64.go:225] [ 658: 658] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:24.352468 762333 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46b214:sysno 13 D0713 00:00:24.352573 762333 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc0021a1560 6 D0713 00:00:24.352704 762333 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:24.378421 762333 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:24.378520 762333 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc0021a1560 7 D0713 00:00:24.378661 762333 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:24.380844 762333 usertrap_amd64.go:212] [ 658: 659] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:24.381107 762333 usertrap_amd64.go:122] [ 658: 659] Allocate a new trap: 0xc0021a1560 8 D0713 00:00:24.381475 762333 usertrap_amd64.go:225] [ 658: 659] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:24.384036 762333 usertrap_amd64.go:212] [ 658: 659] Found the pattern at ip 46af76:sysno 35 D0713 00:00:24.384113 762333 usertrap_amd64.go:122] [ 658: 659] Allocate a new trap: 0xc0021a1560 9 D0713 00:00:24.384259 762333 usertrap_amd64.go:225] [ 658: 659] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:24.385519 762333 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:24.385752 762333 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc0021a1560 10 D0713 00:00:24.386762 762333 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:24.398080 762333 usertrap_amd64.go:212] [ 658: 659] Found the pattern at ip 46b020:sysno 39 D0713 00:00:24.398223 762333 usertrap_amd64.go:122] [ 658: 659] Allocate a new trap: 0xc0021a1560 11 D0713 00:00:24.398459 762333 usertrap_amd64.go:225] [ 658: 659] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:24.399184 762333 usertrap_amd64.go:212] [ 658: 659] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:24.399242 762333 usertrap_amd64.go:122] [ 658: 659] Allocate a new trap: 0xc0021a1560 12 D0713 00:00:24.399373 762333 usertrap_amd64.go:225] [ 658: 659] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:24.399811 762333 task_signals.go:470] [ 658: 658] Notified of signal 23 D0713 00:00:24.400157 762333 task_signals.go:220] [ 658: 658] Signal 23: delivering to handler D0713 00:00:24.411500 762333 task_signals.go:470] [ 658: 658] Notified of signal 23 D0713 00:00:24.411525 762333 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46af29:sysno 293 D0713 00:00:24.411590 762333 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc0021a1560 13 D0713 00:00:24.411755 762333 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:24.412051 762333 task_signals.go:220] [ 658: 658] Signal 23: delivering to handler D0713 00:00:24.413742 762333 task_signals.go:470] [ 658: 658] Notified of signal 23 D0713 00:00:24.413952 762333 task_signals.go:220] [ 658: 658] Signal 23: delivering to handler D0713 00:00:24.427613 762333 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:24.427692 762333 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc0021a1560 14 D0713 00:00:24.427866 762333 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46b6e0 trap addr 66460 ([184 24 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:24.431070 762333 task_signals.go:470] [ 658: 658] Notified of signal 23 D0713 00:00:24.431362 762333 task_signals.go:220] [ 658: 658] Signal 23: delivering to handler I0713 00:00:24.436683 762333 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0713 00:00:24.436932 762333 usertrap_amd64.go:212] [ 658: 658] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:24.437067 762333 usertrap_amd64.go:122] [ 658: 658] Allocate a new trap: 0xc0021a1560 15 D0713 00:00:24.437235 762333 usertrap_amd64.go:225] [ 658: 658] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 00:00:24.437640 762333 task_exit.go:204] [ 658: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.437929 762333 task_signals.go:204] [ 658: 662] Signal 658, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.437937 762333 task_signals.go:204] [ 658: 660] Signal 658, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.437951 762333 task_signals.go:204] [ 658: 661] Signal 658, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.438145 762333 task_exit.go:204] [ 658: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.438290 762333 task_signals.go:204] [ 658: 659] Signal 658, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.438546 762333 task_exit.go:204] [ 658: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.438923 762333 task_exit.go:204] [ 658: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.439399 762333 task_exit.go:204] [ 658: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.439473 762333 task_exit.go:204] [ 658: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.439725 762333 task_exit.go:204] [ 658: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.441108 762333 task_exit.go:204] [ 658: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.441291 762333 task_exit.go:204] [ 658: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.441380 762333 task_exit.go:204] [ 658: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.441576 762333 task_exit.go:204] [ 658: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.441659 762333 task_exit.go:204] [ 658: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.463762 762333 task_exit.go:204] [ 658: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.463883 762333 task_exit.go:204] [ 658: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.464131 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:24.464575 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:24.464691 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:24.464776 762333 task_exit.go:204] [ 658: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.474240 762333 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.475533 762333 task_signals.go:481] [ 6: 15] No task notified of signal 23 D0713 00:00:24.500838 762333 syscalls.go:262] [ 663: 663] Allocating stack with size of 8388608 bytes D0713 00:00:24.504213 762333 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.505030 762333 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0713 00:00:24.513621 762333 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:24.513786 762333 usertrap_amd64.go:106] [ 663: 663] Map a usertrap vma at 68000 D0713 00:00:24.514810 762333 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001717980 1 D0713 00:00:24.515157 762333 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:24.517478 762333 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:24.517545 762333 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001717980 2 D0713 00:00:24.517680 762333 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:24.520775 762333 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:24.520854 762333 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001717980 3 D0713 00:00:24.521037 762333 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:24.550237 762333 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:24.550340 762333 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001717980 4 D0713 00:00:24.550561 762333 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:24.554025 762333 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:24.554101 762333 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001717980 5 D0713 00:00:24.554267 762333 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:24.554755 762333 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b214:sysno 13 D0713 00:00:24.554820 762333 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001717980 6 D0713 00:00:24.554967 762333 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:24.578070 762333 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:24.578172 762333 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001717980 7 D0713 00:00:24.578288 762333 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:24.580148 762333 usertrap_amd64.go:212] [ 663: 664] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:24.580251 762333 usertrap_amd64.go:122] [ 663: 664] Allocate a new trap: 0xc001717980 8 D0713 00:00:24.580487 762333 usertrap_amd64.go:225] [ 663: 664] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:24.582030 762333 usertrap_amd64.go:212] [ 663: 664] Found the pattern at ip 46af76:sysno 35 D0713 00:00:24.582126 762333 usertrap_amd64.go:122] [ 663: 664] Allocate a new trap: 0xc001717980 9 D0713 00:00:24.582353 762333 usertrap_amd64.go:225] [ 663: 664] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:24.584750 762333 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:24.585034 762333 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001717980 10 D0713 00:00:24.585371 762333 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:24.598921 762333 usertrap_amd64.go:212] [ 663: 664] Found the pattern at ip 46b020:sysno 39 D0713 00:00:24.599004 762333 usertrap_amd64.go:122] [ 663: 664] Allocate a new trap: 0xc001717980 11 D0713 00:00:24.599170 762333 usertrap_amd64.go:225] [ 663: 664] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:24.599673 762333 usertrap_amd64.go:212] [ 663: 664] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:24.599844 762333 usertrap_amd64.go:122] [ 663: 664] Allocate a new trap: 0xc001717980 12 D0713 00:00:24.600014 762333 usertrap_amd64.go:225] [ 663: 664] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:24.600399 762333 task_signals.go:470] [ 663: 663] Notified of signal 23 D0713 00:00:24.600702 762333 task_signals.go:220] [ 663: 663] Signal 23: delivering to handler D0713 00:00:24.612893 762333 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46af29:sysno 293 D0713 00:00:24.613023 762333 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001717980 13 D0713 00:00:24.613149 762333 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:24.614082 762333 task_signals.go:470] [ 663: 663] Notified of signal 23 D0713 00:00:24.614259 762333 task_signals.go:220] [ 663: 663] Signal 23: delivering to handler D0713 00:00:24.628905 762333 task_signals.go:470] [ 663: 663] Notified of signal 23 D0713 00:00:24.631898 762333 task_signals.go:220] [ 663: 663] Signal 23: delivering to handler I0713 00:00:24.639343 762333 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0713 00:00:24.639575 762333 usertrap_amd64.go:212] [ 663: 663] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:24.639638 762333 usertrap_amd64.go:122] [ 663: 663] Allocate a new trap: 0xc001717980 14 D0713 00:00:24.639753 762333 usertrap_amd64.go:225] [ 663: 663] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:24.640179 762333 task_exit.go:204] [ 663: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.640563 762333 task_signals.go:204] [ 663: 666] Signal 663, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.640762 762333 task_signals.go:204] [ 663: 667] Signal 663, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.640797 762333 task_signals.go:204] [ 663: 665] Signal 663, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.640928 762333 task_signals.go:204] [ 663: 664] Signal 663, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.641160 762333 task_exit.go:204] [ 663: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.641746 762333 task_exit.go:204] [ 663: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.642041 762333 task_exit.go:204] [ 663: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.642259 762333 task_exit.go:204] [ 663: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.642479 762333 task_exit.go:204] [ 663: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.643441 762333 task_exit.go:204] [ 663: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.643525 762333 task_exit.go:204] [ 663: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.643703 762333 task_exit.go:204] [ 663: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.643770 762333 task_exit.go:204] [ 663: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.644023 762333 task_exit.go:204] [ 663: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.644100 762333 task_exit.go:204] [ 663: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.664513 762333 task_exit.go:204] [ 663: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.664648 762333 task_exit.go:204] [ 663: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.664922 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:24.665272 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:24.665345 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:24.665779 762333 task_exit.go:204] [ 663: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.672648 762333 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.675751 762333 task_signals.go:481] [ 6: 15] No task notified of signal 23 D0713 00:00:24.692285 762333 syscalls.go:262] [ 668: 668] Allocating stack with size of 8388608 bytes D0713 00:00:24.695239 762333 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.695930 762333 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0713 00:00:24.700378 762333 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:24.700524 762333 usertrap_amd64.go:106] [ 668: 668] Map a usertrap vma at 65000 D0713 00:00:24.701371 762333 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc001717fb0 1 D0713 00:00:24.701711 762333 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:24.703680 762333 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:24.703758 762333 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc001717fb0 2 D0713 00:00:24.703913 762333 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:24.710625 762333 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:24.710693 762333 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc001717fb0 3 D0713 00:00:24.710839 762333 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:24.736596 762333 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:24.736663 762333 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc001717fb0 4 D0713 00:00:24.736934 762333 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:24.739834 762333 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:24.739915 762333 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc001717fb0 5 D0713 00:00:24.740041 762333 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:24.740373 762333 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46b214:sysno 13 D0713 00:00:24.740420 762333 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc001717fb0 6 D0713 00:00:24.740542 762333 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:24.760455 762333 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:24.760511 762333 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc001717fb0 7 D0713 00:00:24.760619 762333 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:24.762192 762333 usertrap_amd64.go:212] [ 668: 669] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:24.762277 762333 usertrap_amd64.go:122] [ 668: 669] Allocate a new trap: 0xc001717fb0 8 D0713 00:00:24.762459 762333 usertrap_amd64.go:225] [ 668: 669] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:24.764291 762333 usertrap_amd64.go:212] [ 668: 669] Found the pattern at ip 46af76:sysno 35 D0713 00:00:24.764386 762333 usertrap_amd64.go:122] [ 668: 669] Allocate a new trap: 0xc001717fb0 9 D0713 00:00:24.764629 762333 usertrap_amd64.go:225] [ 668: 669] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:24.765243 762333 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:24.765312 762333 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc001717fb0 10 D0713 00:00:24.766330 762333 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:24.778819 762333 usertrap_amd64.go:212] [ 668: 669] Found the pattern at ip 46b020:sysno 39 D0713 00:00:24.778891 762333 usertrap_amd64.go:122] [ 668: 669] Allocate a new trap: 0xc001717fb0 11 D0713 00:00:24.779021 762333 usertrap_amd64.go:225] [ 668: 669] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:24.780592 762333 usertrap_amd64.go:212] [ 668: 669] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:24.780692 762333 usertrap_amd64.go:122] [ 668: 669] Allocate a new trap: 0xc001717fb0 12 D0713 00:00:24.780886 762333 usertrap_amd64.go:225] [ 668: 669] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:24.781546 762333 task_signals.go:470] [ 668: 668] Notified of signal 23 D0713 00:00:24.781842 762333 task_signals.go:220] [ 668: 668] Signal 23: delivering to handler D0713 00:00:24.789917 762333 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46af29:sysno 293 D0713 00:00:24.789998 762333 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc001717fb0 13 D0713 00:00:24.790122 762333 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:24.797023 762333 task_signals.go:470] [ 668: 668] Notified of signal 23 D0713 00:00:24.798254 762333 task_signals.go:220] [ 668: 668] Signal 23: delivering to handler I0713 00:00:24.812412 762333 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0713 00:00:24.812657 762333 usertrap_amd64.go:212] [ 668: 668] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:24.812724 762333 usertrap_amd64.go:122] [ 668: 668] Allocate a new trap: 0xc001717fb0 14 D0713 00:00:24.812843 762333 usertrap_amd64.go:225] [ 668: 668] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:24.813292 762333 task_exit.go:204] [ 668: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.813618 762333 task_signals.go:204] [ 668: 669] Signal 668, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.813908 762333 task_exit.go:204] [ 668: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.814102 762333 task_signals.go:204] [ 668: 670] Signal 668, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.814237 762333 task_signals.go:204] [ 668: 671] Signal 668, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.814531 762333 task_signals.go:204] [ 668: 672] Signal 668, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.814836 762333 task_exit.go:204] [ 668: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.814916 762333 task_exit.go:204] [ 668: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.815202 762333 task_exit.go:204] [ 668: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.815555 762333 task_exit.go:204] [ 668: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.815772 762333 task_exit.go:204] [ 668: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.816103 762333 task_exit.go:204] [ 668: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.816193 762333 task_exit.go:204] [ 668: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.816414 762333 task_exit.go:204] [ 668: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.816993 762333 task_exit.go:204] [ 668: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.817081 762333 task_exit.go:204] [ 668: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.838776 762333 task_exit.go:204] [ 668: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.838865 762333 task_exit.go:204] [ 668: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.839086 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:24.839388 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:24.839489 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:24.839599 762333 task_exit.go:204] [ 668: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.846794 762333 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.849332 762333 task_signals.go:481] [ 6: 15] No task notified of signal 23 D0713 00:00:24.867550 762333 syscalls.go:262] [ 673: 673] Allocating stack with size of 8388608 bytes D0713 00:00:24.870822 762333 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.871444 762333 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0713 00:00:24.875526 762333 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:24.875677 762333 usertrap_amd64.go:106] [ 673: 673] Map a usertrap vma at 69000 D0713 00:00:24.876550 762333 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc001391cb0 1 D0713 00:00:24.876891 762333 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:24.878729 762333 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:24.878786 762333 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc001391cb0 2 D0713 00:00:24.878929 762333 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:24.881417 762333 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:24.881472 762333 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc001391cb0 3 D0713 00:00:24.881674 762333 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:24.905158 762333 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:24.905285 762333 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc001391cb0 4 D0713 00:00:24.905459 762333 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:24.908285 762333 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:24.908341 762333 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc001391cb0 5 D0713 00:00:24.908466 762333 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:24.908797 762333 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b214:sysno 13 D0713 00:00:24.908869 762333 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc001391cb0 6 D0713 00:00:24.909092 762333 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:24.929999 762333 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:24.930076 762333 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc001391cb0 7 D0713 00:00:24.930270 762333 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:24.932089 762333 usertrap_amd64.go:212] [ 673: 674] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:24.932168 762333 usertrap_amd64.go:122] [ 673: 674] Allocate a new trap: 0xc001391cb0 8 D0713 00:00:24.932365 762333 usertrap_amd64.go:225] [ 673: 674] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:24.934625 762333 usertrap_amd64.go:212] [ 673: 674] Found the pattern at ip 46af76:sysno 35 D0713 00:00:24.934715 762333 usertrap_amd64.go:122] [ 673: 674] Allocate a new trap: 0xc001391cb0 9 D0713 00:00:24.934906 762333 usertrap_amd64.go:225] [ 673: 674] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:24.935765 762333 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:24.935824 762333 