:220] [ 6: 19] Signal 23: delivering to handler D0713 05:18:06.509420 644066 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.509497 644066 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc001786570 3 D0713 05:18:06.509518 644066 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 05:18:06.518117 644066 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.518179 644066 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc001786570 4 D0713 05:18:06.518197 644066 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 05:18:06.519437 644066 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.519485 644066 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc001786570 5 D0713 05:18:06.519496 644066 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 05:18:06.519661 644066 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.519687 644066 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc001786570 6 D0713 05:18:06.519698 644066 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 05:18:06.519967 644066 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.519999 644066 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc001786570 7 D0713 05:18:06.520009 644066 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 05:18:06.520290 644066 usertrap_amd64.go:212] [ 1133: 1134] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.520312 644066 usertrap_amd64.go:122] [ 1133: 1134] Allocate a new trap: 0xc001786570 8 D0713 05:18:06.520325 644066 usertrap_amd64.go:225] [ 1133: 1134] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 05:18:06.520655 644066 usertrap_amd64.go:212] [ 1133: 1134] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.520720 644066 usertrap_amd64.go:122] [ 1133: 1134] Allocate a new trap: 0xc001786570 9 D0713 05:18:06.520739 644066 usertrap_amd64.go:225] [ 1133: 1134] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 05:18:06.520780 644066 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.520800 644066 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc001786570 10 D0713 05:18:06.520859 644066 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 05:18:06.529275 644066 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.529311 644066 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc001786570 11 D0713 05:18:06.529323 644066 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 05:18:06.532050 644066 usertrap_amd64.go:212] [ 1133: 1134] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.532084 644066 usertrap_amd64.go:122] [ 1133: 1134] Allocate a new trap: 0xc001786570 12 D0713 05:18:06.532095 644066 usertrap_amd64.go:225] [ 1133: 1134] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 05:18:06.532113 644066 usertrap_amd64.go:212] [ 1133: 1134] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.532117 644066 usertrap_amd64.go:122] [ 1133: 1134] Allocate a new trap: 0xc001786570 13 D0713 05:18:06.532123 644066 usertrap_amd64.go:225] [ 1133: 1134] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 05:18:06.532181 644066 task_signals.go:470] [ 1133: 1133] Notified of signal 23 D0713 05:18:06.532415 644066 task_signals.go:220] [ 1133: 1133] Signal 23: delivering to handler D0713 05:18:06.540852 644066 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.540883 644066 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc001786570 14 D0713 05:18:06.540896 644066 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 05:18:06.541026 644066 task_exit.go:204] [ 1133: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.541083 644066 task_signals.go:204] [ 1133: 1134] Signal 1133, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.541105 644066 task_signals.go:204] [ 1133: 1137] Signal 1133, PID: 1137, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.541120 644066 task_exit.go:204] [ 1133: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.541142 644066 task_signals.go:204] [ 1133: 1136] Signal 1133, PID: 1136, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.541160 644066 task_exit.go:204] [ 1133: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.541144 644066 task_signals.go:204] [ 1133: 1135] Signal 1133, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.541183 644066 task_exit.go:204] [ 1133: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.541206 644066 task_exit.go:204] [ 1133: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.541249 644066 task_exit.go:204] [ 1133: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.541273 644066 task_exit.go:204] [ 1133: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.541288 644066 task_exit.go:204] [ 1133: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.541302 644066 task_exit.go:204] [ 1133: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.541312 644066 task_exit.go:204] [ 1133: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.541319 644066 task_exit.go:204] [ 1133: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.541339 644066 task_exit.go:204] [ 1133: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.542740 644066 task_exit.go:204] [ 1133: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.542787 644066 task_exit.go:204] [ 1133: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.542804 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.542832 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.542844 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.543039 644066 task_exit.go:204] [ 1133: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.544169 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.545886 644066 syscalls.go:262] [ 1138: 1138] Allocating stack with size of 8388608 bytes D0713 05:18:06.546002 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.547658 644066 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.547772 644066 usertrap_amd64.go:106] [ 1138: 1138] Map a usertrap vma at 64000 D0713 05:18:06.547916 644066 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc002528300 1 D0713 05:18:06.547969 644066 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:06.548401 644066 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.548514 644066 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc002528300 2 D0713 05:18:06.548550 644066 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:06.549260 644066 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.549290 644066 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc002528300 3 D0713 05:18:06.549304 644066 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:06.556221 644066 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.556276 644066 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc002528300 4 D0713 05:18:06.556292 644066 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:06.557497 644066 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.557538 644066 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc002528300 5 D0713 05:18:06.557556 644066 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:06.557684 644066 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.557727 644066 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc002528300 6 D0713 05:18:06.557742 644066 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:06.558214 644066 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.558241 644066 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc002528300 7 D0713 05:18:06.558252 644066 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:06.558448 644066 usertrap_amd64.go:212] [ 1138: 1139] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.558465 644066 usertrap_amd64.go:122] [ 1138: 1139] Allocate a new trap: 0xc002528300 8 D0713 05:18:06.558471 644066 usertrap_amd64.go:225] [ 1138: 1139] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:06.558650 644066 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.558669 644066 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc002528300 9 D0713 05:18:06.558675 644066 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:06.558788 644066 usertrap_amd64.go:212] [ 1138: 1139] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.558835 644066 usertrap_amd64.go:122] [ 1138: 1139] Allocate a new trap: 0xc002528300 10 D0713 05:18:06.558846 644066 usertrap_amd64.go:225] [ 1138: 1139] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:06.566782 644066 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.566815 644066 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc002528300 11 D0713 05:18:06.566833 644066 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:06.569618 644066 usertrap_amd64.go:212] [ 1138: 1139] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.569690 644066 usertrap_amd64.go:122] [ 1138: 1139] Allocate a new trap: 0xc002528300 12 D0713 05:18:06.569704 644066 usertrap_amd64.go:225] [ 1138: 1139] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:06.569760 644066 usertrap_amd64.go:212] [ 1138: 1139] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.569782 644066 usertrap_amd64.go:122] [ 1138: 1139] Allocate a new trap: 0xc002528300 13 D0713 05:18:06.569790 644066 usertrap_amd64.go:225] [ 1138: 1139] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:06.569849 644066 task_signals.go:470] [ 1138: 1138] Notified of signal 23 D0713 05:18:06.569945 644066 task_signals.go:220] [ 1138: 1138] Signal 23: delivering to handler I0713 05:18:06.579403 644066 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0713 05:18:06.579531 644066 usertrap_amd64.go:212] [ 1138: 1138] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.579587 644066 usertrap_amd64.go:122] [ 1138: 1138] Allocate a new trap: 0xc002528300 14 D0713 05:18:06.579627 644066 usertrap_amd64.go:225] [ 1138: 1138] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:06.579684 644066 task_exit.go:204] [ 1138: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.579715 644066 task_exit.go:204] [ 1138: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.579757 644066 task_signals.go:204] [ 1138: 1139] Signal 1138, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.579784 644066 task_exit.go:204] [ 1138: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.579768 644066 task_signals.go:204] [ 1138: 1141] Signal 1138, PID: 1141, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.579791 644066 task_exit.go:204] [ 1138: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.579798 644066 task_exit.go:204] [ 1138: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.579812 644066 task_exit.go:204] [ 1138: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.579820 644066 task_exit.go:204] [ 1138: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.579835 644066 task_exit.go:204] [ 1138: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.579862 644066 task_signals.go:204] [ 1138: 1142] Signal 1138, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.579872 644066 task_exit.go:204] [ 1138: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.579879 644066 task_exit.go:204] [ 1138: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.579895 644066 task_exit.go:204] [ 1138: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.579906 644066 task_signals.go:204] [ 1138: 1140] Signal 1138, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.579915 644066 task_exit.go:204] [ 1138: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.581529 644066 task_exit.go:204] [ 1138: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.581636 644066 task_exit.go:204] [ 1138: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.581670 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.581743 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.581769 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.581879 644066 task_exit.go:204] [ 1138: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.582766 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.584628 644066 syscalls.go:262] [ 1143: 1143] Allocating stack with size of 8388608 bytes D0713 05:18:06.584746 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.586460 644066 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.586513 644066 usertrap_amd64.go:106] [ 1143: 1143] Map a usertrap vma at 66000 D0713 05:18:06.586630 644066 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001786780 1 D0713 05:18:06.586663 644066 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:06.587076 644066 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.587109 644066 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001786780 2 D0713 05:18:06.587119 644066 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:06.587909 644066 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.587987 644066 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001786780 3 D0713 05:18:06.588008 644066 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:06.596033 644066 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.596083 644066 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001786780 4 D0713 05:18:06.596101 644066 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:06.597942 644066 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.598002 644066 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001786780 5 D0713 05:18:06.598015 644066 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:06.598072 644066 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.598090 644066 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001786780 6 D0713 05:18:06.598099 644066 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:06.598644 644066 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.598674 644066 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001786780 7 D0713 05:18:06.598683 644066 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:06.598863 644066 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.598890 644066 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc001786780 8 D0713 05:18:06.598899 644066 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:06.599169 644066 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.599296 644066 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc001786780 9 D0713 05:18:06.599353 644066 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:06.599581 644066 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.599608 644066 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001786780 10 D0713 05:18:06.599617 644066 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:06.608458 644066 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.608509 644066 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001786780 11 D0713 05:18:06.608524 644066 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:06.611628 644066 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.611697 644066 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc001786780 12 D0713 05:18:06.611717 644066 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:06.611746 644066 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.611754 644066 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc001786780 13 D0713 05:18:06.611761 644066 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:06.611783 644066 task_signals.go:470] [ 1143: 1143] Notified of signal 23 D0713 05:18:06.611834 644066 task_signals.go:220] [ 1143: 1143] Signal 23: delivering to handler D0713 05:18:06.621626 644066 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.621697 644066 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001786780 14 D0713 05:18:06.621718 644066 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:06.621784 644066 task_exit.go:204] [ 1143: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.621814 644066 task_exit.go:204] [ 1143: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.621851 644066 task_signals.go:204] [ 1143: 1147] Signal 1143, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.621881 644066 task_signals.go:204] [ 1143: 1145] Signal 1143, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.621886 644066 task_signals.go:204] [ 1143: 1146] Signal 1143, PID: 1146, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.621890 644066 task_exit.go:204] [ 1143: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.621928 644066 task_exit.go:204] [ 1143: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.621947 644066 task_exit.go:204] [ 1143: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.621833 644066 task_signals.go:204] [ 1143: 1144] Signal 1143, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.621979 644066 task_exit.go:204] [ 1143: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.621988 644066 task_exit.go:204] [ 1143: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.621995 644066 task_exit.go:204] [ 1143: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.622017 644066 task_exit.go:204] [ 1143: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.622035 644066 task_exit.go:204] [ 1143: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.622041 644066 task_exit.go:204] [ 1143: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.622054 644066 task_exit.go:204] [ 1143: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.623569 644066 task_exit.go:204] [ 1143: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.623603 644066 task_exit.go:204] [ 1143: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.623619 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.625258 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:06.625386 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.625533 644066 task_exit.go:204] [ 1143: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.626244 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.627956 644066 syscalls.go:262] [ 1148: 1148] Allocating stack with size of 8388608 bytes D0713 05:18:06.628083 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.630239 644066 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.630285 644066 usertrap_amd64.go:106] [ 1148: 1148] Map a usertrap vma at 63000 D0713 05:18:06.630360 644066 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc0025285d0 1 D0713 05:18:06.630387 644066 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 05:18:06.630869 644066 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.630893 644066 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc0025285d0 2 D0713 05:18:06.630905 644066 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 05:18:06.631797 644066 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.631820 644066 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc0025285d0 3 D0713 05:18:06.631827 644066 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) executing program D0713 05:18:06.641248 644066 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.641314 644066 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc0025285d0 4 D0713 05:18:06.641335 644066 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 05:18:06.642853 644066 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.642895 644066 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc0025285d0 5 D0713 05:18:06.642911 644066 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 05:18:06.642964 644066 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.642972 644066 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc0025285d0 6 D0713 05:18:06.642980 644066 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 05:18:06.643441 644066 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.643461 644066 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc0025285d0 7 D0713 05:18:06.643474 644066 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 05:18:06.643781 644066 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.643809 644066 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc0025285d0 8 D0713 05:18:06.643821 644066 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 05:18:06.643950 644066 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.643968 644066 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc0025285d0 9 D0713 05:18:06.643979 644066 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 05:18:06.644335 644066 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.644383 644066 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc0025285d0 10 D0713 05:18:06.644398 644066 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 05:18:06.644498 644066 usertrap_amd64.go:212] [ 1148: 1151] Found the pattern at ip 46b6e0:sysno 24 D0713 05:18:06.644549 644066 usertrap_amd64.go:122] [ 1148: 1151] Allocate a new trap: 0xc0025285d0 11 D0713 05:18:06.644617 644066 usertrap_amd64.go:225] [ 1148: 1151] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 05:18:06.654502 644066 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.654562 644066 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc0025285d0 12 D0713 05:18:06.654581 644066 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 05:18:06.655031 644066 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.655087 644066 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc0025285d0 13 D0713 05:18:06.655105 644066 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46b020 trap addr 63410 ([184 39 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 05:18:06.655158 644066 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.655166 644066 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc0025285d0 14 D0713 05:18:06.655175 644066 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46b04f trap addr 63460 ([184 234 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 05:18:06.655196 644066 task_signals.go:470] [ 1148: 1148] Notified of signal 23 D0713 05:18:06.655292 644066 task_signals.go:220] [ 1148: 1148] Signal 23: delivering to handler D0713 05:18:06.667050 644066 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.667105 644066 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc0025285d0 15 D0713 05:18:06.667121 644066 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 05:18:06.667193 644066 task_exit.go:204] [ 1148: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.667239 644066 task_exit.go:204] [ 1148: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.667285 644066 task_signals.go:204] [ 1148: 1153] Signal 1148, PID: 1153, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.667287 644066 task_signals.go:204] [ 1148: 1149] Signal 1148, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.667327 644066 task_exit.go:204] [ 1148: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.667346 644066 task_signals.go:204] [ 1148: 1151] Signal 1148, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.667271 644066 task_signals.go:204] [ 1148: 1152] Signal 1148, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.667318 644066 task_signals.go:204] [ 1148: 1150] Signal 1148, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.667367 644066 task_exit.go:204] [ 1148: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.667372 644066 task_exit.go:204] [ 1148: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.667386 644066 task_exit.go:204] [ 1148: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.667393 644066 task_exit.go:204] [ 1148: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.667399 644066 task_exit.go:204] [ 1148: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.667429 644066 task_exit.go:204] [ 1148: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.667439 644066 task_exit.go:204] [ 1148: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.667445 644066 task_exit.go:204] [ 1148: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.667457 644066 task_exit.go:204] [ 1148: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.667465 644066 task_exit.go:204] [ 1148: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.667471 644066 task_exit.go:204] [ 1148: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.667480 644066 task_exit.go:204] [ 1148: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.668994 644066 task_exit.go:204] [ 1148: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.669038 644066 task_exit.go:204] [ 1148: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.669054 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.669133 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.669292 644066 task_exit.go:204] [ 1148: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.669345 644066 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 05:18:06.669373 644066 task_signals.go:179] [ 6: 11] Restarting syscall 202: interrupted by signal 23 D0713 05:18:06.669400 644066 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 05:18:06.670401 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.672088 644066 syscalls.go:262] [ 1154: 1154] Allocating stack with size of 8388608 bytes D0713 05:18:06.672200 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.673277 644066 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.673343 644066 usertrap_amd64.go:106] [ 1154: 1154] Map a usertrap vma at 60000 D0713 05:18:06.673465 644066 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001216990 1 D0713 05:18:06.673514 644066 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:06.673931 644066 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.673961 644066 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001216990 2 D0713 05:18:06.673974 644066 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:06.674656 644066 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.674696 644066 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001216990 3 D0713 05:18:06.674712 644066 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:06.683613 644066 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.683644 644066 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001216990 4 D0713 05:18:06.683662 644066 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:06.685427 644066 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.685452 644066 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001216990 5 D0713 05:18:06.685484 644066 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:06.685539 644066 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.685555 644066 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001216990 6 D0713 05:18:06.685564 644066 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:06.685957 644066 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.685984 644066 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001216990 7 D0713 05:18:06.685996 644066 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:06.686204 644066 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.686230 644066 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc001216990 8 D0713 05:18:06.686238 644066 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:06.686350 644066 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.686373 644066 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc001216990 9 D0713 05:18:06.686382 644066 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:06.686462 644066 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.686513 644066 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc001216990 10 D0713 05:18:06.686532 644066 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46b020 trap addr 60320 ([184 39 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:06.686617 644066 usertrap_amd64.go:212] [ 1154: 1155] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.686636 644066 usertrap_amd64.go:122] [ 1154: 1155] Allocate a new trap: 0xc001216990 11 D0713 05:18:06.686646 644066 usertrap_amd64.go:225] [ 1154: 1155] Apply the binary patch addr 46b04f trap addr 60370 ([184 234 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:06.686773 644066 task_signals.go:481] [ 1154: 1154] No task notified of signal 23 D0713 05:18:06.686821 644066 task_signals.go:220] [ 1154: 1154] Signal 23: delivering to handler D0713 05:18:06.686977 644066 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.687012 644066 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001216990 12 D0713 05:18:06.687026 644066 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46b57c trap addr 603c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:06.695282 644066 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.695326 644066 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001216990 13 D0713 05:18:06.695340 644066 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:06.700121 644066 task_signals.go:470] [ 1154: 1154] Notified of signal 23 D0713 05:18:06.700322 644066 task_signals.go:220] [ 1154: 1154] Signal 23: delivering to handler D0713 05:18:06.707268 644066 usertrap_amd64.go:212] [ 1154: 1154] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.707315 644066 usertrap_amd64.go:122] [ 1154: 1154] Allocate a new trap: 0xc001216990 14 D0713 05:18:06.707334 644066 usertrap_amd64.go:225] [ 1154: 1154] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:06.707424 644066 task_exit.go:204] [ 1154: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.707453 644066 task_exit.go:204] [ 1154: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.707488 644066 task_signals.go:204] [ 1154: 1158] Signal 1154, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.707481 644066 task_signals.go:204] [ 1154: 1156] Signal 1154, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.707489 644066 task_signals.go:204] [ 1154: 1157] Signal 1154, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.707502 644066 task_exit.go:204] [ 1154: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.707518 644066 task_exit.go:204] [ 1154: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.707524 644066 task_exit.go:204] [ 1154: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.707540 644066 task_exit.go:204] [ 1154: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.707547 644066 task_exit.go:204] [ 1154: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.707553 644066 task_exit.go:204] [ 1154: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.707566 644066 task_signals.go:204] [ 1154: 1155] Signal 1154, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.707575 644066 task_exit.go:204] [ 1154: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.707585 644066 task_exit.go:204] [ 1154: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.707591 644066 task_exit.go:204] [ 1154: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.707600 644066 task_exit.go:204] [ 1154: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.709187 644066 task_exit.go:204] [ 1154: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.709212 644066 task_exit.go:204] [ 1154: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.709226 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.713940 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.713988 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.717160 644066 task_exit.go:204] [ 1154: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.717888 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.719260 644066 syscalls.go:262] [ 1159: 1159] Allocating stack with size of 8388608 bytes D0713 05:18:06.719358 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.721655 644066 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.721702 644066 usertrap_amd64.go:106] [ 1159: 1159] Map a usertrap vma at 65000 D0713 05:18:06.721846 644066 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001216ae0 1 D0713 05:18:06.721886 644066 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:06.724335 644066 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.724380 644066 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001216ae0 2 D0713 05:18:06.724398 644066 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:06.725163 644066 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.725194 644066 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001216ae0 3 D0713 05:18:06.725208 644066 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:06.733632 644066 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.733693 644066 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001216ae0 4 D0713 05:18:06.733707 644066 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:06.734900 644066 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.734927 644066 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001216ae0 5 D0713 05:18:06.734939 644066 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:06.735438 644066 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.735509 644066 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001216ae0 6 D0713 05:18:06.735525 644066 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:06.735923 644066 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.735949 644066 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001216ae0 7 D0713 05:18:06.735959 644066 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:06.736125 644066 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.736148 644066 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc001216ae0 8 D0713 05:18:06.736157 644066 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:06.736319 644066 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.736349 644066 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc001216ae0 9 D0713 05:18:06.736358 644066 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:06.736447 644066 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.736474 644066 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001216ae0 10 D0713 05:18:06.736484 644066 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:06.747237 644066 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.747281 644066 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001216ae0 11 D0713 05:18:06.747296 644066 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:06.750516 644066 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.750549 644066 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc001216ae0 12 D0713 05:18:06.750565 644066 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:06.750602 644066 usertrap_amd64.go:212] [ 1159: 1160] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.750618 644066 usertrap_amd64.go:122] [ 1159: 1160] Allocate a new trap: 0xc001216ae0 13 D0713 05:18:06.750627 644066 usertrap_amd64.go:225] [ 1159: 1160] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:06.750676 644066 task_signals.go:470] [ 1159: 1159] Notified of signal 23 D0713 05:18:06.751092 644066 task_signals.go:220] [ 1159: 1159] Signal 23: delivering to handler D0713 05:18:06.759723 644066 usertrap_amd64.go:212] [ 1159: 1159] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.759779 644066 usertrap_amd64.go:122] [ 1159: 1159] Allocate a new trap: 0xc001216ae0 14 D0713 05:18:06.759791 644066 usertrap_amd64.go:225] [ 1159: 1159] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:06.759834 644066 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.759854 644066 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.759881 644066 task_signals.go:204] [ 1159: 1162] Signal 1159, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.759902 644066 task_signals.go:204] [ 1159: 1163] Signal 1159, PID: 1163, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.759909 644066 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.759881 644066 task_signals.go:204] [ 1159: 1160] Signal 1159, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.759923 644066 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.759937 644066 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.759944 644066 task_exit.go:204] [ 1159: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.759981 644066 task_signals.go:204] [ 1159: 1161] Signal 1159, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.759997 644066 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.760003 644066 task_exit.go:204] [ 1159: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.760024 644066 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.760062 644066 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.760070 644066 task_exit.go:204] [ 1159: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.760080 644066 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.761415 644066 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.761444 644066 task_exit.go:204] [ 1159: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.761460 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.761491 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.761513 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.761705 644066 task_exit.go:204] [ 1159: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.762356 644066 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.763996 644066 syscalls.go:262] [ 1164: 1164] Allocating stack with size of 8388608 bytes D0713 05:18:06.764103 644066 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.765478 644066 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.765521 644066 usertrap_amd64.go:106] [ 1164: 1164] Map a usertrap vma at 69000 D0713 05:18:06.765599 644066 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d647e0 1 D0713 05:18:06.765619 644066 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:06.766037 644066 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.766059 644066 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d647e0 2 D0713 05:18:06.766069 644066 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:06.767569 644066 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.767626 644066 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d647e0 3 D0713 05:18:06.767644 644066 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:06.775459 644066 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.775503 644066 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d647e0 4 D0713 05:18:06.775518 644066 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:06.776799 644066 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.776837 644066 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d647e0 5 D0713 05:18:06.776850 644066 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:06.776925 644066 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.776936 644066 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d647e0 6 D0713 05:18:06.776987 644066 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:06.777535 644066 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.777560 644066 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d647e0 7 D0713 05:18:06.777567 644066 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:06.777750 644066 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.777774 644066 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc000d647e0 8 D0713 05:18:06.777781 644066 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:06.778110 644066 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.778169 644066 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc000d647e0 9 D0713 05:18:06.778188 644066 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:06.778216 644066 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.778222 644066 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d647e0 10 D0713 05:18:06.778231 644066 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:06.778853 644066 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.778887 644066 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc000d647e0 11 D0713 05:18:06.778900 644066 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:06.778965 644066 usertrap_amd64.go:212] [ 1164: 1165] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.778984 644066 usertrap_amd64.go:122] [ 1164: 1165] Allocate a new trap: 0xc000d647e0 12 D0713 05:18:06.778992 644066 usertrap_amd64.go:225] [ 1164: 1165] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:06.779027 644066 task_signals.go:470] [ 1164: 1164] Notified of signal 23 D0713 05:18:06.779138 644066 task_signals.go:220] [ 1164: 1164] Signal 23: delivering to handler D0713 05:18:06.786583 644066 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.786616 644066 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d647e0 13 D0713 05:18:06.786632 644066 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:06.789365 644066 task_signals.go:470] [ 1164: 1164] Notified of signal 23 D0713 05:18:06.789419 644066 task_signals.go:220] [ 1164: 1164] Signal 23: delivering to handler D0713 05:18:06.797637 644066 usertrap_amd64.go:212] [ 1164: 1164] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.797694 644066 usertrap_amd64.go:122] [ 1164: 1164] Allocate a new trap: 0xc000d647e0 14 D0713 05:18:06.797713 644066 usertrap_amd64.go:225] [ 1164: 1164] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:06.797773 644066 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.797800 644066 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.797836 644066 task_signals.go:204] [ 1164: 1167] Signal 1164, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.797855 644066 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.797864 644066 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.797834 644066 task_signals.go:204] [ 1164: 1166] Signal 1164, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.797870 644066 task_exit.go:204] [ 1164: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.797906 644066 task_signals.go:204] [ 1164: 1168] Signal 1164, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.797920 644066 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.797950 644066 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.797960 644066 task_exit.go:204] [ 1164: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.797900 644066 task_signals.go:204] [ 1164: 1165] Signal 1164, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.797974 644066 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.797983 644066 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.797989 644066 task_exit.go:204] [ 1164: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.798002 644066 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.799369 644066 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.799408 644066 task_exit.go:204] [ 1164: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.799430 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.799511 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.799536 644066 task_exit.go:204] [ 1164: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.800437 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.802507 644066 syscalls.go:262] [ 1169: 1169] Allocating stack with size of 8388608 bytes D0713 05:18:06.808019 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.830774 644066 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 05:18:06.830887 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 23 D0713 05:18:06.830902 644066 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 05:18:06.834460 644066 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.834522 644066 usertrap_amd64.go:106] [ 1169: 1169] Map a usertrap vma at 65000 D0713 05:18:06.834655 644066 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d64840 1 D0713 05:18:06.834733 644066 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:06.835469 644066 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.835492 644066 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d64840 2 D0713 05:18:06.835531 644066 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:06.836380 644066 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.836405 644066 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d64840 3 D0713 05:18:06.836418 644066 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:06.845044 644066 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.845262 644066 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d64840 4 D0713 05:18:06.845324 644066 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:06.846841 644066 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.846890 644066 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d64840 5 D0713 05:18:06.846907 644066 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:06.846974 644066 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.846993 644066 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d64840 6 D0713 05:18:06.847000 644066 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:06.847433 644066 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.847472 644066 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d64840 7 D0713 05:18:06.847483 644066 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:06.847768 644066 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.847785 644066 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc000d64840 8 D0713 05:18:06.847794 644066 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:06.848115 644066 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.848147 644066 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc000d64840 9 D0713 05:18:06.848158 644066 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:06.848285 644066 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.848326 644066 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d64840 10 D0713 