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc001391cb0 10 D0713 00:00:24.936054 762333 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:24.949240 762333 usertrap_amd64.go:212] [ 673: 674] Found the pattern at ip 46b020:sysno 39 D0713 00:00:24.949353 762333 usertrap_amd64.go:122] [ 673: 674] Allocate a new trap: 0xc001391cb0 11 D0713 00:00:24.949642 762333 usertrap_amd64.go:225] [ 673: 674] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:24.950831 762333 usertrap_amd64.go:212] [ 673: 674] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:24.950918 762333 usertrap_amd64.go:122] [ 673: 674] Allocate a new trap: 0xc001391cb0 12 D0713 00:00:24.951837 762333 usertrap_amd64.go:225] [ 673: 674] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:24.952337 762333 task_signals.go:470] [ 673: 673] Notified of signal 23 D0713 00:00:24.952745 762333 task_signals.go:220] [ 673: 673] Signal 23: delivering to handler D0713 00:00:24.960705 762333 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46af29:sysno 293 D0713 00:00:24.960814 762333 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc001391cb0 13 D0713 00:00:24.961409 762333 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:24.969008 762333 task_signals.go:470] [ 673: 673] Notified of signal 23 D0713 00:00:24.971797 762333 task_signals.go:220] [ 673: 673] Signal 23: delivering to handler D0713 00:00:24.989098 762333 usertrap_amd64.go:212] [ 673: 673] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:24.989186 762333 usertrap_amd64.go:122] [ 673: 673] Allocate a new trap: 0xc001391cb0 14 D0713 00:00:24.989332 762333 usertrap_amd64.go:225] [ 673: 673] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:24.989740 762333 task_exit.go:204] [ 673: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.990003 762333 task_signals.go:204] [ 673: 674] Signal 673, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.990119 762333 task_exit.go:204] [ 673: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.990124 762333 task_signals.go:204] [ 673: 676] Signal 673, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.990265 762333 task_exit.go:204] [ 673: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.990450 762333 task_signals.go:204] [ 673: 675] Signal 673, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.990561 762333 task_exit.go:204] [ 673: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.990825 762333 task_signals.go:204] [ 673: 677] Signal 673, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.991237 762333 task_exit.go:204] [ 673: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.991329 762333 task_exit.go:204] [ 673: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.991572 762333 task_exit.go:204] [ 673: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.991893 762333 task_exit.go:204] [ 673: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.992599 762333 task_exit.go:204] [ 673: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.992675 762333 task_exit.go:204] [ 673: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.992895 762333 task_exit.go:204] [ 673: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.992982 762333 task_exit.go:204] [ 673: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.013550 762333 task_exit.go:204] [ 673: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.013723 762333 task_exit.go:204] [ 673: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.014039 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:25.014355 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:25.014486 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:25.014679 762333 task_exit.go:204] [ 673: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.021322 762333 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.024058 762333 task_signals.go:481] [ 6: 15] No task notified of signal 23 D0713 00:00:25.038736 762333 syscalls.go:262] [ 678: 678] Allocating stack with size of 8388608 bytes D0713 00:00:25.041335 762333 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.041961 762333 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0713 00:00:25.044868 762333 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:25.045077 762333 usertrap_amd64.go:106] [ 678: 678] Map a usertrap vma at 6a000 D0713 00:00:25.046064 762333 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc001e2b620 1 D0713 00:00:25.046345 762333 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:25.049794 762333 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:25.049866 762333 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc001e2b620 2 D0713 00:00:25.049993 762333 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:25.052869 762333 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:25.052965 762333 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc001e2b620 3 D0713 00:00:25.053114 762333 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:25.081398 762333 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:25.081553 762333 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc001e2b620 4 D0713 00:00:25.081749 762333 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:25.085798 762333 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:25.085933 762333 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc001e2b620 5 D0713 00:00:25.086173 762333 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:25.086752 762333 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b214:sysno 13 D0713 00:00:25.086821 762333 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc001e2b620 6 D0713 00:00:25.086944 762333 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:25.113894 762333 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:25.114028 762333 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc001e2b620 7 D0713 00:00:25.114168 762333 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:25.116312 762333 usertrap_amd64.go:212] [ 678: 679] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:25.116449 762333 usertrap_amd64.go:122] [ 678: 679] Allocate a new trap: 0xc001e2b620 8 D0713 00:00:25.116647 762333 usertrap_amd64.go:225] [ 678: 679] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:25.118647 762333 usertrap_amd64.go:212] [ 678: 679] Found the pattern at ip 46af76:sysno 35 D0713 00:00:25.118729 762333 usertrap_amd64.go:122] [ 678: 679] Allocate a new trap: 0xc001e2b620 9 D0713 00:00:25.118879 762333 usertrap_amd64.go:225] [ 678: 679] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:25.120861 762333 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:25.121055 762333 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc001e2b620 10 D0713 00:00:25.121300 762333 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:25.133839 762333 usertrap_amd64.go:212] [ 678: 679] Found the pattern at ip 46b020:sysno 39 D0713 00:00:25.133915 762333 usertrap_amd64.go:122] [ 678: 679] Allocate a new trap: 0xc001e2b620 11 D0713 00:00:25.134184 762333 usertrap_amd64.go:225] [ 678: 679] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:25.134716 762333 usertrap_amd64.go:212] [ 678: 679] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:25.134775 762333 usertrap_amd64.go:122] [ 678: 679] Allocate a new trap: 0xc001e2b620 12 D0713 00:00:25.134955 762333 usertrap_amd64.go:225] [ 678: 679] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:25.135386 762333 task_signals.go:470] [ 678: 678] Notified of signal 23 D0713 00:00:25.135925 762333 task_signals.go:220] [ 678: 678] Signal 23: delivering to handler D0713 00:00:25.145056 762333 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46af29:sysno 293 D0713 00:00:25.145125 762333 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc001e2b620 13 D0713 00:00:25.145336 762333 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:25.146897 762333 task_signals.go:470] [ 678: 678] Notified of signal 23 D0713 00:00:25.147193 762333 task_signals.go:220] [ 678: 678] Signal 23: delivering to handler D0713 00:00:25.162161 762333 task_signals.go:470] [ 678: 678] Notified of signal 23 D0713 00:00:25.162701 762333 task_signals.go:220] [ 678: 678] Signal 23: delivering to handler D0713 00:00:25.168363 762333 usertrap_amd64.go:212] [ 678: 678] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:25.168448 762333 usertrap_amd64.go:122] [ 678: 678] Allocate a new trap: 0xc001e2b620 14 D0713 00:00:25.168571 762333 usertrap_amd64.go:225] [ 678: 678] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:25.168979 762333 task_exit.go:204] [ 678: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.169291 762333 task_signals.go:204] [ 678: 680] Signal 678, PID: 680, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.169575 762333 task_signals.go:204] [ 678: 679] Signal 678, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.169754 762333 task_signals.go:204] [ 678: 681] Signal 678, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.169757 762333 task_signals.go:204] [ 678: 682] Signal 678, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.169798 762333 task_exit.go:204] [ 678: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.170022 762333 task_exit.go:204] [ 678: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.170141 762333 task_exit.go:204] [ 678: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.170794 762333 task_exit.go:204] [ 678: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.170936 762333 task_exit.go:204] [ 678: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.171227 762333 task_exit.go:204] [ 678: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.171323 762333 task_exit.go:204] [ 678: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.171571 762333 task_exit.go:204] [ 678: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.171636 762333 task_exit.go:204] [ 678: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.171911 762333 task_exit.go:204] [ 678: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.171998 762333 task_exit.go:204] [ 678: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.194113 762333 task_exit.go:204] [ 678: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.194232 762333 task_exit.go:204] [ 678: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.194605 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:25.195161 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:25.195304 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:25.196174 762333 task_exit.go:204] [ 678: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.205017 762333 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.206287 762333 task_signals.go:481] [ 6: 15] No task notified of signal 23 D0713 00:00:25.225073 762333 syscalls.go:262] [ 683: 683] Allocating stack with size of 8388608 bytes D0713 00:00:25.228047 762333 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.228698 762333 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0713 00:00:25.232519 762333 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:25.232713 762333 usertrap_amd64.go:106] [ 683: 683] Map a usertrap vma at 66000 D0713 00:00:25.233588 762333 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc00051ec30 1 D0713 00:00:25.233873 762333 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:25.236323 762333 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:25.236380 762333 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc00051ec30 2 D0713 00:00:25.236491 762333 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:25.239904 762333 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:25.239985 762333 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc00051ec30 3 D0713 00:00:25.240181 762333 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:25.261370 762333 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:25.261470 762333 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc00051ec30 4 D0713 00:00:25.261609 762333 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:25.264188 762333 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:25.264257 762333 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc00051ec30 5 D0713 00:00:25.264401 762333 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:25.264772 762333 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b214:sysno 13 D0713 00:00:25.264824 762333 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc00051ec30 6 D0713 00:00:25.265061 762333 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:25.285128 762333 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:25.285193 762333 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc00051ec30 7 D0713 00:00:25.285316 762333 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:25.286861 762333 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:25.286958 762333 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc00051ec30 8 D0713 00:00:25.287099 762333 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:25.288372 762333 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46af76:sysno 35 D0713 00:00:25.288507 762333 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc00051ec30 9 D0713 00:00:25.288723 762333 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:25.291605 762333 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:25.291659 762333 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc00051ec30 10 D0713 00:00:25.291974 762333 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:25.306299 762333 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46b020:sysno 39 D0713 00:00:25.306362 762333 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc00051ec30 11 D0713 00:00:25.307208 762333 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:25.308735 762333 usertrap_amd64.go:212] [ 683: 684] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:25.308817 762333 usertrap_amd64.go:122] [ 683: 684] Allocate a new trap: 0xc00051ec30 12 D0713 00:00:25.308985 762333 usertrap_amd64.go:225] [ 683: 684] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:25.309418 762333 task_signals.go:470] [ 683: 683] Notified of signal 23 D0713 00:00:25.310079 762333 task_signals.go:220] [ 683: 683] Signal 23: delivering to handler D0713 00:00:25.311398 762333 task_signals.go:481] [ 683: 683] No task notified of signal 23 D0713 00:00:25.311639 762333 task_signals.go:220] [ 683: 683] Signal 23: delivering to handler D0713 00:00:25.312731 762333 task_signals.go:481] [ 683: 683] No task notified of signal 23 D0713 00:00:25.313045 762333 task_signals.go:220] [ 683: 683] Signal 23: delivering to handler D0713 00:00:25.314180 762333 task_signals.go:470] [ 683: 683] Notified of signal 23 D0713 00:00:25.314367 762333 task_signals.go:220] [ 683: 683] Signal 23: delivering to handler D0713 00:00:25.321882 762333 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46af29:sysno 293 D0713 00:00:25.321945 762333 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc00051ec30 13 D0713 00:00:25.322127 762333 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:25.327506 762333 task_signals.go:470] [ 683: 683] Notified of signal 23 D0713 00:00:25.330854 762333 task_signals.go:220] [ 683: 683] Signal 23: delivering to handler D0713 00:00:25.350122 762333 usertrap_amd64.go:212] [ 683: 683] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:25.350269 762333 usertrap_amd64.go:122] [ 683: 683] Allocate a new trap: 0xc00051ec30 14 D0713 00:00:25.350473 762333 usertrap_amd64.go:225] [ 683: 683] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:25.351492 762333 task_exit.go:204] [ 683: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.351811 762333 task_signals.go:204] [ 683: 685] Signal 683, PID: 685, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.351982 762333 task_signals.go:204] [ 683: 684] Signal 683, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.352061 762333 task_signals.go:204] [ 683: 686] Signal 683, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.352115 762333 task_signals.go:204] [ 683: 688] Signal 683, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.352113 762333 task_signals.go:204] [ 683: 687] Signal 683, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.352148 762333 task_exit.go:204] [ 683: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.352543 762333 task_exit.go:204] [ 683: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.353079 762333 task_exit.go:204] [ 683: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.353682 762333 task_exit.go:204] [ 683: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.353888 762333 task_exit.go:204] [ 683: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.354849 762333 task_exit.go:204] [ 683: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.355164 762333 task_exit.go:204] [ 683: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.355248 762333 task_exit.go:204] [ 683: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.355726 762333 task_exit.go:204] [ 683: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.355833 762333 task_exit.go:204] [ 683: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.356033 762333 task_exit.go:204] [ 683: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.356086 762333 task_exit.go:204] [ 683: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.356502 762333 task_exit.go:204] [ 683: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.356580 762333 task_exit.go:204] [ 683: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.378201 762333 task_exit.go:204] [ 683: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.378293 762333 task_exit.go:204] [ 683: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.378522 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:25.378778 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:25.378852 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:25.379340 762333 task_exit.go:204] [ 683: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.387428 762333 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.389601 762333 task_signals.go:481] [ 6: 15] No task notified of signal 23 D0713 00:00:25.406646 762333 syscalls.go:262] [ 689: 689] Allocating stack with size of 8388608 bytes D0713 00:00:25.409640 762333 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.410601 762333 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0713 00:00:25.414395 762333 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:25.414582 762333 usertrap_amd64.go:106] [ 689: 689] Map a usertrap vma at 62000 D0713 00:00:25.415546 762333 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000763e60 1 D0713 00:00:25.415906 762333 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:25.417862 762333 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:25.417918 762333 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000763e60 2 D0713 00:00:25.418065 762333 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:25.420695 762333 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:25.420764 762333 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000763e60 3 D0713 00:00:25.420930 762333 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:25.446791 762333 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:25.446877 762333 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000763e60 4 D0713 00:00:25.447059 762333 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:25.451878 762333 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:25.451941 762333 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000763e60 5 D0713 00:00:25.452108 762333 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:25.452493 762333 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b214:sysno 13 D0713 00:00:25.452540 762333 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000763e60 6 D0713 00:00:25.452681 762333 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:25.474655 762333 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:25.474750 762333 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000763e60 7 D0713 00:00:25.474892 762333 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:25.476853 762333 usertrap_amd64.go:212] [ 689: 690] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:25.476994 762333 usertrap_amd64.go:122] [ 689: 690] Allocate a new trap: 0xc000763e60 8 D0713 00:00:25.477272 762333 usertrap_amd64.go:225] [ 689: 690] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:25.480142 762333 usertrap_amd64.go:212] [ 689: 690] Found the pattern at ip 46af76:sysno 35 D0713 00:00:25.480221 762333 usertrap_amd64.go:122] [ 689: 690] Allocate a new trap: 0xc000763e60 9 D0713 00:00:25.480388 762333 usertrap_amd64.go:225] [ 689: 690] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:25.481623 762333 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:25.481718 762333 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000763e60 10 D0713 00:00:25.481914 762333 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:25.493367 762333 usertrap_amd64.go:212] [ 689: 690] Found the pattern at ip 46b020:sysno 39 D0713 00:00:25.493445 762333 usertrap_amd64.go:122] [ 689: 690] Allocate a new trap: 0xc000763e60 11 D0713 00:00:25.493638 762333 usertrap_amd64.go:225] [ 689: 690] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:25.495498 762333 usertrap_amd64.go:212] [ 689: 690] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:25.495578 762333 usertrap_amd64.go:122] [ 689: 690] Allocate a new trap: 0xc000763e60 12 D0713 00:00:25.495737 762333 usertrap_amd64.go:225] [ 689: 690] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:25.496140 762333 task_signals.go:470] [ 689: 689] Notified of signal 23 D0713 00:00:25.496443 762333 task_signals.go:220] [ 689: 689] Signal 23: delivering to handler D0713 00:00:25.505633 762333 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46af29:sysno 293 D0713 00:00:25.505710 762333 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000763e60 13 D0713 00:00:25.505856 762333 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:25.511936 762333 task_signals.go:470] [ 689: 689] Notified of signal 23 D0713 00:00:25.513955 762333 task_signals.go:220] [ 689: 689] Signal 23: delivering to handler D0713 00:00:25.528405 762333 usertrap_amd64.go:212] [ 