05:18:06.848369 644066 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:06.856521 644066 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.856561 644066 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d64840 11 D0713 05:18:06.856577 644066 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:06.859059 644066 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.860146 644066 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc000d64840 12 D0713 05:18:06.860292 644066 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:06.860367 644066 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.860383 644066 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc000d64840 13 D0713 05:18:06.860393 644066 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:06.860439 644066 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0713 05:18:06.860547 644066 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0713 05:18:06.867657 644066 sys_signal.go:495] [ 1169: 1169] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0713 05:18:06.867777 644066 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.867805 644066 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000d64840 14 D0713 05:18:06.867839 644066 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:06.867910 644066 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.867937 644066 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.867982 644066 task_signals.go:204] [ 1169: 1170] Signal 1169, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.868027 644066 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.868035 644066 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.868040 644066 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.868060 644066 task_signals.go:204] [ 1169: 1171] Signal 1169, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.868070 644066 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.868076 644066 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.868081 644066 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.868094 644066 task_signals.go:204] [ 1169: 1172] Signal 1169, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.868116 644066 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.868122 644066 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.868150 644066 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.868163 644066 task_signals.go:204] [ 1169: 1173] Signal 1169, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.868172 644066 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.868179 644066 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.868193 644066 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.868213 644066 task_signals.go:204] [ 1169: 1174] Signal 1169, PID: 1174, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.868225 644066 task_exit.go:204] [ 1169: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.869594 644066 task_exit.go:204] [ 1169: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.869640 644066 task_exit.go:204] [ 1169: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.869653 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.869677 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.869683 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.869847 644066 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.870122 644066 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 05:18:06.870182 644066 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 05:18:06.870809 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.872770 644066 syscalls.go:262] [ 1175: 1175] Allocating stack with size of 8388608 bytes D0713 05:18:06.873001 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.874348 644066 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.874458 644066 usertrap_amd64.go:106] [ 1175: 1175] Map a usertrap vma at 64000 D0713 05:18:06.874588 644066 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00040c240 1 D0713 05:18:06.874650 644066 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 05:18:06.875128 644066 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.875159 644066 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00040c240 2 D0713 05:18:06.875176 644066 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 05:18:06.875891 644066 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.875917 644066 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00040c240 3 D0713 05:18:06.875930 644066 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 05:18:06.882680 644066 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.882760 644066 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00040c240 4 D0713 05:18:06.882776 644066 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 05:18:06.884254 644066 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.884282 644066 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00040c240 5 D0713 05:18:06.884296 644066 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 05:18:06.884390 644066 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.884399 644066 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00040c240 6 D0713 05:18:06.884409 644066 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 05:18:06.884891 644066 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.884904 644066 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00040c240 7 D0713 05:18:06.884912 644066 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 05:18:06.885154 644066 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.885223 644066 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc00040c240 8 D0713 05:18:06.885247 644066 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 05:18:06.885498 644066 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.885519 644066 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc00040c240 9 D0713 05:18:06.885527 644066 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 05:18:06.885625 644066 usertrap_amd64.go:212] [ 1175: 1178] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.885635 644066 usertrap_amd64.go:122] [ 1175: 1178] Allocate a new trap: 0xc00040c240 10 D0713 05:18:06.885681 644066 usertrap_amd64.go:225] [ 1175: 1178] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 05:18:06.894562 644066 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.894594 644066 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00040c240 11 D0713 05:18:06.894608 644066 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 05:18:06.897361 644066 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.897389 644066 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc00040c240 12 D0713 05:18:06.897403 644066 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 05:18:06.897463 644066 usertrap_amd64.go:212] [ 1175: 1176] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.897530 644066 usertrap_amd64.go:122] [ 1175: 1176] Allocate a new trap: 0xc00040c240 13 D0713 05:18:06.897551 644066 usertrap_amd64.go:225] [ 1175: 1176] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 05:18:06.897609 644066 task_signals.go:470] [ 1175: 1175] Notified of signal 23 D0713 05:18:06.897684 644066 task_signals.go:220] [ 1175: 1175] Signal 23: delivering to handler D0713 05:18:06.905969 644066 usertrap_amd64.go:212] [ 1175: 1175] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.906012 644066 usertrap_amd64.go:122] [ 1175: 1175] Allocate a new trap: 0xc00040c240 14 D0713 05:18:06.906026 644066 usertrap_amd64.go:225] [ 1175: 1175] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 05:18:06.906093 644066 task_exit.go:204] [ 1175: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.906118 644066 task_exit.go:204] [ 1175: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.906180 644066 task_signals.go:204] [ 1175: 1179] Signal 1175, PID: 1179, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.906204 644066 task_signals.go:204] [ 1175: 1180] Signal 1175, PID: 1180, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.906177 644066 task_signals.go:204] [ 1175: 1178] Signal 1175, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.906217 644066 task_signals.go:204] [ 1175: 1177] Signal 1175, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.906273 644066 task_exit.go:204] [ 1175: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.906301 644066 task_signals.go:204] [ 1175: 1176] Signal 1175, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.906322 644066 task_exit.go:204] [ 1175: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.906329 644066 task_exit.go:204] [ 1175: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.906345 644066 task_exit.go:204] [ 1175: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.906353 644066 task_exit.go:204] [ 1175: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.906398 644066 task_exit.go:204] [ 1175: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.906410 644066 task_exit.go:204] [ 1175: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.906418 644066 task_exit.go:204] [ 1175: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.906424 644066 task_exit.go:204] [ 1175: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.906443 644066 task_exit.go:204] [ 1175: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.906460 644066 task_exit.go:204] [ 1175: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.906466 644066 task_exit.go:204] [ 1175: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.906475 644066 task_exit.go:204] [ 1175: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.907873 644066 task_exit.go:204] [ 1175: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.907905 644066 task_exit.go:204] [ 1175: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.907921 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.907985 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.908001 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.908123 644066 task_exit.go:204] [ 1175: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.908803 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.910598 644066 syscalls.go:262] [ 1181: 1181] Allocating stack with size of 8388608 bytes D0713 05:18:06.910874 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.914618 644066 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.914669 644066 usertrap_amd64.go:106] [ 1181: 1181] Map a usertrap vma at 65000 D0713 05:18:06.914749 644066 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0005ba360 1 D0713 05:18:06.914785 644066 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:06.915190 644066 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.915220 644066 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0005ba360 2 D0713 05:18:06.915233 644066 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:06.915982 644066 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.916081 644066 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0005ba360 3 D0713 05:18:06.916151 644066 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:06.926200 644066 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.926247 644066 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0005ba360 4 D0713 05:18:06.926259 644066 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:06.927599 644066 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.927630 644066 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0005ba360 5 D0713 05:18:06.927644 644066 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:06.927707 644066 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.927723 644066 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0005ba360 6 D0713 05:18:06.927731 644066 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:06.928124 644066 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.928135 644066 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0005ba360 7 D0713 05:18:06.928145 644066 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:06.928341 644066 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.928366 644066 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc0005ba360 8 D0713 05:18:06.928378 644066 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:06.928594 644066 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.928610 644066 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc0005ba360 9 D0713 05:18:06.928620 644066 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:06.928848 644066 usertrap_amd64.go:212] [ 1181: 1184] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.928869 644066 usertrap_amd64.go:122] [ 1181: 1184] Allocate a new trap: 0xc0005ba360 10 D0713 05:18:06.929015 644066 usertrap_amd64.go:225] [ 1181: 1184] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:06.937450 644066 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.937479 644066 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0005ba360 11 D0713 05:18:06.937493 644066 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:06.939932 644066 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.939955 644066 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc0005ba360 12 D0713 05:18:06.939970 644066 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:06.940058 644066 usertrap_amd64.go:212] [ 1181: 1182] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.940095 644066 usertrap_amd64.go:122] [ 1181: 1182] Allocate a new trap: 0xc0005ba360 13 D0713 05:18:06.940106 644066 usertrap_amd64.go:225] [ 1181: 1182] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:06.940160 644066 task_signals.go:470] [ 1181: 1181] Notified of signal 23 D0713 05:18:06.940253 644066 task_signals.go:220] [ 1181: 1181] Signal 23: delivering to handler D0713 05:18:06.948407 644066 usertrap_amd64.go:212] [ 1181: 1181] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.948454 644066 usertrap_amd64.go:122] [ 1181: 1181] Allocate a new trap: 0xc0005ba360 14 D0713 05:18:06.948469 644066 usertrap_amd64.go:225] [ 1181: 1181] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:06.948551 644066 task_exit.go:204] [ 1181: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.948579 644066 task_signals.go:204] [ 1181: 1183] Signal 1181, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.948585 644066 task_signals.go:204] [ 1181: 1182] Signal 1181, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.948601 644066 task_exit.go:204] [ 1181: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.948625 644066 task_signals.go:204] [ 1181: 1185] Signal 1181, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.948644 644066 task_signals.go:204] [ 1181: 1184] Signal 1181, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.948652 644066 task_exit.go:204] [ 1181: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.948664 644066 task_exit.go:204] [ 1181: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.948673 644066 task_exit.go:204] [ 1181: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.948679 644066 task_exit.go:204] [ 1181: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.948693 644066 task_exit.go:204] [ 1181: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.948700 644066 task_exit.go:204] [ 1181: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.948705 644066 task_exit.go:204] [ 1181: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.948715 644066 task_exit.go:204] [ 1181: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.948809 644066 task_exit.go:204] [ 1181: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.948833 644066 task_exit.go:204] [ 1181: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.949992 644066 task_exit.go:204] [ 1181: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.950006 644066 task_exit.go:204] [ 1181: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.950021 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.950067 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.950088 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.950186 644066 task_exit.go:204] [ 1181: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.950793 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.952204 644066 syscalls.go:262] [ 1186: 1186] Allocating stack with size of 8388608 bytes D0713 05:18:06.952284 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.953612 644066 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.953684 644066 usertrap_amd64.go:106] [ 1186: 1186] Map a usertrap vma at 66000 D0713 05:18:06.953885 644066 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc002528210 1 D0713 05:18:06.953916 644066 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 05:18:06.954330 644066 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.954353 644066 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc002528210 2 D0713 05:18:06.954364 644066 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 05:18:06.954963 644066 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.954982 644066 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc002528210 3 D0713 05:18:06.954989 644066 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 05:18:06.960736 644066 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.960768 644066 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc002528210 4 D0713 05:18:06.960779 644066 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 05:18:06.961850 644066 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.961878 644066 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc002528210 5 D0713 05:18:06.961885 644066 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 05:18:06.961932 644066 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.961938 644066 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc002528210 6 D0713 05:18:06.961943 644066 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 05:18:06.962129 644066 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.962138 644066 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc002528210 7 D0713 05:18:06.962144 644066 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 05:18:06.962274 644066 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.962294 644066 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc002528210 8 D0713 05:18:06.962301 644066 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 05:18:06.962459 644066 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.962485 644066 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc002528210 9 D0713 05:18:06.962496 644066 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 05:18:06.962513 644066 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.962519 644066 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc002528210 10 D0713 05:18:06.962576 644066 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 05:18:06.962692 644066 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.962719 644066 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc002528210 11 D0713 05:18:06.962729 644066 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 05:18:06.962781 644066 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.962791 644066 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc002528210 12 D0713 05:18:06.962801 644066 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 05:18:06.962819 644066 task_signals.go:470] [ 1186: 1189] Notified of signal 23 D0713 05:18:06.962863 644066 task_signals.go:220] [ 1186: 1189] Signal 23: delivering to handler D0713 05:18:06.963215 644066 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0713 05:18:06.963285 644066 task_signals.go:220] [ 1186: 1186] Signal 23: delivering to handler D0713 05:18:06.970264 644066 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46af29:sysno 293 D0713 05:18:06.970298 644066 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc002528210 13 D0713 05:18:06.970311 644066 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 05:18:06.974179 644066 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0713 05:18:06.974241 644066 task_signals.go:220] [ 1186: 1186] Signal 23: delivering to handler D0713 05:18:06.981939 644066 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:06.981988 644066 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc002528210 14 D0713 05:18:06.982004 644066 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 05:18:06.982079 644066 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.982122 644066 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.982124 644066 task_signals.go:204] [ 1186: 1188] Signal 1186, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.982150 644066 task_signals.go:204] [ 1186: 1190] Signal 1186, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.982160 644066 task_signals.go:204] [ 1186: 1187] Signal 1186, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.982170 644066 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.982214 644066 task_signals.go:204] [ 1186: 1189] Signal 1186, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:06.982228 644066 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.982237 644066 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.982252 644066 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.982260 644066 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.982277 644066 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.982287 644066 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.982294 644066 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.982309 644066 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.982329 644066 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:06.983726 644066 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:06.983775 644066 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.983801 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:06.983850 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:06.983873 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:06.983995 644066 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:06.984723 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.986356 644066 syscalls.go:262] [ 1191: 1191] Allocating stack with size of 8388608 bytes D0713 05:18:06.986485 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:06.987837 644066 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:06.987952 644066 usertrap_amd64.go:106] [ 1191: 1191] Map a usertrap vma at 60000 D0713 05:18:06.988088 644066 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000d64420 1 D0713 05:18:06.988125 644066 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 05:18:06.988739 644066 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:06.988764 