689: 689] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:25.528483 762333 usertrap_amd64.go:122] [ 689: 689] Allocate a new trap: 0xc000763e60 14 D0713 00:00:25.528649 762333 usertrap_amd64.go:225] [ 689: 689] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:25.529111 762333 task_exit.go:204] [ 689: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.529428 762333 task_signals.go:204] [ 689: 692] Signal 689, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.529592 762333 task_signals.go:204] [ 689: 693] Signal 689, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.529802 762333 task_signals.go:204] [ 689: 691] Signal 689, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.529805 762333 task_exit.go:204] [ 689: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.529826 762333 task_signals.go:204] [ 689: 690] Signal 689, PID: 690, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.529944 762333 task_exit.go:204] [ 689: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.530105 762333 task_exit.go:204] [ 689: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.530451 762333 task_exit.go:204] [ 689: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.530859 762333 task_exit.go:204] [ 689: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.531032 762333 task_exit.go:204] [ 689: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.531086 762333 task_exit.go:204] [ 689: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.531779 762333 task_exit.go:204] [ 689: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.531838 762333 task_exit.go:204] [ 689: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.532094 762333 task_exit.go:204] [ 689: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.532146 762333 task_exit.go:204] [ 689: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.553502 762333 task_exit.go:204] [ 689: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.553625 762333 task_exit.go:204] [ 689: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.553852 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:25.554081 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:25.554169 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:25.554407 762333 task_exit.go:204] [ 689: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.560791 762333 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.565451 762333 task_signals.go:481] [ 6: 15] No task notified of signal 23 D0713 00:00:25.581745 762333 syscalls.go:262] [ 694: 694] Allocating stack with size of 8388608 bytes D0713 00:00:25.585072 762333 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.585735 762333 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0713 00:00:25.589988 762333 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:25.590176 762333 usertrap_amd64.go:106] [ 694: 694] Map a usertrap vma at 69000 D0713 00:00:25.591142 762333 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc000bea1e0 1 D0713 00:00:25.591442 762333 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:25.593457 762333 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:25.593540 762333 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc000bea1e0 2 D0713 00:00:25.593713 762333 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:25.596773 762333 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:25.596837 762333 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc000bea1e0 3 D0713 00:00:25.597035 762333 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:25.620737 762333 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:25.620858 762333 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc000bea1e0 4 D0713 00:00:25.621076 762333 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:25.624471 762333 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:25.624546 762333 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc000bea1e0 5 D0713 00:00:25.624723 762333 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:25.625179 762333 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46b214:sysno 13 D0713 00:00:25.625240 762333 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc000bea1e0 6 D0713 00:00:25.625359 762333 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:25.648530 762333 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:25.648638 762333 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc000bea1e0 7 D0713 00:00:25.648822 762333 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:25.650873 762333 usertrap_amd64.go:212] [ 694: 695] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:25.650955 762333 usertrap_amd64.go:122] [ 694: 695] Allocate a new trap: 0xc000bea1e0 8 D0713 00:00:25.651193 762333 usertrap_amd64.go:225] [ 694: 695] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:25.653630 762333 usertrap_amd64.go:212] [ 694: 695] Found the pattern at ip 46af76:sysno 35 D0713 00:00:25.653752 762333 usertrap_amd64.go:122] [ 694: 695] Allocate a new trap: 0xc000bea1e0 9 D0713 00:00:25.654860 762333 usertrap_amd64.go:225] [ 694: 695] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:25.655357 762333 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:25.655445 762333 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc000bea1e0 10 D0713 00:00:25.655660 762333 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:25.667969 762333 usertrap_amd64.go:212] [ 694: 695] Found the pattern at ip 46b020:sysno 39 D0713 00:00:25.668075 762333 usertrap_amd64.go:122] [ 694: 695] Allocate a new trap: 0xc000bea1e0 11 D0713 00:00:25.668300 762333 usertrap_amd64.go:225] [ 694: 695] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:25.669201 762333 usertrap_amd64.go:212] [ 694: 695] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:25.669274 762333 usertrap_amd64.go:122] [ 694: 695] Allocate a new trap: 0xc000bea1e0 12 D0713 00:00:25.669461 762333 usertrap_amd64.go:225] [ 694: 695] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:25.670316 762333 task_signals.go:470] [ 694: 694] Notified of signal 23 D0713 00:00:25.670990 762333 task_signals.go:220] [ 694: 694] Signal 23: delivering to handler D0713 00:00:25.682407 762333 task_signals.go:470] [ 694: 694] Notified of signal 23 D0713 00:00:25.682422 762333 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46af29:sysno 293 D0713 00:00:25.682548 762333 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc000bea1e0 13 D0713 00:00:25.682745 762333 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:25.683098 762333 task_signals.go:220] [ 694: 694] Signal 23: delivering to handler D0713 00:00:25.693382 762333 task_signals.go:470] [ 694: 694] Notified of signal 23 D0713 00:00:25.702761 762333 task_signals.go:220] [ 694: 694] Signal 23: delivering to handler D0713 00:00:25.718023 762333 task_signals.go:470] [ 694: 694] Notified of signal 23 D0713 00:00:25.718917 762333 task_signals.go:220] [ 694: 694] Signal 23: delivering to handler D0713 00:00:25.741112 762333 task_signals.go:470] [ 694: 694] Notified of signal 23 D0713 00:00:25.741491 762333 task_signals.go:220] [ 694: 694] Signal 23: delivering to handler D0713 00:00:25.750967 762333 usertrap_amd64.go:212] [ 694: 694] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:25.751092 762333 usertrap_amd64.go:122] [ 694: 694] Allocate a new trap: 0xc000bea1e0 14 D0713 00:00:25.751299 762333 usertrap_amd64.go:225] [ 694: 694] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:25.751863 762333 task_exit.go:204] [ 694: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.752404 762333 task_signals.go:204] [ 694: 696] Signal 694, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.752461 762333 task_signals.go:204] [ 694: 695] Signal 694, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.752620 762333 task_signals.go:204] [ 694: 698] Signal 694, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.752666 762333 task_exit.go:204] [ 694: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.753048 762333 task_signals.go:204] [ 694: 697] Signal 694, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.753164 762333 task_exit.go:204] [ 694: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.753689 762333 task_exit.go:204] [ 694: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.754588 762333 task_exit.go:204] [ 694: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.755001 762333 task_exit.go:204] [ 694: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.755158 762333 task_exit.go:204] [ 694: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.755429 762333 task_exit.go:204] [ 694: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.755870 762333 task_exit.go:204] [ 694: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.756041 762333 task_exit.go:204] [ 694: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.756314 762333 task_exit.go:204] [ 694: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.756395 762333 task_exit.go:204] [ 694: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.781862 762333 task_exit.go:204] [ 694: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.782009 762333 task_exit.go:204] [ 694: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.782275 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:25.782671 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:25.782764 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:25.783204 762333 task_exit.go:204] [ 694: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.793000 762333 task_signals.go:481] [ 6: 15] No task notified of signal 23 D0713 00:00:25.794611 762333 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.820812 762333 syscalls.go:262] [ 699: 699] Allocating stack with size of 8388608 bytes D0713 00:00:25.825018 762333 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.825813 762333 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0713 00:00:25.831336 762333 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:25.831540 762333 usertrap_amd64.go:106] [ 699: 699] Map a usertrap vma at 61000 D0713 00:00:25.832578 762333 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000c85080 1 D0713 00:00:25.832914 762333 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:25.835592 762333 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:25.835679 762333 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000c85080 2 D0713 00:00:25.835833 762333 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:25.839137 762333 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:25.839197 762333 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000c85080 3 D0713 00:00:25.839339 762333 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:25.862663 762333 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:25.862798 762333 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000c85080 4 D0713 00:00:25.862969 762333 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:25.866150 762333 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:25.866212 762333 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000c85080 5 D0713 00:00:25.866346 762333 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:25.866978 762333 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b214:sysno 13 D0713 00:00:25.867074 762333 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000c85080 6 D0713 00:00:25.867321 762333 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:25.887668 762333 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:25.887758 762333 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000c85080 7 D0713 00:00:25.887878 762333 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:25.889524 762333 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:25.889594 762333 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc000c85080 8 D0713 00:00:25.889785 762333 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:25.891700 762333 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46af76:sysno 35 D0713 00:00:25.891790 762333 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc000c85080 9 D0713 00:00:25.891972 762333 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:25.893629 762333 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:25.893700 762333 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000c85080 10 D0713 00:00:25.893901 762333 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:25.909452 762333 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46b020:sysno 39 D0713 00:00:25.909585 762333 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc000c85080 11 D0713 00:00:25.909742 762333 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:25.910280 762333 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:25.910337 762333 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc000c85080 12 D0713 00:00:25.910446 762333 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:25.910982 762333 task_signals.go:470] [ 699: 699] Notified of signal 23 D0713 00:00:25.911658 762333 task_signals.go:220] [ 699: 699] Signal 23: delivering to handler D0713 00:00:25.916817 762333 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46af29:sysno 293 D0713 00:00:25.916873 762333 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000c85080 13 D0713 00:00:25.917044 762333 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:25.923044 762333 task_signals.go:470] [ 699: 699] Notified of signal 23 D0713 00:00:25.924879 762333 task_signals.go:220] [ 699: 699] Signal 23: delivering to handler D0713 00:00:25.940881 762333 task_signals.go:470] [ 699: 699] Notified of signal 23 D0713 00:00:25.943588 762333 task_signals.go:220] [ 699: 699] Signal 23: delivering to handler D0713 00:00:25.945848 762333 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:25.945928 762333 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc000c85080 14 D0713 00:00:25.946123 762333 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:25.946790 762333 task_exit.go:204] [ 699: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.947340 762333 task_signals.go:204] [ 699: 700] Signal 699, PID: 700, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.947355 762333 task_signals.go:204] [ 699: 703] Signal 699, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.947538 762333 task_signals.go:204] [ 699: 701] Signal 699, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.947542 762333 task_signals.go:204] [ 699: 704] Signal 699, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.947651 762333 task_exit.go:204] [ 699: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.947879 762333 task_signals.go:204] [ 699: 702] Signal 699, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.948107 762333 task_exit.go:204] [ 699: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.948609 762333 task_exit.go:204] [ 699: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.948878 762333 task_exit.go:204] [ 699: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.949179 762333 task_exit.go:204] [ 699: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.949520 762333 task_exit.go:204] [ 699: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.950543 762333 task_exit.go:204] [ 699: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.950632 762333 task_exit.go:204] [ 699: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.950876 762333 task_exit.go:204] [ 699: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.950966 762333 task_exit.go:204] [ 699: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.951296 762333 task_exit.go:204] [ 699: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.951376 762333 task_exit.go:204] [ 699: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.951708 762333 task_exit.go:204] [ 699: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.951784 762333 task_exit.go:204] [ 699: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.973157 762333 task_exit.go:204] [ 699: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.973269 762333 task_exit.go:204] [ 699: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.973502 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:25.973834 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:25.974020 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:25.974201 762333 task_exit.go:204] [ 699: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.980849 762333 task_stop.go:118] [ 6: 15] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.984069 762333 task_signals.go:481] [ 6: 15] No task notified of signal 23 D0713 00:00:25.999954 762333 syscalls.go:262] [ 705: 705] Allocating stack with size of 8388608 bytes D0713 00:00:26.003176 762333 task_stop.go:138] [ 6: 15] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.003634 762333 task_signals.go:220] [ 6: 15] Signal 23: delivering to handler D0713 00:00:26.008558 762333 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:26.008832 762333 usertrap_amd64.go:106] [ 705: 705] Map a usertrap vma at 60000 D0713 00:00:26.010113 762333 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000c859b0 1 D0713 00:00:26.010495 762333 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:26.012877 762333 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:26.012991 762333 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000c859b0 2 D0713 00:00:26.013171 762333 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:26.016591 762333 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:26.016664 762333 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000c859b0 3 D0713 00:00:26.016836 762333 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:26.037214 762333 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:26.037300 762333 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000c859b0 4 D0713 00:00:26.037462 762333 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:26.040708 762333 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:26.040787 762333 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000c859b0 5 D0713 00:00:26.040907 762333 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:26.041274 762333 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b214:sysno 13 D0713 00:00:26.041336 762333 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000c859b0 6 D0713 00:00:26.041433 762333 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:26.060225 762333 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:26.060349 762333 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000c859b0 7 D0713 00:00:26.060535 762333 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:26.062492 762333 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:26.062559 762333 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc000c859b0 8 D0713 00:00:26.062752 762333 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:26.064644 762333 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46af76:sysno 35 D0713 00:00:26.064716 762333 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc000c859b0 9 D0713 00:00:26.065024 762333 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:26.066214 762333 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:26.066330 762333 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000c859b0 10 D0713 00:00:26.067401 762333 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:26.081542 762333 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b020:sysno 39 D0713 00:00:26.081636 762333 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc000c859b0 11 D0713 00:00:26.081832 762333 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:26.093101 762333 usertrap_amd64.go:212] [ 705: 706] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:26.093207 762333 usertrap_amd64.go:122] [ 705: 706] Allocate a new trap: 0xc000c859b0 12 D0713 00:00:26.093423 762333 usertrap_amd64.go:225] [ 705: 706] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:26.097337 762333 task_signals.go:470] [ 705: 705] Notified of signal 23 D0713 00:00:26.099919 762333 task_signals.go:220] [ 705: 705] Signal 23: delivering to handler D0713 00:00:26.116042 762333 task_signals.go:470] [ 705: 705] Notified of signal 23 D0713 00:00:26.116588 762333 task_signals.go:220] [ 705: 705] Signal 23: delivering to handler D0713 00:00:26.135445 762333 task_signals.go:470] [ 705: 705] Notified of signal 23 D0713 00:00:26.135654 762333 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46af29:sysno 293 D0713 00:00:26.135759 762333 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000c859b0 13 D0713 00:00:26.135920 762333 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:26.136205 762333 task_signals.go:220] [ 705: 705] Signal 23: delivering to handler D0713 00:00:26.137535 762333 task_signals.go:470] [ 705: 705] Notified of signal 23 D0713 00:00:26.138414 762333 task_signals.go:220] [ 705: 705] Signal 23: delivering to handler D0713 00:00:26.140135 762333 task_signals.go:470] [ 705: 705] Notified of signal 23 D0713 00:00:26.140355 762333 task_signals.go:220] [ 705: 705] Signal 23: delivering to handler D0713 00:00:26.152302 762333 task_signals.go:470] [ 705: 705] Notified of signal 23 D0713 00:00:26.152863 762333 task_signals.go:179] [ 705: 705] Restarting syscall 202: interrupted by signal 23 D0713 00:00:26.153026 762333 task_signals.go:220] [ 705: 705] Signal 23: delivering to handler D0713 00:00:26.167753 762333 usertrap_amd64.go:212] [ 705: 705] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:26.167883 762333 usertrap_amd64.go:122] [ 705: 705] Allocate a new trap: 0xc000c859b0 14 D0713 00:00:26.168035 762333 usertrap_amd64.go:225] [ 705: 705] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:26.168685 762333 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.169304 762333 task_signals.go:204] [ 705: 710] Signal 705, PID: 710, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.169365 762333 task_signals.go:204] [ 705: 707] Signal 705, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.169702 762333 task_signals.go:204] [ 705: 706] Signal 705, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.170000 762333 task_signals.go:204] [ 705: 709] Signal 705, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.170042 762333 task_signals.go:204] [ 705: 708] Signal 705, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.170232 762333 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.170470 762333 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.170750 762333 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.171256 762333 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.171579 762333 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.171866 762333 task_exit.go:204] [ 705: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.172134 762333 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.172210 762333 task_exit.go:204] [ 705: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.173468 762333 task_exit.go:204] [ 705: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.173529 762333 task_exit.go:204] [ 705: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.173723 762333 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.173788 762333 task_exit.go:204] [ 705: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.174037 762333 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.174140 762333 task_exit.go:204] [ 705: 708] Transitioning from exit state TaskExitZombie to TaskExitDead executing program D0713 00:00:26.198263 762333 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.198388 762333 task_exit.go:204] [ 705: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.198697 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:26.199434 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:26.200044 762333 task_exit.go:204] [ 705: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.211220 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.212239 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:26.230674 762333 syscalls.go:262] [ 711: 711] Allocating stack with size of 8388608 bytes D0713 00:00:26.233568 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.234163 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:26.239691 762333 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:26.239847 762333 usertrap_amd64.go:106] [ 711: 711] Map a usertrap vma at 68000 D0713 00:00:26.240748 762333 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000b0d740 1 D0713 00:00:26.241079 762333 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:26.243219 762333 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:26.243302 762333 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000b0d740 2 D0713 00:00:26.243460 762333 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:26.246566 762333 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:26.246638 762333 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000b0d740 3 D0713 00:00:26.246879 762333 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:26.268627 762333 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:26.268758 762333 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000b0d740 4 D0713 00:00:26.268913 762333 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:26.272037 762333 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:26.272097 762333 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000b0d740 5 D0713 00:00:26.272215 762333 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:26.272530 762333 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b214:sysno 13 D0713 00:00:26.272571 762333 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000b0d740 6 D0713 00:00:26.272663 762333 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:26.291427 762333 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:26.291544 762333 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000b0d740 7 D0713 00:00:26.291686 762333 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:26.293585 762333 usertrap_amd64.go:212] [ 711: 712] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:26.293691 762333 usertrap_amd64.go:122] [ 711: 712] Allocate a new trap: 0xc000b0d740 8 D0713 00:00:26.293923 762333 usertrap_amd64.go:225] [ 711: 712] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:26.296003 762333 usertrap_amd64.go:212] [ 711: 712] Found the pattern at ip 46af76:sysno 35 D0713 00:00:26.296072 762333 usertrap_amd64.go:122] [ 711: 712] Allocate a new trap: 0xc000b0d740 9 D0713 00:00:26.296243 762333 usertrap_amd64.go:225] [ 711: 712] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:26.298081 762333 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:26.298261 762333 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000b0d740 10 D0713 00:00:26.298611 762333 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:26.312480 762333 usertrap_amd64.go:212] [ 711: 712] Found the pattern at ip 46b020:sysno 39 D0713 00:00:26.312580 762333 usertrap_amd64.go:122] [ 711: 712] Allocate a new trap: 0xc000b0d740 11 D0713 00:00:26.312854 762333 usertrap_amd64.go:225] [ 711: 712] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:26.313975 762333 usertrap_amd64.go:212] [ 711: 712] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:26.314083 762333 usertrap_amd64.go:122] [ 711: 712] Allocate a new trap: 0xc000b0d740 12 D0713 00:00:26.314311 762333 usertrap_amd64.go:225] [ 711: 712] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:26.314816 762333 task_signals.go:470] [ 711: 711] Notified of signal 23 D0713 00:00:26.315117 762333 task_signals.go:220] [ 711: 711] Signal 23: delivering to handler D0713 00:00:26.326167 762333 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46af29:sysno 293 D0713 00:00:26.326298 762333 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000b0d740 13 D0713 00:00:26.326493 762333 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:26.327193 762333 task_signals.go:470] [ 711: 711] Notified of signal 23 D0713 00:00:26.327543 762333 task_signals.go:220] [ 711: 711] Signal 23: delivering to handler I0713 00:00:26.348761 762333 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0713 00:00:26.349111 762333 usertrap_amd64.go:212] [ 711: 711] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:26.349237 762333 usertrap_amd64.go:122] [ 711: 711] Allocate a new trap: 0xc000b0d740 14 D0713 00:00:26.349392 762333 usertrap_amd64.go:225] [ 711: 711] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:26.349877 762333 task_exit.go:204] [ 711: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.350182 762333 task_signals.go:204] [ 711: 712] Signal 711, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.350369 762333 task_signals.go:204] [ 711: 713] Signal 711, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.350420 762333 task_signals.go:204] [ 711: 714] Signal 711, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.350417 762333 task_signals.go:204] [ 711: 716] Signal 711, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.350531 762333 task_signals.go:204] [ 711: 715] Signal 711, PID: 715, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.350694 762333 task_exit.go:204] [ 711: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.351205 762333 task_exit.go:204] [ 711: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.351551 762333 task_exit.go:204] [ 711: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.351901 762333 task_exit.go:204] [ 711: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.352233 762333 task_exit.go:204] [ 711: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.352681 762333 task_exit.go:204] [ 711: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.353267 762333 task_exit.go:204] [ 711: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.353442 762333 task_exit.go:204] [ 711: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.353875 762333 task_exit.go:204] [ 711: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.353945 762333 task_exit.go:204] [ 711: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.354183 762333 task_exit.go:204] [ 711: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.354249 762333 task_exit.go:204] [ 711: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.354414 762333 task_exit.go:204] [ 711: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.354482 762333 task_exit.go:204] [ 711: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.377138 762333 task_exit.go:204] [ 711: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.377280 762333 task_exit.go:204] [ 711: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.377520 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:26.377821 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:26.377898 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:26.379385 762333 task_exit.go:204] [ 711: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.387175 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.388076 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:26.405750 762333 syscalls.go:262] [ 717: 717] Allocating stack with size of 8388608 bytes D0713 00:00:26.408352 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.409040 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:26.412156 762333 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:26.412316 762333 usertrap_amd64.go:106] [ 717: 717] Map a usertrap vma at 68000 D0713 00:00:26.413251 762333 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc00172bf20 1 D0713 00:00:26.413519 762333 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:26.415762 762333 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:26.415860 762333 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc00172bf20 2 D0713 00:00:26.416030 762333 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:26.418954 762333 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:26.419008 762333 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc00172bf20 3 D0713 00:00:26.419122 762333 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:26.443920 762333 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:26.444056 762333 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc00172bf20 4 D0713 00:00:26.444222 762333 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:26.447724 762333 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:26.447810 762333 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc00172bf20 5 D0713 00:00:26.447996 762333 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:26.448496 762333 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b214:sysno 13 D0713 00:00:26.448571 762333 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc00172bf20 6 D0713 00:00:26.448718 762333 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:26.474448 762333 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:26.474552 762333 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc00172bf20 7 D0713 00:00:26.474698 762333 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:26.476351 762333 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:26.476585 762333 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc00172bf20 8 D0713 00:00:26.476936 762333 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:26.478996 762333 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46af76:sysno 35 D0713 00:00:26.479101 762333 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc00172bf20 9 D0713 00:00:26.480168 762333 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:26.480782 762333 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:26.480918 762333 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc00172bf20 10 D0713 00:00:26.481278 762333 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:26.483448 762333 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b020:sysno 39 D0713 00:00:26.483765 762333 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc00172bf20 11 D0713 00:00:26.484471 762333 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:26.486151 762333 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:26.486245 762333 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc00172bf20 12 D0713 00:00:26.486513 762333 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:26.487753 762333 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 00:00:26.490141 762333 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 00:00:26.504133 762333 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 00:00:26.504240 762333 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46af29:sysno 293 D0713 00:00:26.504378 762333 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc00172bf20 13 D0713 00:00:26.504566 762333 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:26.504896 762333 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 00:00:26.506286 762333 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 00:00:26.506728 762333 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 00:00:26.507914 762333 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 00:00:26.508120 762333 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 00:00:26.509465 762333 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 00:00:26.509716 762333 task_signals.go:179] [ 717: 717] Restarting syscall 202: interrupted by signal 23 D0713 00:00:26.509801 762333 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 00:00:26.523523 762333 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 00:00:26.523757 762333 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 00:00:26.527923 762333 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 00:00:26.529127 762333 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 00:00:26.538578 762333 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:26.538683 762333 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc00172bf20 14 D0713 00:00:26.538878 762333 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:26.539393 762333 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.539752 762333 task_signals.go:204] [ 717: 718] Signal 717, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.539975 762333 task_signals.go:204] [ 717: 720] Signal 717, PID: 720, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.540145 762333 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.540538 762333 task_signals.go:204] [ 717: 719] Signal 717, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.540596 762333 task_signals.go:204] [ 717: 721] Signal 717, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.540684 762333 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.540843 762333 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.541092 762333 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.541468 762333 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.542544 762333 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.542607 762333 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.542856 762333 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.542910 762333 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.543080 762333 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.543137 762333 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.564827 762333 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.564915 762333 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.565202 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:26.565492 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:26.565559 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:26.567128 762333 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.576441 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.576617 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:26.598682 762333 syscalls.go:262] [ 722: 722] Allocating stack with size of 8388608 bytes D0713 00:00:26.602108 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.603129 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:26.607007 762333 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:26.607241 762333 usertrap_amd64.go:106] [ 722: 722] Map a usertrap vma at 66000 D0713 00:00:26.608252 762333 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000a42780 1 D0713 00:00:26.608617 762333 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:26.611155 762333 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:26.611243 762333 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000a42780 2 D0713 00:00:26.611440 762333 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:26.614881 762333 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:26.614972 762333 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000a42780 3 D0713 00:00:26.615137 762333 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:26.637528 762333 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:26.637609 762333 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000a42780 4 D0713 00:00:26.637811 762333 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:26.640903 762333 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:26.641306 762333 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000a42780 5 D0713 00:00:26.641446 762333 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:26.641824 762333 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b214:sysno 13 D0713 00:00:26.641892 762333 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000a42780 6 D0713 00:00:26.642042 762333 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:26.665923 762333 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:26.666048 762333 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000a42780 7 D0713 00:00:26.666200 762333 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:26.667933 762333 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:26.668007 762333 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc000a42780 8 D0713 00:00:26.668177 762333 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:26.669756 762333 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46af76:sysno 35 D0713 00:00:26.669914 762333 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc000a42780 9 D0713 00:00:26.670266 762333 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:26.671675 762333 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:26.671773 762333 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000a42780 10 D0713 00:00:26.671958 762333 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:26.673433 762333 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b020:sysno 39 D0713 00:00:26.673545 762333 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc000a42780 11 D0713 00:00:26.673905 762333 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:26.674489 762333 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:26.674567 762333 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc000a42780 12 D0713 00:00:26.674780 762333 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:26.675976 762333 task_signals.go:470] [ 722: 725] Notified of signal 23 D0713 00:00:26.676407 762333 task_signals.go:179] [ 722: 725] Restarting syscall 202: interrupted by signal 23 D0713 00:00:26.676508 762333 task_signals.go:220] [ 722: 725] Signal 23: delivering to handler D0713 00:00:26.687034 762333 task_signals.go:470] [ 722: 722] Notified of signal 23 D0713 00:00:26.687380 762333 task_signals.go:220] [ 722: 722] Signal 23: delivering to handler D0713 00:00:26.696161 762333 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46af29:sysno 293 D0713 00:00:26.696256 762333 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000a42780 13 D0713 00:00:26.696463 762333 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:26.702037 762333 task_signals.go:470] [ 722: 722] Notified of signal 23 D0713 00:00:26.702252 762333 task_signals.go:220] [ 722: 722] Signal 23: delivering to handler D0713 00:00:26.716485 762333 task_signals.go:470] [ 722: 722] Notified of signal 23 D0713 00:00:26.716820 762333 task_signals.go:220] [ 722: 722] Signal 23: delivering to handler D0713 00:00:26.722854 762333 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:26.722921 762333 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc000a42780 14 D0713 00:00:26.723033 762333 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:26.723445 762333 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.723808 762333 task_signals.go:204] [ 722: 723] Signal 722, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.723970 762333 task_signals.go:204] [ 722: 726] Signal 722, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.724109 762333 task_signals.go:204] [ 722: 725] Signal 722, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.724147 762333 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.724619 762333 task_signals.go:204] [ 722: 724] Signal 722, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.724695 762333 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.725084 762333 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.725393 762333 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.725572 762333 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.726493 762333 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.726558 762333 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.726814 762333 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.726905 762333 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.727131 762333 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.727196 762333 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.747228 762333 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.747334 762333 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.747539 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:26.747809 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:26.747874 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:26.749749 762333 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.756165 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.758207 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:26.774633 762333 syscalls.go:262] [ 727: 727] Allocating stack with size of 8388608 bytes D0713 00:00:26.777968 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.778686 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:26.783651 762333 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:26.783868 762333 usertrap_amd64.go:106] [ 727: 727] Map a usertrap vma at 64000 D0713 00:00:26.785392 762333 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00111de90 1 D0713 00:00:26.785789 762333 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:26.788309 762333 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:26.788399 762333 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00111de90 2 D0713 00:00:26.788606 762333 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:26.793579 762333 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:26.793751 762333 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00111de90 3 D0713 00:00:26.793941 762333 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:26.813848 762333 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:26.813929 762333 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00111de90 4 D0713 00:00:26.814067 762333 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:26.817003 762333 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:26.817077 762333 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00111de90 5 D0713 00:00:26.817258 762333 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:26.817619 762333 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b214:sysno 13 D0713 00:00:26.817667 762333 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00111de90 6 D0713 00:00:26.817781 762333 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:26.838041 762333 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:26.838127 762333 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00111de90 7 D0713 00:00:26.838250 762333 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:26.840213 762333 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:26.840328 762333 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc00111de90 8 D0713 00:00:26.840647 762333 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:26.842357 762333 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46af76:sysno 35 D0713 00:00:26.842457 762333 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc00111de90 9 D0713 00:00:26.842679 762333 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:26.843803 762333 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:26.844008 762333 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00111de90 10 D0713 00:00:26.844973 762333 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:26.860322 762333 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46b020:sysno 39 D0713 00:00:26.860423 762333 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc00111de90 11 D0713 00:00:26.860628 762333 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:26.861272 762333 usertrap_amd64.go:212] [ 727: 728] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:26.861330 762333 usertrap_amd64.go:122] [ 727: 728] Allocate a new trap: 0xc00111de90 12 D0713 00:00:26.861508 762333 usertrap_amd64.go:225] [ 727: 728] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:26.862003 762333 task_signals.go:470] [ 727: 727] Notified of signal 23 D0713 00:00:26.863047 762333 task_signals.go:220] [ 727: 727] Signal 23: delivering to handler D0713 00:00:26.874177 762333 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46af29:sysno 293 D0713 00:00:26.874276 762333 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00111de90 13 D0713 00:00:26.874480 762333 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:26.874649 762333 task_signals.go:470] [ 727: 727] Notified of signal 23 D0713 00:00:26.875504 762333 task_signals.go:220] [ 727: 727] Signal 23: delivering to handler D0713 00:00:26.876821 762333 task_signals.go:470] [ 727: 727] Notified of signal 23 D0713 00:00:26.877094 762333 task_signals.go:220] [ 727: 727] Signal 23: delivering to handler D0713 00:00:26.891183 762333 task_signals.go:470] [ 727: 727] Notified of signal 23 D0713 00:00:26.893094 762333 task_signals.go:220] [ 727: 727] Signal 23: delivering to handler D0713 00:00:26.899804 762333 usertrap_amd64.go:212] [ 727: 727] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:26.899866 762333 usertrap_amd64.go:122] [ 727: 727] Allocate a new trap: 0xc00111de90 14 D0713 00:00:26.899988 762333 usertrap_amd64.go:225] [ 727: 727] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:26.900469 762333 task_exit.go:204] [ 727: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.901002 762333 task_signals.go:204] [ 727: 729] Signal 727, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.901203 762333 task_signals.go:204] [ 727: 731] Signal 727, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.901264 762333 task_exit.go:204] [ 727: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.901523 762333 task_exit.go:204] [ 727: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.901783 762333 task_signals.go:204] [ 727: 728] Signal 727, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.901827 762333 task_signals.go:204] [ 727: 732] Signal 727, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.901858 762333 task_signals.go:204] [ 727: 730] Signal 727, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.901996 762333 task_exit.go:204] [ 727: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.902667 762333 task_exit.go:204] [ 727: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.902840 762333 task_exit.go:204] [ 727: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.903031 762333 task_exit.go:204] [ 727: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.903887 762333 task_exit.go:204] [ 727: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.903955 762333 task_exit.go:204] [ 727: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.904299 762333 task_exit.go:204] [ 727: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.904374 762333 task_exit.go:204] [ 727: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.904499 762333 task_exit.go:204] [ 727: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.904569 762333 task_exit.go:204] [ 727: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.904786 762333 task_exit.go:204] [ 727: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.904836 762333 task_exit.go:204] [ 727: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.926510 762333 task_exit.go:204] [ 727: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.926583 762333 task_exit.go:204] [ 727: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.926781 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:26.927105 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:26.927176 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:26.929445 762333 task_exit.go:204] [ 727: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.936163 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.937386 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:26.959206 762333 syscalls.go:262] [ 733: 733] Allocating stack with size of 8388608 bytes D0713 00:00:26.962870 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.963514 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:26.965193 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:26.965405 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:26.969066 762333 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:26.969283 762333 usertrap_amd64.go:106] [ 733: 733] Map a usertrap vma at 69000 D0713 00:00:26.970406 762333 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc000a42b40 1 D0713 00:00:26.970765 762333 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:26.973353 762333 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:26.973422 762333 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc000a42b40 2 D0713 00:00:26.973572 762333 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:26.982596 762333 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:26.982766 762333 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc000a42b40 3 D0713 00:00:26.982934 762333 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:27.006440 762333 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:27.006544 762333 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc000a42b40 4 D0713 00:00:27.006756 762333 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:27.009986 762333 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:27.010060 762333 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc000a42b40 5 D0713 00:00:27.010207 762333 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:27.011140 762333 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b214:sysno 13 D0713 00:00:27.011230 762333 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc000a42b40 6 D0713 00:00:27.011367 762333 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:27.031694 762333 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:27.031787 762333 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc000a42b40 7 D0713 00:00:27.031980 762333 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:27.033763 762333 usertrap_amd64.go:212] [ 733: 734] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:27.033842 762333 usertrap_amd64.go:122] [ 733: 734] Allocate a new trap: 0xc000a42b40 8 D0713 00:00:27.034028 762333 usertrap_amd64.go:225] [ 733: 734] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:27.036229 762333 usertrap_amd64.go:212] [ 733: 734] Found the pattern at ip 46af76:sysno 35 D0713 00:00:27.036342 762333 usertrap_amd64.go:122] [ 733: 734] Allocate a new trap: 0xc000a42b40 9 D0713 00:00:27.037534 762333 usertrap_amd64.go:225] [ 733: 734] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:27.038144 762333 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:27.038278 762333 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc000a42b40 10 D0713 00:00:27.038507 762333 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:27.050262 762333 usertrap_amd64.go:212] [ 733: 734] Found the pattern at ip 46b020:sysno 39 D0713 00:00:27.050348 762333 usertrap_amd64.go:122] [ 733: 734] Allocate a new trap: 0xc000a42b40 11 D0713 00:00:27.050551 762333 usertrap_amd64.go:225] [ 733: 734] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:27.050999 762333 usertrap_amd64.go:212] [ 733: 734] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:27.051054 762333 usertrap_amd64.go:122] [ 733: 734] Allocate a new trap: 0xc000a42b40 12 D0713 00:00:27.051188 762333 usertrap_amd64.go:225] [ 733: 734] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:27.052369 762333 task_signals.go:470] [ 733: 733] Notified of signal 23 D0713 00:00:27.053009 762333 task_signals.go:220] [ 733: 733] Signal 23: delivering to handler D0713 00:00:27.060414 762333 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46af29:sysno 293 D0713 00:00:27.060487 762333 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc000a42b40 13 D0713 00:00:27.060641 762333 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:27.066206 762333 task_signals.go:470] [ 733: 733] Notified of signal 23 D0713 00:00:27.069072 762333 task_signals.go:220] [ 733: 733] Signal 23: delivering to handler D0713 00:00:27.082075 762333 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:27.082145 762333 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc000a42b40 14 D0713 00:00:27.082267 762333 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:27.082625 762333 task_exit.go:204] [ 733: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.083096 762333 task_signals.go:204] [ 733: 734] Signal 733, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.083424 762333 task_exit.go:204] [ 733: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.083602 762333 task_signals.go:204] [ 733: 735] Signal 733, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.083624 762333 task_signals.go:204] [ 733: 737] Signal 733, PID: 737, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.083754 762333 task_signals.go:204] [ 733: 736] Signal 733, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.083799 762333 task_exit.go:204] [ 733: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.084128 762333 task_exit.go:204] [ 733: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.084636 762333 task_exit.go:204] [ 733: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.084700 762333 task_exit.go:204] [ 733: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.084915 762333 task_exit.go:204] [ 733: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.085166 762333 task_exit.go:204] [ 733: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.086186 762333 task_exit.go:204] [ 733: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.086261 762333 task_exit.go:204] [ 733: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.086523 762333 task_exit.go:204] [ 733: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.086602 762333 task_exit.go:204] [ 733: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.111432 762333 task_exit.go:204] [ 733: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.111600 762333 task_exit.go:204] [ 733: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.112102 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:27.112485 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:27.112635 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:27.114355 762333 task_exit.go:204] [ 733: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.121064 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.122446 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:27.140193 762333 syscalls.go:262] [ 738: 738] Allocating stack with size of 8388608 bytes D0713 00:00:27.143048 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.143831 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:27.148721 762333 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:27.148861 762333 usertrap_amd64.go:106] [ 738: 738] Map a usertrap vma at 69000 D0713 00:00:27.149708 762333 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc000bea150 1 D0713 00:00:27.149958 762333 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:27.151709 762333 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:27.151776 762333 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc000bea150 2 D0713 00:00:27.151900 762333 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:27.154743 762333 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:27.154813 762333 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc000bea150 3 D0713 00:00:27.154937 762333 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:27.175783 762333 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:27.175901 762333 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc000bea150 4 D0713 00:00:27.176117 762333 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:27.179326 762333 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:27.179407 762333 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc000bea150 5 D0713 00:00:27.179545 762333 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:27.179960 762333 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46b214:sysno 13 D0713 00:00:27.180030 762333 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc000bea150 6 D0713 00:00:27.180159 762333 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:27.201635 762333 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:27.201728 762333 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc000bea150 7 D0713 00:00:27.201935 762333 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:27.203604 762333 usertrap_amd64.go:212] [ 738: 739] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:27.203702 762333 usertrap_amd64.go:122] [ 738: 739] Allocate a new trap: 0xc000bea150 8 D0713 00:00:27.203991 762333 usertrap_amd64.go:225] [ 738: 739] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:27.207397 762333 usertrap_amd64.go:212] [ 738: 739] Found the pattern at ip 46af76:sysno 35 D0713 00:00:27.207600 762333 usertrap_amd64.go:122] [ 738: 739] Allocate a new trap: 0xc000bea150 9 D0713 00:00:27.208643 762333 usertrap_amd64.go:225] [ 738: 739] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:27.209136 762333 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:27.209216 762333 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc000bea150 10 D0713 00:00:27.209396 762333 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:27.222312 762333 usertrap_amd64.go:212] [ 738: 739] Found the pattern at ip 46b020:sysno 39 D0713 00:00:27.222403 762333 usertrap_amd64.go:122] [ 738: 739] Allocate a new trap: 0xc000bea150 11 D0713 00:00:27.222598 762333 usertrap_amd64.go:225] [ 738: 739] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:27.224794 762333 usertrap_amd64.go:212] [ 738: 739] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:27.224894 762333 usertrap_amd64.go:122] [ 738: 739] Allocate a new trap: 0xc000bea150 12 D0713 00:00:27.225117 762333 usertrap_amd64.go:225] [ 738: 739] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:27.225616 762333 task_signals.go:470] [ 738: 738] Notified of signal 23 D0713 00:00:27.226281 762333 task_signals.go:220] [ 738: 738] Signal 23: delivering to handler D0713 00:00:27.227456 762333 task_signals.go:470] [ 738: 738] Notified of signal 23 D0713 00:00:27.227696 762333 task_signals.go:179] [ 738: 738] Restarting syscall 202: interrupted by signal 23 D0713 00:00:27.227758 762333 task_signals.go:220] [ 738: 738] Signal 23: delivering to handler D0713 00:00:27.234258 762333 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46af29:sysno 293 D0713 00:00:27.234346 762333 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc000bea150 13 D0713 00:00:27.234452 762333 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:27.240800 762333 task_signals.go:470] [ 738: 738] Notified of signal 23 D0713 00:00:27.242277 762333 task_signals.go:220] [ 738: 738] Signal 23: delivering to handler D0713 00:00:27.258506 762333 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:27.258595 762333 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc000bea150 14 D0713 00:00:27.258756 762333 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:27.259197 762333 task_exit.go:204] [ 738: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.259700 762333 task_signals.go:204] [ 738: 739] Signal 738, PID: 739, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.259820 762333 task_signals.go:204] [ 738: 742] Signal 738, PID: 742, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.260011 762333 task_signals.go:204] [ 738: 740] Signal 738, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.260152 762333 task_exit.go:204] [ 738: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.260454 762333 task_signals.go:204] [ 738: 741] Signal 738, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.260518 762333 task_exit.go:204] [ 738: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.260767 762333 task_signals.go:204] [ 738: 743] Signal 738, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.260847 762333 task_exit.go:204] [ 738: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.261307 762333 task_exit.go:204] [ 738: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.261840 762333 task_exit.go:204] [ 738: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.262531 762333 task_exit.go:204] [ 738: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.263074 762333 task_exit.go:204] [ 738: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.263174 762333 task_exit.go:204] [ 738: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.263413 762333 task_exit.go:204] [ 738: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.263472 762333 task_exit.go:204] [ 738: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.263677 762333 task_exit.go:204] [ 738: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.263732 762333 task_exit.go:204] [ 738: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.263954 762333 task_exit.go:204] [ 738: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.264056 762333 task_exit.go:204] [ 738: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.288498 762333 task_exit.go:204] [ 738: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.288607 762333 task_exit.go:204] [ 738: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.288836 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:27.289225 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:27.289296 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:27.291269 762333 task_exit.go:204] [ 738: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.298833 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.299773 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:27.324360 762333 syscalls.go:262] [ 744: 744] Allocating stack with size of 8388608 bytes D0713 00:00:27.327896 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.328597 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:27.329986 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:27.330386 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:27.333367 762333 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:27.333527 762333 usertrap_amd64.go:106] [ 744: 744] Map a usertrap vma at 60000 D0713 00:00:27.334613 762333 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0009ae690 1 D0713 00:00:27.334982 762333 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:27.337327 762333 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:27.337402 762333 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0009ae690 2 D0713 00:00:27.337546 762333 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:27.340573 762333 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:27.340630 762333 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0009ae690 3 D0713 00:00:27.340754 762333 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:27.359385 762333 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:27.359462 762333 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0009ae690 4 D0713 00:00:27.359582 762333 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:27.362834 762333 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:27.362915 762333 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0009ae690 5 D0713 00:00:27.363111 762333 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:27.363579 762333 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b214:sysno 13 D0713 00:00:27.363643 