644066 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000d64420 2 D0713 05:18:06.988776 644066 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 05:18:06.989572 644066 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:06.989609 644066 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000d64420 3 D0713 05:18:06.989627 644066 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 05:18:06.996291 644066 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:06.996328 644066 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000d64420 4 D0713 05:18:06.996347 644066 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 05:18:06.997883 644066 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:06.997930 644066 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000d64420 5 D0713 05:18:06.997950 644066 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 05:18:06.998072 644066 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b214:sysno 13 D0713 05:18:06.998093 644066 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000d64420 6 D0713 05:18:06.998104 644066 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 05:18:06.998524 644066 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:06.998544 644066 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000d64420 7 D0713 05:18:06.998550 644066 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 05:18:06.998845 644066 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:06.998886 644066 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000d64420 8 D0713 05:18:06.998906 644066 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 05:18:06.999171 644066 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46af76:sysno 35 D0713 05:18:06.999207 644066 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000d64420 9 D0713 05:18:06.999221 644066 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 05:18:06.999277 644066 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:06.999288 644066 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000d64420 10 D0713 05:18:06.999334 644066 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 05:18:06.999766 644066 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b020:sysno 39 D0713 05:18:06.999797 644066 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000d64420 11 D0713 05:18:06.999808 644066 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 05:18:06.999955 644066 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:06.999980 644066 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000d64420 12 D0713 05:18:06.999991 644066 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 05:18:07.000084 644066 task_signals.go:470] [ 1191: 1194] Notified of signal 23 D0713 05:18:07.000131 644066 task_signals.go:179] [ 1191: 1194] Restarting syscall 202: interrupted by signal 23 D0713 05:18:07.000170 644066 task_signals.go:220] [ 1191: 1194] Signal 23: delivering to handler D0713 05:18:07.008003 644066 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46af29:sysno 293 D0713 05:18:07.008025 644066 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000d64420 13 D0713 05:18:07.008036 644066 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 05:18:07.010573 644066 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 05:18:07.010629 644066 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 05:18:07.020784 644066 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:07.020844 644066 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000d64420 14 D0713 05:18:07.020862 644066 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 05:18:07.021080 644066 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.021131 644066 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.021162 644066 task_signals.go:204] [ 1191: 1193] Signal 1191, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.021181 644066 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.021189 644066 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.021161 644066 task_signals.go:204] [ 1191: 1195] Signal 1191, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.021194 644066 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.021232 644066 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.021234 644066 task_signals.go:204] [ 1191: 1192] Signal 1191, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.021258 644066 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.021274 644066 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.021303 644066 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.021323 644066 task_signals.go:204] [ 1191: 1194] Signal 1191, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.021348 644066 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.021354 644066 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.021368 644066 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.024592 644066 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.024625 644066 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.024641 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:07.024674 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:07.024685 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:07.025027 644066 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.025903 644066 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:07.027715 644066 syscalls.go:262] [ 1196: 1196] Allocating stack with size of 8388608 bytes D0713 05:18:07.027809 644066 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:07.030999 644066 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:07.031040 644066 usertrap_amd64.go:106] [ 1196: 1196] Map a usertrap vma at 65000 D0713 05:18:07.031164 644066 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000d64570 1 D0713 05:18:07.031215 644066 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 05:18:07.031555 644066 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:07.031586 644066 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000d64570 2 D0713 05:18:07.031601 644066 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 05:18:07.032458 644066 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:07.032498 644066 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000d64570 3 D0713 05:18:07.032511 644066 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 05:18:07.040675 644066 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:07.040710 644066 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000d64570 4 D0713 05:18:07.040723 644066 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 05:18:07.042279 644066 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:07.042357 644066 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000d64570 5 D0713 05:18:07.042380 644066 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 05:18:07.042457 644066 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b214:sysno 13 D0713 05:18:07.042484 644066 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000d64570 6 D0713 05:18:07.042493 644066 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 05:18:07.043076 644066 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:07.043105 644066 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000d64570 7 D0713 05:18:07.043115 644066 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 05:18:07.043340 644066 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:07.043376 644066 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000d64570 8 D0713 05:18:07.043395 644066 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 05:18:07.043629 644066 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:07.043650 644066 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000d64570 9 D0713 05:18:07.043663 644066 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 05:18:07.044151 644066 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46af76:sysno 35 D0713 05:18:07.044179 644066 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000d64570 10 D0713 05:18:07.044201 644066 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 05:18:07.052013 644066 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46af29:sysno 293 D0713 05:18:07.052045 644066 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000d64570 11 D0713 05:18:07.052059 644066 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 05:18:07.054612 644066 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b020:sysno 39 D0713 05:18:07.054643 644066 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000d64570 12 D0713 05:18:07.054667 644066 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 05:18:07.054746 644066 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:07.054801 644066 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000d64570 13 D0713 05:18:07.054818 644066 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 05:18:07.054875 644066 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 05:18:07.055048 644066 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 05:18:07.063308 644066 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:07.063369 644066 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000d64570 14 D0713 05:18:07.063387 644066 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 05:18:07.063463 644066 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.063508 644066 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.063547 644066 task_signals.go:204] [ 1196: 1197] Signal 1196, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.063565 644066 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.063572 644066 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.063577 644066 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.063604 644066 task_signals.go:204] [ 1196: 1198] Signal 1196, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.063612 644066 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.063619 644066 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.063624 644066 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.063645 644066 task_signals.go:204] [ 1196: 1199] Signal 1196, PID: 1199, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.063654 644066 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.063661 644066 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.063695 644066 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.063711 644066 task_signals.go:204] [ 1196: 1200] Signal 1196, PID: 1200, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.063729 644066 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.065105 644066 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.065159 644066 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.065174 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:07.065204 644066 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 05:18:07.065214 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:07.065356 644066 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.066368 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:07.068274 644066 syscalls.go:262] [ 1201: 1201] Allocating stack with size of 8388608 bytes D0713 05:18:07.068385 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:07.069612 644066 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:07.069660 644066 usertrap_amd64.go:106] [ 1201: 1201] Map a usertrap vma at 69000 D0713 05:18:07.069785 644066 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0025284b0 1 D0713 05:18:07.069820 644066 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 05:18:07.070219 644066 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:07.070243 644066 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0025284b0 2 D0713 05:18:07.070251 644066 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 05:18:07.070835 644066 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:07.070857 644066 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0025284b0 3 D0713 05:18:07.070863 644066 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 05:18:07.077725 644066 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:07.077799 644066 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0025284b0 4 D0713 05:18:07.077816 644066 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 05:18:07.078899 644066 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:07.078944 644066 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0025284b0 5 D0713 05:18:07.078958 644066 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 05:18:07.079023 644066 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b214:sysno 13 D0713 05:18:07.079029 644066 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0025284b0 6 D0713 05:18:07.079036 644066 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 05:18:07.079380 644066 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:07.079397 644066 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0025284b0 7 D0713 05:18:07.079403 644066 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 05:18:07.079744 644066 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:07.079890 644066 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0025284b0 8 D0713 05:18:07.079956 644066 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 05:18:07.080078 644066 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:07.080306 644066 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0025284b0 9 D0713 05:18:07.080322 644066 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 05:18:07.080354 644066 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46af76:sysno 35 D0713 05:18:07.080362 644066 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0025284b0 10 D0713 05:18:07.080376 644066 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 05:18:07.088312 644066 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46af29:sysno 293 D0713 05:18:07.088343 644066 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0025284b0 11 D0713 05:18:07.088356 644066 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 05:18:07.091019 644066 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b020:sysno 39 D0713 05:18:07.091071 644066 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0025284b0 12 D0713 05:18:07.091089 644066 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 05:18:07.091240 644066 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:07.091270 644066 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0025284b0 13 D0713 05:18:07.091293 644066 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 05:18:07.091339 644066 task_signals.go:470] [ 1201: 1201] Notified of signal 23 D0713 05:18:07.091429 644066 task_signals.go:220] [ 1201: 1201] Signal 23: delivering to handler D0713 05:18:07.100630 644066 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46ae44:sysno 231 D0713 05:18:07.100698 644066 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0025284b0 14 D0713 05:18:07.100727 644066 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 05:18:07.100798 644066 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.100842 644066 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.100883 644066 task_signals.go:204] [ 1201: 1202] Signal 1201, PID: 1202, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.100893 644066 task_signals.go:204] [ 1201: 1204] Signal 1201, PID: 1204, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.100909 644066 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.100917 644066 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.100922 644066 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.100951 644066 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.100966 644066 task_signals.go:204] [ 1201: 1205] Signal 1201, PID: 1205, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.100977 644066 task_signals.go:204] [ 1201: 1203] Signal 1201, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0713 05:18:07.100988 644066 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.100994 644066 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.101014 644066 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.101029 644066 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.101034 644066 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.101042 644066 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 05:18:07.102380 644066 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 05:18:07.102469 644066 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.102539 644066 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 05:18:07.102574 644066 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 05:18:07.102586 644066 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 05:18:07.102651 644066 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 05:18:07.103676 644066 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 05:18:07.105365 644066 syscalls.go:262] [ 1206: 1206] Allocating stack with size of 8388608 bytes D0713 05:18:07.105496 644066 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 05:18:07.106499 644066 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b70f:sysno 204 D0713 05:18:07.106520 644066 usertrap_amd64.go:106] [ 1206: 1206] Map a usertrap vma at 62000 D0713 05:18:07.106618 644066 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0001e2b40 1 D0713 05:18:07.106641 644066 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 05:18:07.107081 644066 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46ae93:sysno 257 D0713 05:18:07.107108 644066 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0001e2b40 2 D0713 05:18:07.107118 644066 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 05:18:07.107776 644066 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b41d:sysno 9 D0713 05:18:07.107805 644066 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0001e2b40 3 D0713 05:18:07.107819 644066 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 05:18:07.113981 644066 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b1d3:sysno 14 D0713 05:18:07.114008 644066 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0001e2b40 4 D0713 05:18:07.114017 644066 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 05:18:07.115194 644066 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46afa0:sysno 186 D0713 05:18:07.115215 644066 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0001e2b40 5 D0713 05:18:07.115224 644066 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 05:18:07.115267 644066 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b214:sysno 13 D0713 05:18:07.115279 644066 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0001e2b40 6 D0713 05:18:07.115284 644066 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 05:18:07.115421 644066 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b5eb:sysno 56 D0713 05:18:07.115434 644066 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0001e2b40 7 D0713 05:18:07.115439 644066 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 05:18:07.115663 644066 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b60c:sysno 186 D0713 05:18:07.115728 644066 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0001e2b40 8 D0713 05:18:07.115751 644066 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 05:18:07.115975 644066 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b57c:sysno 202 D0713 05:18:07.115997 644066 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0001e2b40 9 D0713 05:18:07.116018 644066 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 05:18:07.116097 644066 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46af76:sysno 35 D0713 05:18:07.116137 644066 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0001e2b40 10 D0713 05:18:07.116153 644066 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 05:18:07.123439 644066 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46af29:sysno 293 D0713 05:18:07.123473 644066 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0001e2b40 11 D0713 05:18:07.123486 644066 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 05:18:07.126490 644066 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b020:sysno 39 D0713 05:18:07.126513 644066 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0001e2b40 12 D0713 05:18:07.126523 644066 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 05:18:07.126589 644066 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b04f:sysno 234 D0713 05:18:07.126615 644066 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0001e2b40 13 D0713 05:18:07.126630 644066 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 05:18:07.126680 644066 task_signals.go:470] [ 1206: 1206] Notified of signal 23 D0713 05:18:07.126770 644066 task_signals.go:220] [ 1206: 1206] Signal 23: delivering to handler D0713 05:18:07.133302 644066 task_signals.go:309] [ 1206: 1206] failed to restore from a signal frame: bad address D0713 05:18:07.133344 644066 task_signals.go:470] [ 1206: 1206] Notified of signal 11 D0713 05:18:07.133357 644066 task_signals.go:220] [ 1206: 1206] Signal 11: delivering to handler W0713 05:18:07.189876 644184 util.go:64] FATAL ERROR: waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-test-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-test-0": urpc method "containerManager.WaitPID" failed: EOF W0713 05:18:07.190010 644184 main.go:274] Failure to execute command, err: 1 D0713 05:18:07.200738 1 connection.go:127] sock read failed, closing connection: EOF I0713 05:18:07.200892 1 gofer.go:319] All lisafs servers exited. I0713 05:18:07.200918 1 main.go:265] Exiting with status: 0 W0713 05:18:07.201963 644039 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-test-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0713 05:18:07.217258 644039 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-test-0 D0713 05:18:07.217373 644039 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-test-0 D0713 05:18:07.217395 644039 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-test-0 D0713 05:18:07.217407 644039 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-test-0" D0713 05:18:07.217518 644039 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-test-0, PID: 644056 D0713 05:18:07.232613 644039 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-test-0" D0713 05:18:07.232702 644039 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-test-0" D0713 05:18:07.232800 644039 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-test-0" D0713 05:18:07.232854 644039 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-test-0" D0713 05:18:07.232911 644039 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-test-0" D0713 