762333 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0009ae690 6 D0713 00:00:27.363808 762333 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:27.386778 762333 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:27.386849 762333 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0009ae690 7 D0713 00:00:27.386973 762333 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:27.388326 762333 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:27.388385 762333 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0009ae690 8 D0713 00:00:27.388528 762333 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:27.390161 762333 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46af76:sysno 35 D0713 00:00:27.390225 762333 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0009ae690 9 D0713 00:00:27.390410 762333 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:27.391293 762333 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:27.391387 762333 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0009ae690 10 D0713 00:00:27.392537 762333 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:27.406388 762333 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b020:sysno 39 D0713 00:00:27.406470 762333 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0009ae690 11 D0713 00:00:27.406731 762333 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:27.407149 762333 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:27.407197 762333 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0009ae690 12 D0713 00:00:27.407314 762333 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:27.408726 762333 task_signals.go:470] [ 744: 744] Notified of signal 23 D0713 00:00:27.409248 762333 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler D0713 00:00:27.418242 762333 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46af29:sysno 293 D0713 00:00:27.418324 762333 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0009ae690 13 D0713 00:00:27.418524 762333 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:27.425267 762333 task_signals.go:470] [ 744: 744] Notified of signal 23 D0713 00:00:27.426874 762333 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler I0713 00:00:27.441821 762333 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0713 00:00:27.442091 762333 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:27.442173 762333 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0009ae690 14 D0713 00:00:27.442348 762333 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:27.442795 762333 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.443247 762333 task_signals.go:204] [ 744: 746] Signal 744, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.443258 762333 task_signals.go:204] [ 744: 749] Signal 744, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.443272 762333 task_signals.go:204] [ 744: 748] Signal 744, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.443466 762333 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.443738 762333 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.443903 762333 task_signals.go:204] [ 744: 747] Signal 744, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.443947 762333 task_signals.go:204] [ 744: 745] Signal 744, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.444527 762333 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.444797 762333 task_exit.go:204] [ 744: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.445245 762333 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.445565 762333 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.445827 762333 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.445924 762333 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.447248 762333 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.447350 762333 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.447659 762333 task_exit.go:204] [ 744: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.447773 762333 task_exit.go:204] [ 744: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.447970 762333 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.448020 762333 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.470457 762333 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.470547 762333 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.470736 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:27.470990 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:27.471044 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:27.472606 762333 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.479503 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.481463 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:27.501782 762333 syscalls.go:262] [ 750: 750] Allocating stack with size of 8388608 bytes D0713 00:00:27.505430 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.506018 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:27.511137 762333 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:27.511328 762333 usertrap_amd64.go:106] [ 750: 750] Map a usertrap vma at 61000 D0713 00:00:27.512303 762333 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000b0d740 1 D0713 00:00:27.512629 762333 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:27.515348 762333 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:27.515429 762333 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000b0d740 2 D0713 00:00:27.515558 762333 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:27.518985 762333 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:27.519063 762333 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000b0d740 3 D0713 00:00:27.519213 762333 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:27.540350 762333 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:27.540459 762333 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000b0d740 4 D0713 00:00:27.540616 762333 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:27.543763 762333 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:27.543827 762333 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000b0d740 5 D0713 00:00:27.544012 762333 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:27.544478 762333 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b214:sysno 13 D0713 00:00:27.544535 762333 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000b0d740 6 D0713 00:00:27.544684 762333 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:27.567126 762333 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:27.567210 762333 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000b0d740 7 D0713 00:00:27.567371 762333 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:27.569224 762333 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:27.569294 762333 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc000b0d740 8 D0713 00:00:27.569491 762333 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:27.571412 762333 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46af76:sysno 35 D0713 00:00:27.571486 762333 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc000b0d740 9 D0713 00:00:27.571673 762333 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:27.572636 762333 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:27.572721 762333 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000b0d740 10 D0713 00:00:27.573374 762333 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:27.584523 762333 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b020:sysno 39 D0713 00:00:27.584621 762333 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc000b0d740 11 D0713 00:00:27.584896 762333 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:27.586618 762333 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:27.586682 762333 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc000b0d740 12 D0713 00:00:27.586849 762333 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:27.587300 762333 task_signals.go:470] [ 750: 750] Notified of signal 23 D0713 00:00:27.587583 762333 task_signals.go:220] [ 750: 750] Signal 23: delivering to handler D0713 00:00:27.594433 762333 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46af29:sysno 293 D0713 00:00:27.594506 762333 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000b0d740 13 D0713 00:00:27.594659 762333 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:27.599602 762333 task_signals.go:470] [ 750: 750] Notified of signal 23 D0713 00:00:27.601521 762333 task_signals.go:220] [ 750: 750] Signal 23: delivering to handler D0713 00:00:27.615677 762333 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:27.615763 762333 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc000b0d740 14 D0713 00:00:27.615898 762333 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:27.616368 762333 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.616829 762333 task_signals.go:204] [ 750: 753] Signal 750, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.616826 762333 task_signals.go:204] [ 750: 754] Signal 750, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.617059 762333 task_signals.go:204] [ 750: 752] Signal 750, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.617059 762333 task_signals.go:204] [ 750: 751] Signal 750, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.617227 762333 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.617659 762333 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.618065 762333 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.618289 762333 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.618560 762333 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.619528 762333 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.619618 762333 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.619852 762333 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.619922 762333 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.620234 762333 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.620303 762333 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.643409 762333 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.643522 762333 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.643743 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:27.644023 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:27.644175 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:27.645867 762333 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.652041 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.654413 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:27.674848 762333 syscalls.go:262] [ 755: 755] Allocating stack with size of 8388608 bytes D0713 00:00:27.678086 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.678579 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:27.682874 762333 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:27.683020 762333 usertrap_amd64.go:106] [ 755: 755] Map a usertrap vma at 68000 D0713 00:00:27.683799 762333 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000a42cc0 1 D0713 00:00:27.684051 762333 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:27.685812 762333 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:27.685873 762333 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000a42cc0 2 D0713 00:00:27.685991 762333 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:27.688462 762333 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:27.688524 762333 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000a42cc0 3 D0713 00:00:27.688638 762333 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:27.709594 762333 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:27.709702 762333 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000a42cc0 4 D0713 00:00:27.709900 762333 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:27.712896 762333 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:27.712981 762333 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000a42cc0 5 D0713 00:00:27.713168 762333 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:27.713539 762333 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b214:sysno 13 D0713 00:00:27.713590 762333 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000a42cc0 6 D0713 00:00:27.713698 762333 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:27.735719 762333 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:27.735795 762333 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000a42cc0 7 D0713 00:00:27.735917 762333 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:27.737343 762333 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:27.737417 762333 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc000a42cc0 8 D0713 00:00:27.737683 762333 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:27.739278 762333 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46af76:sysno 35 D0713 00:00:27.739329 762333 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc000a42cc0 9 D0713 00:00:27.739534 762333 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:27.742212 762333 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:27.742284 762333 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000a42cc0 10 D0713 00:00:27.742496 762333 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:27.746071 762333 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b020:sysno 39 D0713 00:00:27.746187 762333 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc000a42cc0 11 D0713 00:00:27.746464 762333 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:27.747096 762333 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:27.747178 762333 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc000a42cc0 12 D0713 00:00:27.747942 762333 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:27.748738 762333 task_signals.go:470] [ 755: 755] Notified of signal 23 D0713 00:00:27.749427 762333 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler D0713 00:00:27.760071 762333 task_signals.go:470] [ 755: 755] Notified of signal 23 D0713 00:00:27.760299 762333 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler D0713 00:00:27.761596 762333 task_signals.go:470] [ 755: 755] Notified of signal 23 D0713 00:00:27.761859 762333 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler D0713 00:00:27.762981 762333 task_signals.go:470] [ 755: 755] Notified of signal 23 D0713 00:00:27.763371 762333 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler D0713 00:00:27.772331 762333 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46af29:sysno 293 D0713 00:00:27.772445 762333 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000a42cc0 13 D0713 00:00:27.772652 762333 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:27.778054 762333 task_signals.go:470] [ 755: 755] Notified of signal 23 D0713 00:00:27.778358 762333 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler D0713 00:00:27.793488 762333 task_signals.go:470] [ 755: 755] Notified of signal 23 D0713 00:00:27.793867 762333 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler I0713 00:00:27.801047 762333 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0713 00:00:27.801334 762333 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:27.801405 762333 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc000a42cc0 14 D0713 00:00:27.801538 762333 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:27.801930 762333 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.802273 762333 task_signals.go:204] [ 755: 758] Signal 755, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.802587 762333 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.802824 762333 task_signals.go:204] [ 755: 759] Signal 755, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.802833 762333 task_signals.go:204] [ 755: 757] Signal 755, PID: 757, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.802979 762333 task_signals.go:204] [ 755: 756] Signal 755, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.803039 762333 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.803322 762333 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.803750 762333 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.804586 762333 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.804929 762333 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.805064 762333 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.805299 762333 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.805388 762333 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.805642 762333 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.805726 762333 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.829726 762333 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.829808 762333 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.830041 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:27.830339 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:27.830403 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:27.832220 762333 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.840085 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.840911 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:27.859993 762333 syscalls.go:262] [ 760: 760] Allocating stack with size of 8388608 bytes D0713 00:00:27.862999 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.863642 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:27.868284 762333 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:27.868447 762333 usertrap_amd64.go:106] [ 760: 760] Map a usertrap vma at 6a000 D0713 00:00:27.869315 762333 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000a42ed0 1 D0713 00:00:27.869572 762333 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:27.871459 762333 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:27.871518 762333 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000a42ed0 2 D0713 00:00:27.871622 762333 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:27.874056 762333 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:27.874124 762333 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000a42ed0 3 D0713 00:00:27.874250 762333 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:27.895450 762333 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:27.895549 762333 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000a42ed0 4 D0713 00:00:27.895715 762333 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:27.900595 762333 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:27.900699 762333 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000a42ed0 5 D0713 00:00:27.900858 762333 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:27.901353 762333 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b214:sysno 13 D0713 00:00:27.901406 762333 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000a42ed0 6 D0713 00:00:27.901560 762333 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:27.920614 762333 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:27.920711 762333 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000a42ed0 7 D0713 00:00:27.920896 762333 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:27.922779 762333 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:27.922847 762333 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc000a42ed0 8 D0713 00:00:27.923026 762333 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:27.925096 762333 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46af76:sysno 35 D0713 00:00:27.925185 762333 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc000a42ed0 9 D0713 00:00:27.925445 762333 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:27.926799 762333 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:27.926896 762333 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000a42ed0 10 D0713 00:00:27.928022 762333 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:27.940142 762333 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b020:sysno 39 D0713 00:00:27.940210 762333 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc000a42ed0 11 D0713 00:00:27.940477 762333 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:27.941101 762333 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:27.941167 762333 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc000a42ed0 12 D0713 00:00:27.941313 762333 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:27.941785 762333 task_signals.go:470] [ 760: 760] Notified of signal 23 D0713 00:00:27.942045 762333 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler D0713 00:00:27.952764 762333 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46af29:sysno 293 D0713 00:00:27.952841 762333 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000a42ed0 13 D0713 00:00:27.953019 762333 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:27.957387 762333 task_signals.go:470] [ 760: 760] Notified of signal 23 D0713 00:00:27.957737 762333 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler D0713 00:00:27.972607 762333 task_signals.go:470] [ 760: 760] Notified of signal 23 D0713 00:00:27.972867 762333 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler D0713 00:00:27.979097 762333 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:27.979202 762333 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000a42ed0 14 D0713 00:00:27.979379 762333 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:27.979897 762333 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.980319 762333 task_signals.go:204] [ 760: 764] Signal 760, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.980406 762333 task_signals.go:204] [ 760: 763] Signal 760, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.980705 762333 task_signals.go:204] [ 760: 762] Signal 760, PID: 762, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.980823 762333 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.981011 762333 task_signals.go:204] [ 760: 761] Signal 760, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.981125 762333 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.981426 762333 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.981617 762333 