05:18:07.233031 644039 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-test-0" D0713 05:18:07.233140 644039 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-test-0" D0713 05:18:07.233171 644039 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-test-0" D0713 05:18:07.233185 644039 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-test-0" D0713 05:18:07.233198 644039 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-test-0" D0713 05:18:07.233209 644039 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-test-0" D0713 05:18:07.233223 644039 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-test-0" D0713 05:18:07.233231 644039 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-test-0" D0713 05:18:07.233247 644039 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-test-0" I0713 05:18:07.322189 644039 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0713 05:18:07.256823 644532 main.go:230] *************************** I0713 05:18:07.256891 644532 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-0] I0713 05:18:07.256922 644532 main.go:232] Version 0.0.0 I0713 05:18:07.256978 644532 main.go:233] GOOS: linux I0713 05:18:07.256996 644532 main.go:234] GOARCH: amd64 I0713 05:18:07.257014 644532 main.go:235] PID: 644532 I0713 05:18:07.257056 644532 main.go:236] UID: 0, GID: 0 I0713 05:18:07.257075 644532 main.go:237] Configuration: I0713 05:18:07.257102 644532 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0713 05:18:07.257121 644532 main.go:239] Platform: systrap I0713 05:18:07.257151 644532 main.go:240] FileAccess: shared I0713 05:18:07.257200 644532 main.go:241] Directfs: true I0713 05:18:07.257222 644532 main.go:242] Overlay: none I0713 05:18:07.257255 644532 main.go:243] Network: sandbox, logging: false I0713 05:18:07.257291 644532 main.go:244] Strace: false, max size: 1024, syscalls: I0713 05:18:07.257318 644532 main.go:245] IOURING: false I0713 05:18:07.257345 644532 main.go:246] Debug: true I0713 05:18:07.257372 644532 main.go:247] Systemd: false I0713 05:18:07.257402 644532 main.go:248] *************************** D0713 05:18:07.257467 644532 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 05:18:07.322321 644532 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-0": open /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root/ci-gvisor-systrap-1-test-0_sandbox:ci-gvisor-systrap-1-test-0.state: no such file or directory loading container "ci-gvisor-systrap-1-test-0": open /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root/ci-gvisor-systrap-1-test-0_sandbox:ci-gvisor-systrap-1-test-0.state: no such file or directory W0713 05:18:07.322515 644532 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-test-0"]: exit status 128 I0713 05:18:07.256823 644532 main.go:230] *************************** I0713 05:18:07.256891 644532 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-test-0] I0713 05:18:07.256922 644532 main.go:232] Version 0.0.0 I0713 05:18:07.256978 644532 main.go:233] GOOS: linux I0713 05:18:07.256996 644532 main.go:234] GOARCH: amd64 I0713 05:18:07.257014 644532 main.go:235] PID: 644532 I0713 05:18:07.257056 644532 main.go:236] UID: 0, GID: 0 I0713 05:18:07.257075 644532 main.go:237] Configuration: I0713 05:18:07.257102 644532 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root I0713 05:18:07.257121 644532 main.go:239] Platform: systrap I0713 05:18:07.257151 644532 main.go:240] FileAccess: shared I0713 05:18:07.257200 644532 main.go:241] Directfs: true I0713 05:18:07.257222 644532 main.go:242] Overlay: none I0713 05:18:07.257255 644532 main.go:243] Network: sandbox, logging: false I0713 05:18:07.257291 644532 main.go:244] Strace: false, max size: 1024, syscalls: I0713 05:18:07.257318 644532 main.go:245] IOURING: false I0713 05:18:07.257345 644532 main.go:246] Debug: true I0713 05:18:07.257372 644532 main.go:247] Systemd: false I0713 05:18:07.257402 644532 main.go:248] *************************** D0713 05:18:07.257467 644532 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 05:18:07.322321 644532 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-test-0": open /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root/ci-gvisor-systrap-1-test-0_sandbox:ci-gvisor-systrap-1-test-0.state: no such file or directory loading container "ci-gvisor-systrap-1-test-0": open /syzkaller/managers/ci-gvisor-systrap-1/latest.tmp/workdir/gvisor_root/ci-gvisor-systrap-1-test-0_sandbox:ci-gvisor-systrap-1-test-0.state: no such file or directory W0713 05:18:07.322515 644532 main.go:274] Failure to execute command, err: 1 [11548270.454118] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.496501] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.637682] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.680537] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.717881] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.175744] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.244740] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.289491] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.347827] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.386962] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.432610] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.452510] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.472049] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.493392] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.514001] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.534326] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.555439] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.575831] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.591661] warn_bad_vsyscall: 28 callbacks suppressed [11548299.591664] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.716645] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.218082] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.333278] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.369844] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602597.777330] audit: type=1326 audit(1689206344.991:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602603.869164] audit: type=1326 audit(1689206351.083:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754999 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.285215] audit: type=1326 audit(1689206425.499:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=755000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.677713] audit: type=1326 audit(1689206425.891:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602696.843980] audit: type=1326 audit(1689206444.055:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=753602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602743.097537] audit: type=1326 audit(1689206490.311:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602743.122326] audit: type=1326 audit(1689206490.311:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602759.499374] audit: type=1326 audit(1689206506.710:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602854.344933] audit: type=1326 audit(1689206601.558:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602859.040813] audit: type=1326 audit(1689206606.254:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765875 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602884.867590] audit: type=1326 audit(1689206632.078:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=767807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602895.802192] audit: type=1326 audit(1689206643.014:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=750390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602921.417882] audit: type=1326 audit(1689206668.630:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602934.284216] audit: type=1326 audit(1689206681.494:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=763696 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602998.074154] audit: type=1326 audit(1689206745.286:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=771543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603001.490232] audit: type=1326 audit(1689206748.702:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772848 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603019.886473] exe[728911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603019.961263] exe[723449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.012456] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.033883] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.390766] audit: type=1326 audit(1689206767.602:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603082.847524] audit: type=1326 audit(1689206830.058:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=775665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603138.090907] audit: type=1326 audit(1689206885.302:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603172.298141] audit: type=1326 audit(1689206919.510:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777217 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603182.461434] audit: type=1326 audit(1689206929.674:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780255 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603243.896847] audit: type=1326 audit(1689206991.106:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603279.127507] audit: type=1326 audit(1689207026.338:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=787634 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603309.589653] audit: type=1326 audit(1689207056.802:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603335.471219] audit: type=1326 audit(1689207082.682:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=788938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603343.797267] audit: type=1326 audit(1689207091.010:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=790140 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603405.836680] audit: type=1326 audit(1689207153.046:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792319 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603420.441739] audit: type=1326 audit(1689207167.654:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603427.753376] audit: type=1326 audit(1689207174.966:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774364 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603505.176389] audit: type=1326 audit(1689207252.385:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796183 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603533.829677] audit: type=1326 audit(1689207281.041:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=797063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603562.278422] audit: type=1326 audit(1689207309.489:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603667.052521] audit: type=1326 audit(1689207414.261:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=805774 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603667.905373] audit: type=1326 audit(1689207415.113:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=807621 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603676.505802] audit: type=1326 audit(1689207423.717:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=806198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603684.820900] audit: type=1326 audit(1689207432.029:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=793728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603795.965747] audit: type=1326 audit(1689207543.177:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=812556 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603804.637990] audit: type=1326 audit(1689207551.849:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603810.551130] audit: type=1326 audit(1689207557.761:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603820.309874] audit: type=1326 audit(1689207567.521:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=811185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603836.504336] audit: type=1326 audit(1689207583.713:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=800972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603841.793876] audit: type=1326 audit(1689207589.005:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603870.199020] audit: type=1326 audit(1689207617.409:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603951.796356] audit: type=1326 audit(1689207699.005:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=816857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603957.195581] audit: type=1326 audit(1689207704.405:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817252 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603991.129069] audit: type=1326 audit(1689207738.337:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=819555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604091.585729] audit: type=1326 audit(1689207838.793:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604093.722432] audit: type=1326 audit(1689207840.933:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604119.143756] audit: type=1326 audit(1689207866.353:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=822836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604204.469045] audit: type=1326 audit(1689207951.676:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604217.655924] audit: type=1326 audit(1689207964.864:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=818547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604224.651590] audit: type=1326 audit(1689207971.860:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604234.352201] audit: type=1326 audit(1689207981.564:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604235.997704] audit: type=1326 audit(1689207983.208:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604256.614441] audit: type=1326 audit(1689208003.828:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604263.313503] audit: type=1326 audit(1689208010.524:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=828626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604308.646673] audit: type=1326 audit(1689208055.860:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831393 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604427.403379] audit: type=1326 audit(1689208174.616:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=833669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604450.026228] audit: type=1326 audit(1689208197.240:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=834371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604459.830108] audit: type=1326 audit(1689208207.040:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604476.678391] audit: type=1326 audit(1689208223.892:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829944 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604506.595388] audit: type=1326 audit(1689208253.808:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=836737 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604536.910472] audit: type=1326 audit(1689208284.124:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824480 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604588.801578] audit: type=1326 audit(1689208336.012:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604590.878115] audit: type=1326 audit(1689208338.088:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604613.330191] audit: type=1326 audit(1689208360.540:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=849945 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604648.014559] audit: type=1326 audit(1689208395.228:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=844081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604655.910760] audit: type=1326 audit(1689208403.124:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604731.191216] audit: type=1326 audit(1689208478.404:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=841978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604750.453981] audit: type=1326 audit(1689208497.664:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850369 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604790.297089] audit: type=1326 audit(1689208537.508:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=851838 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604911.917454] audit: type=1326 audit(1689208659.128:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=855574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604932.248331] audit: type=1326 audit(1689208679.459:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=856349 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604979.039220] audit: type=1326 audit(1689208726.251:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=854027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605001.217428] audit: type=1326 audit(1689208748.427:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605004.825105] audit: type=1326 audit(1689208752.035:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605073.388168] audit: type=1326 audit(1689208820.599:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605073.905125] audit: type=1326 audit(1689208821.115:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861403 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605096.082181] audit: type=1326 audit(1689208843.291:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605129.878423] audit: type=1326 audit(1689208877.087:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=866278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605177.031421] audit: type=1326 audit(1689208924.243:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865008 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605235.963087] exe[867632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bc192d40a cs:33 sp:7f06f0682ee8 ax:12 si:ffffffffff600000 di:559bc1999ff2 [11605242.250840] audit: type=1326 audit(1689208989.459:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605259.396277] exe[729169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.444946] exe[734784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.493436] exe[735065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605345.057961] audit: type=1326 audit(1689209092.267:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=867457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605366.290442] audit: type=1326 audit(1689209113.499:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=872748 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605379.568477] audit: type=1326 audit(1689209126.779:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=868919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605400.381802] audit: type=1326 audit(1689209147.591:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873868 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605499.168636] audit: type=1326 audit(1689209246.379:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873036 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605641.112938] audit: type=1326 audit(1689209388.322:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=878736 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605650.594619] audit: type=1326 audit(1689209397.802:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879055 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605769.011148] audit: type=1326 audit(1689209516.218:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897739 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605783.192934] audit: type=1326 audit(1689209530.402:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=888577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605785.006125] audit: type=1326 audit(1689209532.214:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=874679 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605792.566409] audit: type=1326 audit(1689209539.774:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=899333 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605803.584285] audit: type=1326 audit(1689209550.794:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=889127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605917.107175] audit: type=1326 audit(1689209664.314:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=900168 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605999.175587] audit: type=1326 audit(1689209746.386:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=903724 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606057.989861] audit: type=1326 audit(1689209805.198:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=908771 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606081.023977] audit: type=1326 audit(1689209828.234:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901681 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606081.049199] audit: type=1326 audit(1689209828.234:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606140.480349] audit: type=1326 audit(1689209887.690:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606161.551475] audit: type=1326 audit(1689209908.758:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606199.187532] audit: type=1326 audit(1689209946.394:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=916010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606218.913397] audit: type=1326 audit(1689209966.122:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922661 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606232.077547] audit: type=1326 audit(1689209979.282:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=923826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606380.343966] audit: type=1326 audit(1689210127.553:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606411.655428] audit: type=1326 audit(1689210158.861:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927181 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606523.891076] audit: type=1326 audit(1689210271.097:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606544.833841] audit: type=1326 audit(1689210292.041:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932874 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606553.082384] audit: type=1326 audit(1689210300.289:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=934463 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606576.113741] audit: type=1326 audit(1689210323.321:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=939578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606603.669625] audit: type=1326 audit(1689210350.877:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918032 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606666.104511] audit: type=1326 audit(1689210413.313:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=938428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606700.273078] audit: type=1326 audit(1689210447.481:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606722.409710] audit: type=1326 audit(1689210469.617:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=944587 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606723.591484] audit: type=1326 audit(1689210470.797:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918004 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606726.625428] audit: type=1326 audit(1689210473.833:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=925543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606749.842751] audit: type=1326 audit(1689210497.049:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=945425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606774.216268] audit: type=1326 audit(1689210521.421:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606775.272993] audit: type=1326 audit(1689210522.481:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946844 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606808.022043] audit: type=1326 audit(1689210555.229:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=942712 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606825.235825] audit: type=1326 audit(1689210572.441:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=943616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606903.854733] audit: type=1326 audit(1689210651.061:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=951196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606950.408866] audit: type=1326 audit(1689210697.617:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607046.030686] audit: type=1326 audit(1689210793.237:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=955433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607082.153088] audit: type=1326 audit(1689210829.361:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=963715 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607091.177801] audit: type=1326 audit(1689210838.384:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607204.949220] audit: type=1326 audit(1689210952.160:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961511 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607214.149455] audit: type=1326 audit(1689210961.360:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607234.203101] audit: type=1326 audit(1689210981.412:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=965279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607246.591122] audit: type=1326 audit(1689210993.800:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607346.908337] audit: type=1326 audit(1689211094.116:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607347.810535] audit: type=1326 audit(1689211095.020:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=976275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607373.022204] audit: type=1326 audit(1689211120.232:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607377.243731] audit: type=1326 audit(1689211124.452:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969402 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607487.048913] audit: type=1326 audit(1689211234.256:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946299 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607489.734138] audit: type=1326 audit(1689211236.944:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977298 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607499.561410] audit: type=1326 audit(1689211246.772:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607519.191537] audit: type=1326 audit(1689211266.400:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607624.457049] audit: type=1326 audit(1689211371.664:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=985128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607631.705291] audit: type=1326 audit(1689211378.916:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=983126 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607638.204050] audit: type=1326 audit(1689211385.412:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979517 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607751.083724] audit: type=1326 audit(1689211498.292:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=989206 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607766.193883] audit: type=1326 audit(1689211513.404:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988722 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607770.820805] audit: type=1326 audit(1689211518.028:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=972203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607889.548013] audit: type=1326 audit(1689211636.755:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=995356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607890.272191] audit: type=1326 audit(1689211637.479:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984084 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607892.217788] audit: type=1326 audit(1689211639.427:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=994449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607973.414133] audit: type=1326 audit(1689211720.623:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607997.840992] audit: type=1326 audit(1689211745.047:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608009.823096] exe[880088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.862814] exe[908958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.905875] exe[880060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7a7858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608031.274871] audit: type=1326 audit(1689211778.483:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998191 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608034.038701] audit: type=1326 audit(1689211781.247:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998422 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608075.873755] audit: type=1326 audit(1689211823.083:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992937 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608174.269361] audit: type=1326 audit(1689211921.475:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608175.997697] audit: type=1326 audit(1689211923.203:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608317.934996] audit: type=1326 audit(1689212065.143:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16671 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608318.010584] audit: type=1326 audit(1689212065.219:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16326 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608345.573784] audit: type=1326 audit(1689212092.779:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11133 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608451.296340] audit: type=1326 audit(1689212198.503:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29829 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608460.035472] audit: type=1326 audit(1689212207.243:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608462.176738] audit: type=1326 audit(1689212209.383:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25141 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608503.267767] audit: type=1326 audit(1689212250.475:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=34498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608533.390892] audit: type=1326 audit(1689212280.598:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999989 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608586.343765] audit: type=1326 audit(1689212333.550:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11132 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608603.172815] audit: type=1326 audit(1689212350.378:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608604.375648] audit: type=1326 audit(1689212351.582:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608625.227797] audit: type=1326 audit(1689212372.434:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608653.653041] audit: type=1326 audit(1689212400.858:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996310 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608746.810007] audit: type=1326 audit(1689212494.014:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608759.068622] audit: type=1326 audit(1689212506.274:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608844.060417] audit: type=1326 audit(1689212591.266:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47509 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608849.979155] audit: type=1326 audit(1689212597.186:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26927 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608866.192620] audit: type=1326 audit(1689212613.398:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50432 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608900.419588] audit: type=1326 audit(1689212647.626:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=48313 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609041.941064] audit: type=1326 audit(1689212789.146:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609043.267962] audit: type=1326 audit(1689212790.474:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=51808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609101.039399] exe[19846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.200826] exe[42029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.233088] exe[21925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.359654] exe[14202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609114.859756] audit: type=1326 audit(1689212862.066:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=53392 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609136.468568] audit: type=1326 audit(1689212883.674:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=63106 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609184.539557] audit: type=1326 audit(1689212931.746:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55835 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609224.389789] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.508861] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.664605] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.692561] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.721718] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.758715] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.820055] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.852642] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.874621] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.926286] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609296.412170] audit: type=1326 audit(1689213043.617:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=38807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609346.942415] audit: type=1326 audit(1689213094.145:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=67199 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609386.199827] audit: type=1326 audit(1689213133.405:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=70379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609407.497500] audit: type=1326 audit(1689213154.701:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=80674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609489.512442] audit: type=1326 audit(1689213236.717:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=78397 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609536.734812] audit: type=1326 audit(1689213283.937:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=44670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609540.467947] audit: type=1326 audit(1689213287.673:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609578.029249] audit: type=1326 audit(1689213325.233:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609580.700973] audit: type=1326 audit(1689213327.905:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609630.673391] audit: type=1326 audit(1689213377.877:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609672.894466] audit: type=1326 audit(1689213420.097:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609673.764769] audit: type=1326 audit(1689213420.969:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56076 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609682.185992] audit: type=1326 audit(1689213429.389:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=93458 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609689.245620] audit: type=1326 audit(1689213436.449:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=39787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609704.620136] audit: type=1326 audit(1689213451.825:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103151 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609718.303851] audit: type=1326 audit(1689213465.509:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609732.024113] audit: type=1326 audit(1689213479.229:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609746.654594] audit: type=1326 audit(1689213493.857:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=99508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609891.802556] audit: type=1326 audit(1689213639.005:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=107746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609980.959613] audit: type=1326 audit(1689213728.164:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=111400 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610037.921958] warn_bad_vsyscall: 57 callbacks suppressed [11610037.921961] exe[104886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cf1f3e40a cs:33 sp:7f9740193ee8 ax:12 si:ffffffffff600000 di:557cf1faaff2 [11610091.078793] audit: type=1326 audit(1689213838.284:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=114972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610124.942162] audit: type=1326 audit(1689213872.148:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610177.285395] audit: type=1326 audit(1689213924.492:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102441 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610193.441605] audit: type=1326 audit(1689213940.648:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610225.810101] audit: type=1326 audit(1689213973.016:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610233.553409] audit: type=1326 audit(1689213980.760:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=121916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610256.024194] audit: type=1326 audit(1689214003.232:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610300.269297] audit: type=1326 audit(1689214047.476:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610367.800104] audit: type=1326 audit(1689214115.008:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128262 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610392.269170] audit: type=1326 audit(1689214139.476:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=129506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610463.704357] audit: type=1326 audit(1689214210.912:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610509.525530] audit: type=1326 audit(1689214256.732:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=133363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610534.233051] audit: type=1326 audit(1689214281.440:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=134147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610535.552490] audit: type=1326 audit(1689214282.760:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102360 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610558.818901] audit: type=1326 audit(1689214306.024:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138968 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610563.001154] audit: type=1326 audit(1689214310.208:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125930 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610652.067752] audit: type=1326 audit(1689214399.272:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610675.976391] audit: type=1326 audit(1689214423.180:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138768 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610794.201252] audit: type=1326 audit(1689214541.407:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146110 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610817.416788] audit: type=1326 audit(1689214564.623:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=147787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610824.164743] audit: type=1326 audit(1689214571.371:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610917.045624] audit: type=1326 audit(1689214664.247:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=155879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610935.100843] audit: type=1326 audit(1689214682.307:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=154665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610957.386648] audit: type=1326 audit(1689214704.591:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=160285 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611044.973755] audit: type=1326 audit(1689214792.179:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104427 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611052.355082] exe[161359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.396817] exe[161402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.417215] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.458817] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9dd858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611057.686547] audit: type=1326 audit(1689214804.891:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159476 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611080.561894] audit: type=1326 audit(1689214827.767:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611091.751769] audit: type=1326 audit(1689214838.955:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=163210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611106.510657] audit: type=1326 audit(1689214853.715:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164175 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611206.621679] audit: type=1326 audit(1689214953.827:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162899 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611226.105804] audit: type=1326 audit(1689214973.311:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=157532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611328.860902] audit: type=1326 audit(1689215076.067:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=136219 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611349.685728] audit: type=1326 audit(1689215096.891:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166089 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611355.989960] audit: type=1326 audit(1689215103.195:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611470.897001] exe[173131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611470.982692] exe[172685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611471.068495] exe[172788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611491.624312] audit: type=1326 audit(1689215238.826:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611498.281194] audit: type=1326 audit(1689215245.486:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171656 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611545.887586] audit: type=1326 audit(1689215293.090:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611556.965422] audit: type=1326 audit(1689215304.170:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611636.098091] audit: type=1326 audit(1689215383.302:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611641.171130] audit: type=1326 audit(1689215388.374:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176464 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611712.598686] audit: type=1326 audit(1689215459.802:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611779.405216] audit: type=1326 audit(1689215526.606:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=183629 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611784.275845] audit: type=1326 audit(1689215531.478:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611807.175705] audit: type=1326 audit(1689215554.378:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=139924 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611845.278909] exe[175719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.131823] exe[175495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.132343] exe[62220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.255247] exe[192224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611865.951902] exe[193267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96258cee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.843870] exe[194427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.849440] exe[193278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.684536] exe[193231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.685047] exe[193276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611923.773068] audit: type=1326 audit(1689215670.974:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611927.131634] audit: type=1326 audit(1689215674.334:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192265 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611946.855512] audit: type=1326 audit(1689215694.058:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612069.445142] audit: type=1326 audit(1689215816.646:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199539 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612092.184084] audit: type=1326 audit(1689215839.386:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205940 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612109.628298] audit: type=1326 audit(1689215856.830:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=167586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612169.655524] audit: type=1326 audit(1689215916.857:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=179867 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612196.158283] audit: type=1326 audit(1689215943.361:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612321.757529] audit: type=1326 audit(1689216068.961:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612338.198911] audit: type=1326 audit(1689216085.401:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210033 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612341.930437] audit: type=1326 audit(1689216089.133:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612480.723412] audit: type=1326 audit(1689216227.925:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612484.182272] audit: type=1326 audit(1689216231.385:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215515 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612623.704171] audit: type=1326 audit(1689216370.905:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612627.491761] audit: type=1326 audit(1689216374.693:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219947 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612650.811661] audit: type=1326 audit(1689216398.017:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612725.881937] audit: type=1326 audit(1689216473.081:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215502 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612768.073479] audit: type=1326 audit(1689216515.273:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612911.907957] exe[230755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784c9cc40a cs:33 sp:7f8d98f46ee8 ax:12 si:ffffffffff600000 di:55784ca38ff2 [11612912.026179] audit: type=1326 audit(1689216659.232:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=229411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612928.029305] audit: type=1326 audit(1689216675.232:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612933.884371] audit: type=1326 audit(1689216681.088:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=237418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613007.977947] audit: type=1326 audit(1689216755.180:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242949 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613034.707467] exe[210137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed66be340a cs:33 sp:7fd40805cee8 ax:12 si:ffffffffff600000 di:55ed66c4fff2 [11613067.683364] audit: type=1326 audit(1689216814.888:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=238399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613090.757129] audit: type=1326 audit(1689216837.960:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613156.842452] audit: type=1326 audit(1689216904.048:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162031 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613176.892347] audit: type=1326 audit(1689216924.096:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613225.327240] audit: type=1326 audit(1689216972.532:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613257.820594] audit: type=1326 audit(1689217005.024:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248201 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613259.764460] exe[113089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.896766] exe[129485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.994509] exe[113108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613260.035649] exe[167068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613367.064209] audit: type=1326 audit(1689217114.268:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=257164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613389.920266] audit: type=1326 audit(1689217137.124:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=265247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613400.171681] audit: type=1326 audit(1689217147.376:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=261413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613423.461311] audit: type=1326 audit(1689217170.664:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=267746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613556.820936] audit: type=1326 audit(1689217304.024:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=269567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613639.322076] audit: type=1326 audit(1689217386.523:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=271970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613662.359245] audit: type=1326 audit(1689217409.563:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=279508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613699.545408] audit: type=1326 audit(1689217446.747:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=274933 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613729.742873] audit: type=1326 audit(1689217476.947:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=227591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11613758.457839] audit: type=1326 audit(1689217505.659:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=208877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613841.828755] audit: type=1326 audit(1689217589.031:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613865.039411] audit: type=1326 audit(1689217612.243:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=285941 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613909.215817] exe[280649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613909.285023] exe[281621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613910.102687] exe[280647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613911.927175] audit: type=1326 audit(1689217659.131:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=283958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613926.880021] audit: type=1326 audit(1689217674.083:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=250982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613951.214334] audit: type=1326 audit(1689217698.415:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613994.384142] audit: type=1326 audit(1689217741.587:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=289847 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614054.357636] audit: type=1326 audit(1689217801.559:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614197.565657] audit: type=1326 audit(1689217944.767:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293965 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614243.930801] audit: type=1326 audit(1689217991.131:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614340.962187] audit: type=1326 audit(1689218088.162:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614378.700022] audit: type=1326 audit(1689218125.902:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302653 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614436.168021] audit: type=1326 audit(1689218183.370:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=306526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614488.028688] audit: type=1326 audit(1689218235.230:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614531.437813] audit: type=1326 audit(1689218278.638:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=313198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614546.864834] audit: type=1326 audit(1689218294.066:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319188 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614567.377282] audit: type=1326 audit(1689218314.578:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=299618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614623.636542] audit: type=1326 audit(1689218370.838:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614629.720322] audit: type=1326 audit(1689218376.922:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614697.032081] audit: type=1326 audit(1689218444.234:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614708.565361] audit: type=1326 audit(1689218455.766:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=321370 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614725.059201] audit: type=1326 audit(1689218472.258:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614725.083797] audit: type=1326 audit(1689218472.270:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614763.316197] audit: type=1326 audit(1689218510.518:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614783.657848] audit: type=1326 audit(1689218530.858:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.377379] audit: type=1326 audit(1689218572.578:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.954441] audit: type=1326 audit(1689218573.154:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614826.473984] audit: type=1326 audit(1689218573.674:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614849.192210] audit: type=1326 audit(1689218596.394:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347434 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614869.432839] audit: type=1326 audit(1689218616.634:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614904.547842] audit: type=1326 audit(1689218651.746:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614919.904813] audit: type=1326 audit(1689218667.106:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344659 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614989.331061] audit: type=1326 audit(1689218736.530:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615026.778194] audit: type=1326 audit(1689218773.978:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615046.792010] audit: type=1326 audit(1689218793.989:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=353766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615075.957721] audit: type=1326 audit(1689218823.157:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=355648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615092.070251] audit: type=1326 audit(1689218839.269:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615105.006673] audit: type=1326 audit(1689218852.205:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615115.088959] audit: type=1326 audit(1689218862.289:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=374087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615140.436699] audit: type=1326 audit(1689218887.637:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=379563 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615189.321653] audit: type=1326 audit(1689218936.521:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=369018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615249.883397] audit: type=1326 audit(1689218997.081:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=377300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615278.181181] audit: type=1326 audit(1689219025.381:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=365614 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615285.687507] audit: type=1326 audit(1689219032.885:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383294 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615334.361923] audit: type=1326 audit(1689219081.561:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=386918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615358.021042] audit: type=1326 audit(1689219105.221:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=397046 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615372.830891] audit: type=1326 audit(1689219120.029:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615392.629913] audit: type=1326 audit(1689219139.829:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=391869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615418.819110] audit: type=1326 audit(1689219166.017:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615534.998711] audit: type=1326 audit(1689219282.197:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615536.639688] audit: type=1326 audit(1689219283.837:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.252941] audit: type=1326 audit(1689219319.453:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.566380] audit: type=1326 audit(1689219319.765:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=402658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615607.239874] audit: type=1326 audit(1689219354.437:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=404197 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615682.174935] audit: type=1326 audit(1689219429.373:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=395486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615749.676438] audit: type=1326 audit(1689219496.873:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=409554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615772.856758] audit: type=1326 audit(1689219520.056:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=415966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615782.603424] audit: type=1326 audit(1689219529.800:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=393960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615837.996675] audit: type=1326 audit(1689219585.196:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414088 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.905148] audit: type=1326 audit(1689219603.108:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.959406] audit: type=1326 audit(1689219603.160:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414743 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615907.170690] audit: type=1326 audit(1689219654.372:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616016.968741] audit: type=1326 audit(1689219764.168:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419234 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616018.174727] audit: type=1326 audit(1689219765.376:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419205 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616049.790873] audit: type=1326 audit(1689219796.992:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420016 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616179.467941] audit: type=1326 audit(1689219926.668:876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616180.555813] audit: type=1326 audit(1689219927.756:877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616192.430465] audit: type=1326 audit(1689219939.632:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616204.730256] audit: type=1326 audit(1689219951.932:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426323 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616215.467880] audit: type=1326 audit(1689219962.668:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426686 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616342.057416] audit: type=1326 audit(1689220089.260:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616344.197343] audit: type=1326 audit(1689220091.400:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427038 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616349.922513] audit: type=1326 audit(1689220097.124:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616463.003124] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117536ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.155216] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec1174f4ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.334664] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.365978] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.395492] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.434812] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.469559] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.499013] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.528098] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.559286] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.856088] audit: type=1326 audit(1689220211.056:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433896 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616468.036730] warn_bad_vsyscall: 56 callbacks suppressed [11616468.036733] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.143022] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.346868] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.476775] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.602391] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.747206] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.905526] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.069465] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.228264] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.373763] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616478.212932] audit: type=1326 audit(1689220225.412:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=399179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616486.892502] audit: type=1326 audit(1689220234.092:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616504.636883] audit: type=1326 audit(1689220251.835:887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434647 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616506.387296] audit: type=1326 audit(1689220253.587:888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616618.325394] audit: type=1326 audit(1689220365.523:889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616624.272672] audit: type=1326 audit(1689220371.471:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616641.156448] audit: type=1326 audit(1689220388.355:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616646.887273] audit: type=1326 audit(1689220394.087:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416646 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616669.130945] audit: type=1326 audit(1689220416.331:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616671.357319] audit: type=1326 audit(1689220418.555:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616685.822247] audit: type=1326 audit(1689220433.023:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426318 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616727.733883] warn_bad_vsyscall: 14 callbacks suppressed [11616727.733887] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.854758] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.896011] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.024074] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.060517] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.174456] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.285948] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.286187] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.433658] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.542871] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.745666] warn_bad_vsyscall: 149 callbacks suppressed [11616732.745670] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.778992] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.807892] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.837387] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.866886] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.895047] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.005828] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.156311] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.302872] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.344866] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.937508] warn_bad_vsyscall: 156 callbacks suppressed [11616737.937511] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.978420] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.107496] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.221153] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.332316] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.371403] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.516981] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.646772] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.793750] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.925501] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616742.938460] warn_bad_vsyscall: 95 callbacks suppressed [11616742.938463] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.139113] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.249995] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.287426] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.799359] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.961896] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.123243] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.277308] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.579977] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.680400] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.059194] warn_bad_vsyscall: 179 callbacks suppressed [11616748.059198] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.099340] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.218641] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.353244] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.514493] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.675188] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.816625] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616748.957631] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.061746] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.178713] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.071882] warn_bad_vsyscall: 129 callbacks suppressed [11616753.071903] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.188917] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.305604] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.308145] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.434246] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.463792] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.573550] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.690786] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.948656] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616754.057794] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.088841] warn_bad_vsyscall: 69 callbacks suppressed [11616758.088845] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.198407] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.325846] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.452371] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.611864] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.848362] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.023674] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.223697] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.378129] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.414350] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.247975] warn_bad_vsyscall: 67 callbacks suppressed [11616763.247978] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.379531] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.506568] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.576974] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.712296] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.868809] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.012072] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.044986] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.075153] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.105612] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.632673] warn_bad_vsyscall: 72 callbacks suppressed [11616768.632677] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.764563] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.797201] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.945297] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.977094] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.105815] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.219603] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.319274] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.446879] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.586043] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.407661] warn_bad_vsyscall: 20 callbacks suppressed [11616774.407665] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.443917] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.480792] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.515412] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.549287] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.577325] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.615687] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.650789] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.680564] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.712742] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.732922] warn_bad_vsyscall: 59 callbacks suppressed [11616779.732927] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.873482] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.015511] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.144019] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.148245] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.292227] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.408584] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.554021] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.587092] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.707671] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616831.354738] audit: type=1326 audit(1689220578.555:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616849.536866] audit: type=1326 audit(1689220596.735:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616891.400048] audit: type=1326 audit(1689220638.599:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616955.867342] audit: type=1326 audit(1689220703.067:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616993.610115] audit: type=1326 audit(1689220740.811:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448725 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617027.425260] warn_bad_vsyscall: 1 callbacks suppressed [11617027.425263] exe[423335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559734aa5839 cs:33 sp:7f1166de5ee8 ax:0 si:20000240 di:ffffffffff600000 [11617031.423364] audit: type=1326 audit(1689220778.623:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617034.068901] audit: type=1326 audit(1689220781.267:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=450336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617036.395177] exe[403877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2071a9839 cs:33 sp:7f1205849ee8 ax:0 si:20000240 di:ffffffffff600000 [11617110.112230] exe[450940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563710d72839 cs:33 sp:7fb6768c9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617120.897024] audit: type=1326 audit(1689220868.095:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=452760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617155.771686] audit: type=1326 audit(1689220902.971:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617163.858912] audit: type=1326 audit(1689220911.059:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=456904 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617173.909893] audit: type=1326 audit(1689220921.107:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=359483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617177.166434] audit: type=1326 audit(1689220924.363:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453803 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617199.530594] audit: type=1326 audit(1689220946.731:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458135 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617242.071168] exe[456653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d54535f839 cs:33 sp:7fddbdecbee8 ax:0 si:20000240 di:ffffffffff600000 [11617242.806185] exe[452415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7ccdb9839 cs:33 sp:7f37b6bf9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617285.999616] exe[453136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55772e5b8839 cs:33 sp:7ea5ab3feee8 ax:0 si:20000240 di:ffffffffff600000 [11617310.725595] exe[352485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564403af1839 cs:33 sp:7fe27b9feee8 ax:0 si:20000240 di:ffffffffff600000 [11617320.633665] audit: type=1326 audit(1689221067.830:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617333.963647] audit: type=1326 audit(1689221081.162:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617344.534053] exe[456677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6142f839 cs:33 sp:7fcfb7eebee8 ax:0 si:20000240 di:ffffffffff600000 [11617407.485335] audit: type=1326 audit(1689221154.682:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617407.510562] audit: type=1326 audit(1689221154.682:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617450.603853] audit: type=1326 audit(1689221197.802:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444772 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617458.156564] exe[464010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55932fcf1839 cs:33 sp:7fadc19c2ee8 ax:0 si:20000240 di:ffffffffff600000 [11617470.363479] exe[373491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56224fbf2839 cs:33 sp:7f9f309ccee8 ax:0 si:20000240 di:ffffffffff600000 [11617473.971610] audit: type=1326 audit(1689221221.170:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617475.605465] exe[461182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796b1a858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.707828] exe[462051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.818558] exe[462052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617485.057212] audit: type=1326 audit(1689221232.254:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617570.056481] audit: type=1326 audit(1689221317.254:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=465697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617597.277555] audit: type=1326 audit(1689221344.474:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617616.134916] exe[368535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b36f85f839 cs:33 sp:7ecb96446ee8 ax:0 si:20000240 di:ffffffffff600000 [11617648.439900] audit: type=1326 audit(1689221395.638:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=467841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617678.970527] audit: type=1326 audit(1689221426.166:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=457982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617700.643689] audit: type=1326 audit(1689221447.842:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617732.017925] audit: type=1326 audit(1689221479.214:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469314 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617738.589958] audit: type=1326 audit(1689221485.786:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466971 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617740.351068] audit: type=1326 audit(1689221487.550:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617792.775079] exe[470535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93a6ea839 cs:33 sp:7ea8e19feee8 ax:0 si:20000240 di:ffffffffff600000 [11617809.463896] audit: type=1326 audit(1689221556.662:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470733 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617812.958637] exe[473479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578a49e9839 cs:33 sp:7f4af18abee8 ax:0 si:20000240 di:ffffffffff600000 [11617850.443757] audit: type=1326 audit(1689221597.642:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617882.299739] audit: type=1326 audit(1689221629.498:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617893.147005] audit: type=1326 audit(1689221640.346:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=473353 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617934.186694] audit: type=1326 audit(1689221681.382:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617983.641154] audit: type=1326 audit(1689221730.833:929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618007.754035] exe[479109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc7088839 cs:33 sp:7f115bb4aee8 ax:0 si:20000240 di:ffffffffff600000 [11618023.408403] exe[477266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.501534] exe[471958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.601684] exe[471707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618024.400520] audit: type=1326 audit(1689221771.597:930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=477359 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618074.174434] audit: type=1326 audit(1689221821.369:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618146.086115] audit: type=1326 audit(1689221893.281:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=480365 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618165.619972] audit: type=1326 audit(1689221912.817:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.009828] audit: type=1326 audit(1689221982.205:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437493 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.035898] audit: type=1326 audit(1689221982.233:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=485075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618257.120281] audit: type=1326 audit(1689222004.317:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618306.553982] audit: type=1326 audit(1689222053.749:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618309.160749] audit: type=1326 audit(1689222056.357:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618328.009567] audit: type=1326 audit(1689222075.205:939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=491196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618396.215364] audit: type=1326 audit(1689222143.413:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618458.057109] audit: type=1326 audit(1689222205.253:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618471.167306] audit: type=1326 audit(1689222218.365:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618558.971085] audit: type=1326 audit(1689222306.165:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=498306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618599.005616] audit: type=1326 audit(1689222346.201:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500998 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618614.605767] audit: type=1326 audit(1689222361.801:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471350 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618616.160870] audit: type=1326 audit(1689222363.357:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618632.621352] audit: type=1326 audit(1689222379.817:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=502952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618740.688253] audit: type=1326 audit(1689222487.888:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618794.782232] audit: type=1326 audit(1689222541.980:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=516208 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618828.244900] audit: type=1326 audit(1689222575.444:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442795 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618883.250327] audit: type=1326 audit(1689222630.448:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=527662 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618905.654237] audit: type=1326 audit(1689222652.852:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=539741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618955.994306] audit: type=1326 audit(1689222703.192:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618991.070845] audit: type=1326 audit(1689222738.268:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618995.914657] exe[531498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae92ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.576485] exe[545055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.698654] exe[515605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618998.466088] audit: type=1326 audit(1689222745.664:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545946 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619039.105891] audit: type=1326 audit(1689222786.304:956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=540251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619081.481628] audit: type=1326 audit(1689222828.680:957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472579 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619132.788973] audit: type=1326 audit(1689222879.988:958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=546430 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619169.205197] audit: type=1326 audit(1689222916.404:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552581 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619181.529368] audit: type=1326 audit(1689222928.728:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=548478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619204.740432] audit: type=1326 audit(1689222951.940:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=554938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619231.628546] audit: type=1326 audit(1689222978.828:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619294.278304] audit: type=1326 audit(1689223041.476:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619302.932977] audit: type=1326 audit(1689223050.132:964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=553420 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619324.619811] audit: type=1326 audit(1689223071.816:965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619336.253946] audit: type=1326 audit(1689223083.452:966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619398.879385] exe[536155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.939422] exe[516375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.982844] exe[535671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619453.791031] audit: type=1326 audit(1689223200.987:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619465.706772] audit: type=1326 audit(1689223212.903:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550448 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619487.423938] exe[566400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563c4858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.482399] exe[562461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.528570] exe[563319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619585.499945] audit: type=1326 audit(1689223332.695:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619596.902218] audit: type=1326 audit(1689223344.099:970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565827 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619607.979102] audit: type=1326 audit(1689223355.175:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619689.631929] audit: type=1326 audit(1689223436.827:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619831.695309] audit: type=1326 audit(1689223578.891:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575570 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619856.886854] audit: type=1326 audit(1689223604.083:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577025 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619974.006322] audit: type=1326 audit(1689223721.203:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620035.655078] audit: type=1326 audit(1689223782.851:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=581361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620114.896040] audit: type=1326 audit(1689223862.090:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=547279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620115.147632] audit: type=1326 audit(1689223862.342:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620215.428928] exe[578382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.470748] exe[578378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.508820] exe[545514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620227.851853] audit: type=1326 audit(1689223975.046:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=588747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620256.627986] audit: type=1326 audit(1689224003.822:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=591341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620370.738511] audit: type=1326 audit(1689224117.934:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620399.160346] audit: type=1326 audit(1689224146.354:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596641 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620513.054444] audit: type=1326 audit(1689224260.250:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620514.934894] audit: type=1326 audit(1689224262.130:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=600527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620580.941265] audit: type=1326 audit(1689224328.134:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620643.919662] audit: type=1326 audit(1689224391.114:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620654.467678] audit: type=1326 audit(1689224401.662:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620678.185533] audit: type=1326 audit(1689224425.382:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620753.378385] audit: type=1326 audit(1689224500.574:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606613 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620775.839985] audit: type=1326 audit(1689224523.034:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620787.380160] audit: type=1326 audit(1689224534.574:991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620878.192117] audit: type=1326 audit(1689224625.385:992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=593770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620910.511245] audit: type=1326 audit(1689224657.705:993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620929.852560] audit: type=1326 audit(1689224677.045:994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=611154 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620952.654833] audit: type=1326 audit(1689224699.849:995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=615888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620975.728228] exe[616067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.809466] exe[616334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.900989] exe[616113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11621052.917706] audit: type=1326 audit(1689224800.113:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614987 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621080.863296] audit: type=1326 audit(1689224828.057:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621086.905149] audit: type=1326 audit(1689224834.097:998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616503 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621093.759891] audit: type=1326 audit(1689224840.953:999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621116.237723] audit: type=1326 audit(1689224863.429:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620684 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621196.426285] audit: type=1326 audit(1689224943.621:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=619071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621228.541993] audit: type=1326 audit(1689224975.737:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621254.426277] audit: type=1326 audit(1689225001.621:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621296.541965] audit: type=1326 audit(1689225043.737:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621338.665441] audit: type=1326 audit(1689225085.857:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=624649 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621388.698603] audit: type=1326 audit(1689225135.893:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=626245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621531.083825] audit: type=1326 audit(1689225278.277:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621601.363569] audit: type=1326 audit(1689225348.560:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=629565 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621641.234574] audit: type=1326 audit(1689225388.432:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000