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.982857 762333 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.983099 762333 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.983170 762333 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.983433 762333 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.983486 762333 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.983758 762333 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.983837 762333 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.004754 762333 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.004839 762333 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.007250 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:28.007689 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:28.007773 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:28.009642 762333 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.020282 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:28.020780 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:28.025890 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.032142 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:28.047651 762333 syscalls.go:262] [ 765: 765] Allocating stack with size of 8388608 bytes D0713 00:00:28.050921 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.051549 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:28.055600 762333 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:28.055886 762333 usertrap_amd64.go:106] [ 765: 765] Map a usertrap vma at 66000 D0713 00:00:28.057408 762333 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000b0db30 1 D0713 00:00:28.057843 762333 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:28.060354 762333 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:28.060407 762333 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000b0db30 2 D0713 00:00:28.060623 762333 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:28.064483 762333 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:28.064574 762333 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000b0db30 3 D0713 00:00:28.064868 762333 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:28.089274 762333 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:28.089366 762333 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000b0db30 4 D0713 00:00:28.089601 762333 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:28.092808 762333 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:28.092878 762333 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000b0db30 5 D0713 00:00:28.093076 762333 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:28.093599 762333 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b214:sysno 13 D0713 00:00:28.093664 762333 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000b0db30 6 D0713 00:00:28.093853 762333 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:28.119962 762333 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:28.120048 762333 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000b0db30 7 D0713 00:00:28.120206 762333 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:28.122124 762333 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:28.122288 762333 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc000b0db30 8 D0713 00:00:28.122700 762333 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:28.124781 762333 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46af76:sysno 35 D0713 00:00:28.124850 762333 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc000b0db30 9 D0713 00:00:28.125174 762333 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:28.126307 762333 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:28.126407 762333 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000b0db30 10 D0713 00:00:28.127381 762333 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:28.128441 762333 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b020:sysno 39 D0713 00:00:28.128543 762333 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc000b0db30 11 D0713 00:00:28.128936 762333 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:28.129759 762333 usertrap_amd64.go:212] [ 765: 766] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:28.129891 762333 usertrap_amd64.go:122] [ 765: 766] Allocate a new trap: 0xc000b0db30 12 D0713 00:00:28.130135 762333 usertrap_amd64.go:225] [ 765: 766] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:28.130696 762333 task_signals.go:470] [ 765: 768] Notified of signal 23 D0713 00:00:28.131009 762333 task_signals.go:179] [ 765: 768] Restarting syscall 202: interrupted by signal 23 D0713 00:00:28.131106 762333 task_signals.go:220] [ 765: 768] Signal 23: delivering to handler D0713 00:00:28.142006 762333 task_signals.go:470] [ 765: 765] Notified of signal 23 D0713 00:00:28.142519 762333 task_signals.go:220] [ 765: 765] Signal 23: delivering to handler D0713 00:00:28.143493 762333 task_signals.go:481] [ 765: 765] No task notified of signal 23 D0713 00:00:28.143789 762333 task_signals.go:220] [ 765: 765] Signal 23: delivering to handler D0713 00:00:28.144861 762333 task_signals.go:470] [ 765: 765] Notified of signal 23 D0713 00:00:28.145151 762333 task_signals.go:220] [ 765: 765] Signal 23: delivering to handler D0713 00:00:28.146196 762333 task_signals.go:470] [ 765: 765] Notified of signal 23 D0713 00:00:28.146421 762333 task_signals.go:220] [ 765: 765] Signal 23: delivering to handler D0713 00:00:28.154104 762333 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46af29:sysno 293 D0713 00:00:28.154190 762333 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000b0db30 13 D0713 00:00:28.154323 762333 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:28.158865 762333 task_signals.go:470] [ 765: 765] Notified of signal 23 D0713 00:00:28.159118 762333 task_signals.go:220] [ 765: 765] Signal 23: delivering to handler D0713 00:00:28.172346 762333 task_signals.go:470] [ 765: 765] Notified of signal 23 D0713 00:00:28.175220 762333 task_signals.go:220] [ 765: 765] Signal 23: delivering to handler I0713 00:00:28.177147 762333 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0713 00:00:28.177414 762333 usertrap_amd64.go:212] [ 765: 765] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:28.177494 762333 usertrap_amd64.go:122] [ 765: 765] Allocate a new trap: 0xc000b0db30 14 D0713 00:00:28.177620 762333 usertrap_amd64.go:225] [ 765: 765] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:28.178026 762333 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.178549 762333 task_signals.go:204] [ 765: 766] Signal 765, PID: 766, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.178777 762333 task_signals.go:204] [ 765: 767] Signal 765, PID: 767, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.178972 762333 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.179228 762333 task_signals.go:204] [ 765: 768] Signal 765, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.179402 762333 task_signals.go:204] [ 765: 769] Signal 765, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.179567 762333 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.179960 762333 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.180128 762333 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.180268 762333 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.181433 762333 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.181578 762333 task_exit.go:204] [ 765: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.181836 762333 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.181922 762333 task_exit.go:204] [ 765: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.182112 762333 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.182184 762333 task_exit.go:204] [ 765: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.202843 762333 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.202939 762333 task_exit.go:204] [ 765: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.203144 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:28.203472 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:28.203545 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:28.205146 762333 task_exit.go:204] [ 765: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.211318 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.213693 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:28.230827 762333 syscalls.go:262] [ 770: 770] Allocating stack with size of 8388608 bytes D0713 00:00:28.233536 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.234018 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:28.237236 762333 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:28.237404 762333 usertrap_amd64.go:106] [ 770: 770] Map a usertrap vma at 61000 D0713 00:00:28.238264 762333 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000049a70 1 D0713 00:00:28.238573 762333 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:28.240464 762333 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:28.240534 762333 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000049a70 2 D0713 00:00:28.240647 762333 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:28.243260 762333 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:28.243337 762333 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000049a70 3 D0713 00:00:28.243441 762333 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:28.263996 762333 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:28.264094 762333 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000049a70 4 D0713 00:00:28.264254 762333 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:28.267109 762333 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:28.267168 762333 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000049a70 5 D0713 00:00:28.267313 762333 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:28.267629 762333 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b214:sysno 13 D0713 00:00:28.267674 762333 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000049a70 6 D0713 00:00:28.267790 762333 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:28.286180 762333 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:28.286251 762333 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000049a70 7 D0713 00:00:28.286424 762333 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:28.287813 762333 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:28.287865 762333 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000049a70 8 D0713 00:00:28.288029 762333 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:28.289349 762333 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46af76:sysno 35 D0713 00:00:28.289406 762333 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000049a70 9 D0713 00:00:28.289608 762333 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:28.290649 762333 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:28.290734 762333 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000049a70 10 D0713 00:00:28.291472 762333 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:28.303518 762333 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b020:sysno 39 D0713 00:00:28.303580 762333 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000049a70 11 D0713 00:00:28.304186 762333 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:28.304521 762333 usertrap_amd64.go:212] [ 770: 771] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:28.304562 762333 usertrap_amd64.go:122] [ 770: 771] Allocate a new trap: 0xc000049a70 12 D0713 00:00:28.304681 762333 usertrap_amd64.go:225] [ 770: 771] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:28.305219 762333 task_signals.go:470] [ 770: 770] Notified of signal 23 D0713 00:00:28.305435 762333 task_signals.go:220] [ 770: 770] Signal 23: delivering to handler D0713 00:00:28.310948 762333 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46af29:sysno 293 D0713 00:00:28.311001 762333 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000049a70 13 D0713 00:00:28.311155 762333 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:28.317847 762333 task_signals.go:470] [ 770: 770] Notified of signal 23 D0713 00:00:28.318273 762333 task_signals.go:220] [ 770: 770] Signal 23: delivering to handler D0713 00:00:28.325942 762333 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:28.326016 762333 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000049a70 14 D0713 00:00:28.326192 762333 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46b6e0 trap addr 61460 ([184 24 0 0 0 15 5] -> [255 36 37 96 20 6 0]) I0713 00:00:28.333225 762333 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0713 00:00:28.333521 762333 usertrap_amd64.go:212] [ 770: 770] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:28.333591 762333 usertrap_amd64.go:122] [ 770: 770] Allocate a new trap: 0xc000049a70 15 D0713 00:00:28.333775 762333 usertrap_amd64.go:225] [ 770: 770] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 00:00:28.334276 762333 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.334538 762333 task_signals.go:204] [ 770: 773] Signal 770, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.334587 762333 task_signals.go:204] [ 770: 771] Signal 770, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.334778 762333 task_signals.go:204] [ 770: 772] Signal 770, PID: 772, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.334918 762333 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.335065 762333 task_signals.go:204] [ 770: 774] Signal 770, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.335212 762333 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.335404 762333 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.335568 762333 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.335843 762333 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.336666 762333 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.336749 762333 task_exit.go:204] [ 770: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.337052 762333 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.337146 762333 task_exit.go:204] [ 770: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.337389 762333 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.337446 762333 task_exit.go:204] [ 770: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.355194 762333 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.355307 762333 task_exit.go:204] [ 770: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.355501 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:28.355743 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:28.355813 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:28.357349 762333 task_exit.go:204] [ 770: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.363892 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.365740 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:28.383121 762333 syscalls.go:262] [ 775: 775] Allocating stack with size of 8388608 bytes D0713 00:00:28.386119 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.386600 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:28.390262 762333 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:28.390410 762333 usertrap_amd64.go:106] [ 775: 775] Map a usertrap vma at 60000 D0713 00:00:28.391145 762333 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0004f52c0 1 D0713 00:00:28.391405 762333 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:28.393430 762333 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:28.393492 762333 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0004f52c0 2 D0713 00:00:28.393674 762333 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:28.396758 762333 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:28.396817 762333 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0004f52c0 3 D0713 00:00:28.396976 762333 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:28.418941 762333 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:28.419012 762333 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0004f52c0 4 D0713 00:00:28.419139 762333 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:28.422154 762333 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:28.422265 762333 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0004f52c0 5 D0713 00:00:28.422499 762333 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:28.423090 762333 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b214:sysno 13 D0713 00:00:28.423151 762333 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0004f52c0 6 D0713 00:00:28.423304 762333 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:28.449112 762333 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:28.449180 762333 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0004f52c0 7 D0713 00:00:28.449340 762333 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:28.450794 762333 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:28.450857 762333 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc0004f52c0 8 D0713 00:00:28.451053 762333 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:28.452209 762333 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46af76:sysno 35 D0713 00:00:28.452287 762333 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc0004f52c0 9 D0713 00:00:28.452470 762333 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:28.454226 762333 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:28.454299 762333 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0004f52c0 10 D0713 00:00:28.454487 762333 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:28.465979 762333 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b020:sysno 39 D0713 00:00:28.466063 762333 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc0004f52c0 11 D0713 00:00:28.466220 762333 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:28.467766 762333 usertrap_amd64.go:212] [ 775: 776] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:28.467880 762333 usertrap_amd64.go:122] [ 775: 776] Allocate a new trap: 0xc0004f52c0 12 D0713 00:00:28.468043 762333 usertrap_amd64.go:225] [ 775: 776] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:28.468517 762333 task_signals.go:470] [ 775: 775] Notified of signal 23 D0713 00:00:28.468754 762333 task_signals.go:220] [ 775: 775] Signal 23: delivering to handler D0713 00:00:28.475323 762333 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46af29:sysno 293 D0713 00:00:28.475420 762333 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0004f52c0 13 D0713 00:00:28.475575 762333 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:28.482080 762333 task_signals.go:470] [ 775: 775] Notified of signal 23 D0713 00:00:28.482756 762333 task_signals.go:220] [ 775: 775] Signal 23: delivering to handler D0713 00:00:28.497722 762333 usertrap_amd64.go:212] [ 775: 775] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:28.497817 762333 usertrap_amd64.go:122] [ 775: 775] Allocate a new trap: 0xc0004f52c0 14 D0713 00:00:28.497962 762333 usertrap_amd64.go:225] [ 775: 775] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:28.498351 762333 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.498697 762333 task_signals.go:204] [ 775: 778] Signal 775, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.498951 762333 task_signals.go:204] [ 775: 777] Signal 775, PID: 777, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.499022 762333 task_signals.go:204] [ 775: 776] Signal 775, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.499077 762333 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.499110 762333 task_signals.go:204] [ 775: 779] Signal 775, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.499229 762333 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.499450 762333 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.499730 762333 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.500138 762333 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.500216 762333 task_exit.go:204] [ 775: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.500571 762333 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.501120 762333 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.501202 762333 task_exit.go:204] [ 775: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.501547 762333 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.501606 762333 task_exit.go:204] [ 775: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.521818 762333 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.521884 762333 task_exit.go:204] [ 775: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.522060 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:28.522249 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:28.522310 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:28.524062 762333 task_exit.go:204] [ 775: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.531452 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.532711 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:28.551406 762333 syscalls.go:262] [ 780: 780] Allocating stack with size of 8388608 bytes D0713 00:00:28.554822 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.555263 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:28.559714 762333 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:28.559899 762333 usertrap_amd64.go:106] [ 780: 780] Map a usertrap vma at 6a000 D0713 00:00:28.560856 762333 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0004f5410 1 D0713 00:00:28.561171 762333 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:28.563235 762333 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:28.563310 762333 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0004f5410 2 D0713 00:00:28.563470 762333 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:28.566382 762333 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:28.566435 762333 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0004f5410 3 D0713 00:00:28.566584 762333 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:28.587799 762333 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:28.587895 762333 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0004f5410 4 D0713 00:00:28.588103 762333 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:28.591233 762333 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:28.591299 762333 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0004f5410 5 D0713 00:00:28.591501 762333 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:28.591886 762333 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b214:sysno 13 D0713 00:00:28.591953 762333 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0004f5410 6 D0713 00:00:28.592072 762333 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:28.612643 762333 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:28.612715 762333 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0004f5410 7 D0713 00:00:28.612849 762333 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:28.614891 762333 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:28.615142 762333 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc0004f5410 8 D0713 00:00:28.615478 762333 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:28.618684 762333 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46af76:sysno 35 D0713 00:00:28.618817 762333 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc0004f5410 9 D0713 00:00:28.619157 762333 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:28.619947 762333 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:28.620033 762333 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0004f5410 10 D0713 00:00:28.620307 762333 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:28.633860 762333 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b020:sysno 39 D0713 00:00:28.633987 762333 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc0004f5410 11 D0713 00:00:28.634276 762333 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:28.634964 762333 usertrap_amd64.go:212] [ 780: 781] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:28.635038 762333 usertrap_amd64.go:122] [ 780: 781] Allocate a new trap: 0xc0004f5410 12 D0713 00:00:28.636612 762333 usertrap_amd64.go:225] [ 780: 781] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:28.637812 762333 task_signals.go:470] [ 780: 780] Notified of signal 23 D0713 00:00:28.638813 762333 task_signals.go:220] [ 780: 780] Signal 23: delivering to handler D0713 00:00:28.646017 762333 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46af29:sysno 293 D0713 00:00:28.646088 762333 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0004f5410 13 D0713 00:00:28.646247 762333 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:28.652139 762333 task_signals.go:470] [ 780: 780] Notified of signal 23 D0713 00:00:28.653966 762333 task_signals.go:220] [ 780: 780] Signal 23: delivering to handler D0713 00:00:28.670498 762333 usertrap_amd64.go:212] [ 780: 780] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:28.670611 762333 usertrap_amd64.go:122] [ 780: 780] Allocate a new trap: 0xc0004f5410 14 D0713 00:00:28.670799 762333 usertrap_amd64.go:225] [ 780: 780] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:28.671380 762333 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.671789 762333 task_signals.go:204] [ 780: 782] Signal 780, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.672090 762333 task_signals.go:204] [ 780: 784] Signal 780, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.672157 762333 task_signals.go:204] [ 780: 781] Signal 780, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.672440 762333 task_signals.go:204] [ 780: 783] Signal 780, PID: 783, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.672594 762333 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.672899 762333 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.673100 762333 task_signals.go:204] [ 780: 785] Signal 780, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.673231 762333 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.673400 762333 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.673612 762333 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.674114 762333 task_exit.go:204] [ 780: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.675044 762333 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.675167 762333 task_exit.go:204] [ 780: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.675490 762333 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.675595 762333 task_exit.go:204] [ 780: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.675774 762333 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.675815 762333 task_exit.go:204] [ 780: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.676004 762333 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.676065 762333 task_exit.go:204] [ 780: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.700398 762333 task_exit.go:204] [ 780: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.700481 762333 task_exit.go:204] [ 780: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.700706 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:28.700986 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:28.701068 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:28.702848 762333 task_exit.go:204] [ 780: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.710417 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.711368 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:28.729981 762333 syscalls.go:262] [ 786: 786] Allocating stack with size of 8388608 bytes D0713 00:00:28.732823 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.733474 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:28.737532 762333 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:28.737661 762333 usertrap_amd64.go:106] [ 786: 786] Map a usertrap vma at 66000 D0713 00:00:28.738482 762333 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000930540 1 D0713 00:00:28.738725 762333 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:28.741056 762333 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:28.741130 762333 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000930540 2 D0713 00:00:28.741261 762333 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:28.743785 762333 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:28.743853 762333 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000930540 3 D0713 00:00:28.743969 762333 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:28.764292 762333 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:28.764373 762333 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000930540 4 D0713 00:00:28.764531 762333 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:28.767842 762333 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:28.767903 762333 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000930540 5 D0713 00:00:28.768022 762333 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:28.768412 762333 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46b214:sysno 13 D0713 00:00:28.768469 762333 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000930540 6 D0713 00:00:28.768563 762333 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:28.793552 762333 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:28.793642 762333 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000930540 7 D0713 00:00:28.793763 762333 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:28.795485 762333 usertrap_amd64.go:212] [ 786: 787] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:28.795566 762333 usertrap_amd64.go:122] [ 786: 787] Allocate a new trap: 0xc000930540 8 D0713 00:00:28.795713 762333 usertrap_amd64.go:225] [ 786: 787] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:28.797691 762333 usertrap_amd64.go:212] [ 786: 787] Found the pattern at ip 46af76:sysno 35 D0713 00:00:28.797751 762333 usertrap_amd64.go:122] [ 786: 787] Allocate a new trap: 0xc000930540 9 D0713 00:00:28.797872 762333 usertrap_amd64.go:225] [ 786: 787] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:28.798487 762333 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:28.798578 762333 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000930540 10 D0713 00:00:28.798755 762333 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:28.811685 762333 usertrap_amd64.go:212] [ 786: 787] Found the pattern at ip 46b020:sysno 39 D0713 00:00:28.811803 762333 usertrap_amd64.go:122] [ 786: 787] Allocate a new trap: 0xc000930540 11 D0713 00:00:28.812006 762333 usertrap_amd64.go:225] [ 786: 787] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:28.812545 762333 usertrap_amd64.go:212] [ 786: 787] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:28.812604 762333 usertrap_amd64.go:122] [ 786: 787] Allocate a new trap: 0xc000930540 12 D0713 00:00:28.812741 762333 usertrap_amd64.go:225] [ 786: 787] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:28.813267 762333 task_signals.go:470] [ 786: 786] Notified of signal 23 D0713 00:00:28.813885 762333 task_signals.go:220] [ 786: 786] Signal 23: delivering to handler D0713 00:00:28.823797 762333 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46af29:sysno 293 D0713 00:00:28.823874 762333 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000930540 13 D0713 00:00:28.824003 762333 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:28.824598 762333 task_signals.go:470] [ 786: 786] Notified of signal 23 D0713 00:00:28.824876 762333 task_signals.go:220] [ 786: 786] Signal 23: delivering to handler D0713 00:00:28.843005 762333 task_signals.go:470] [ 786: 786] Notified of signal 23 D0713 00:00:28.843279 762333 task_signals.go:220] [ 786: 786] Signal 23: delivering to handler D0713 00:00:28.847635 762333 usertrap_amd64.go:212] [ 786: 786] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:28.847702 762333 usertrap_amd64.go:122] [ 786: 786] Allocate a new trap: 0xc000930540 14 D0713 00:00:28.847813 762333 usertrap_amd64.go:225] [ 786: 786] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:28.848201 762333 task_exit.go:204] [ 786: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.848593 762333 task_signals.go:204] [ 786: 787] Signal 786, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.848888 762333 task_signals.go:204] [ 786: 788] Signal 786, PID: 788, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.848874 762333 task_signals.go:204] [ 786: 789] Signal 786, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.849107 762333 task_exit.go:204] [ 786: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.849535 762333 task_signals.go:204] [ 786: 790] Signal 786, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.849836 762333 task_exit.go:204] [ 786: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.850093 762333 task_exit.go:204] [ 786: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.850584 762333 task_exit.go:204] [ 786: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.850940 762333 task_exit.go:204] [ 786: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.851040 762333 task_exit.go:204] [ 786: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.851269 762333 task_exit.go:204] [ 786: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.851328 762333 task_exit.go:204] [ 786: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.851686 762333 task_exit.go:204] [ 786: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.851883 762333 task_exit.go:204] [ 786: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.851952 762333 task_exit.go:204] [ 786: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.875990 762333 task_exit.go:204] [ 786: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.876079 762333 task_exit.go:204] [ 786: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.876339 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:28.876599 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:28.876682 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:28.878174 762333 task_exit.go:204] [ 786: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.885254 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.886279 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:28.909983 762333 syscalls.go:262] [ 791: 791] Allocating stack with size of 8388608 bytes D0713 00:00:28.913494 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.914363 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:28.918360 762333 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:28.918669 762333 usertrap_amd64.go:106] [ 791: 791] Map a usertrap vma at 67000 D0713 00:00:28.919777 762333 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000c84270 1 D0713 00:00:28.920131 762333 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:28.922274 762333 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:28.922330 762333 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000c84270 2 D0713 00:00:28.922486 762333 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:28.925567 762333 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:28.925623 762333 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000c84270 3 D0713 00:00:28.925784 762333 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:28.949975 762333 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:28.950078 762333 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000c84270 4 D0713 00:00:28.950231 762333 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:28.954106 762333 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:28.954207 762333 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000c84270 5 D0713 00:00:28.954444 762333 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:28.955046 762333 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b214:sysno 13 D0713 00:00:28.955097 762333 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000c84270 6 D0713 00:00:28.955228 762333 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:28.976817 762333 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:28.976890 762333 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000c84270 7 D0713 00:00:28.977075 762333 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:28.978814 762333 usertrap_amd64.go:212] [ 791: 792] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:28.978950 762333 usertrap_amd64.go:122] [ 791: 792] Allocate a new trap: 0xc000c84270 8 D0713 00:00:28.979201 762333 usertrap_amd64.go:225] [ 791: 792] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:28.981691 762333 usertrap_amd64.go:212] [ 791: 792] Found the pattern at ip 46af76:sysno 35 D0713 00:00:28.981775 762333 usertrap_amd64.go:122] [ 791: 792] Allocate a new trap: 0xc000c84270 9 D0713 00:00:28.982881 762333 usertrap_amd64.go:225] [ 791: 792] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:28.983436 762333 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:28.983509 762333 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000c84270 10 D0713 00:00:28.983806 762333 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:28.995858 762333 usertrap_amd64.go:212] [ 791: 792] Found the pattern at ip 46b020:sysno 39 D0713 00:00:28.995940 762333 usertrap_amd64.go:122] [ 791: 792] Allocate a new trap: 0xc000c84270 11 D0713 00:00:28.996094 762333 usertrap_amd64.go:225] [ 791: 792] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:28.996456 762333 usertrap_amd64.go:212] [ 791: 792] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:28.996511 762333 usertrap_amd64.go:122] [ 791: 792] Allocate a new trap: 0xc000c84270 12 D0713 00:00:28.996617 762333 usertrap_amd64.go:225] [ 791: 792] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:28.997023 762333 task_signals.go:470] [ 791: 791] Notified of signal 23 D0713 00:00:28.997915 762333 task_signals.go:220] [ 791: 791] Signal 23: delivering to handler D0713 00:00:28.999481 762333 task_signals.go:470] [ 791: 791] Notified of signal 23 D0713 00:00:29.000250 762333 task_signals.go:220] [ 791: 791] Signal 23: delivering to handler D0713 00:00:29.001268 762333 task_signals.go:470] [ 791: 791] Notified of signal 23 D0713 00:00:29.001514 762333 task_signals.go:220] [ 791: 791] Signal 23: delivering to handler D0713 00:00:29.002566 762333 task_signals.go:470] [ 791: 791] Notified of signal 23 D0713 00:00:29.002873 762333 task_signals.go:220] [ 791: 791] Signal 23: delivering to handler D0713 00:00:29.010067 762333 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46af29:sysno 293 D0713 00:00:29.010147 762333 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000c84270 13 D0713 00:00:29.010312 762333 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:29.017438 762333 task_signals.go:470] [ 791: 791] Notified of signal 23 D0713 00:00:29.020203 762333 task_signals.go:220] [ 791: 791] Signal 23: delivering to handler D0713 00:00:29.038559 762333 usertrap_amd64.go:212] [ 791: 791] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:29.038676 762333 usertrap_amd64.go:122] [ 791: 791] Allocate a new trap: 0xc000c84270 14 D0713 00:00:29.038914 762333 usertrap_amd64.go:225] [ 791: 791] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:29.039450 762333 task_exit.go:204] [ 791: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.039847 762333 task_signals.go:204] [ 791: 792] Signal 791, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.039941 762333 task_signals.go:204] [ 791: 794] Signal 791, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.040081 762333 task_signals.go:204] [ 791: 795] Signal 791, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.040188 762333 task_signals.go:204] [ 791: 793] Signal 791, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.040235 762333 task_exit.go:204] [ 791: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.040591 762333 task_exit.go:204] [ 791: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.040858 762333 task_exit.go:204] [ 791: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.041177 762333 task_exit.go:204] [ 791: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.041535 762333 task_exit.go:204] [ 791: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.042544 762333 task_exit.go:204] [ 791: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.042643 762333 task_exit.go:204] [ 791: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.042977 762333 task_exit.go:204] [ 791: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.043075 762333 task_exit.go:204] [ 791: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.043353 762333 task_exit.go:204] [ 791: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.043438 762333 task_exit.go:204] [ 791: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.064378 762333 task_exit.go:204] [ 791: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.064477 762333 task_exit.go:204] [ 791: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.064717 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:29.065117 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:29.065206 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:29.066983 762333 task_exit.go:204] [ 791: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.074098 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.075337 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:29.090258 762333 syscalls.go:262] [ 796: 796] Allocating stack with size of 8388608 bytes D0713 00:00:29.094031 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.094515 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:29.097916 762333 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:29.098045 762333 usertrap_amd64.go:106] [ 796: 796] Map a usertrap vma at 61000 D0713 00:00:29.098753 762333 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc000762c00 1 D0713 00:00:29.098988 762333 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:29.101318 762333 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:29.101385 762333 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc000762c00 2 D0713 00:00:29.101560 762333 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:29.104323 762333 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:29.104397 762333 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc000762c00 3 D0713 00:00:29.104499 762333 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:29.127336 762333 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:29.127426 762333 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc000762c00 4 D0713 00:00:29.127608 762333 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:29.130796 762333 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:29.130882 762333 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc000762c00 5 D0713 00:00:29.131042 762333 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:29.131546 762333 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b214:sysno 13 D0713 00:00:29.131617 762333 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc000762c00 6 D0713 00:00:29.131761 762333 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:29.152855 762333 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:29.152932 762333 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc000762c00 7 D0713 00:00:29.153127 762333 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:29.154605 762333 usertrap_amd64.go:212] [ 796: 797] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:29.154701 762333 usertrap_amd64.go:122] [ 796: 797] Allocate a new trap: 0xc000762c00 8 D0713 00:00:29.154877 762333 usertrap_amd64.go:225] [ 796: 797] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:29.157179 762333 usertrap_amd64.go:212] [ 796: 797] Found the pattern at ip 46af76:sysno 35 D0713 00:00:29.157255 762333 usertrap_amd64.go:122] [ 796: 797] Allocate a new trap: 0xc000762c00 9 D0713 00:00:29.157436 762333 usertrap_amd64.go:225] [ 796: 797] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:29.157853 762333 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:29.157954 762333 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc000762c00 10 D0713 00:00:29.159187 762333 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:29.173381 762333 usertrap_amd64.go:212] [ 796: 797] Found the pattern at ip 46b020:sysno 39 D0713 00:00:29.173484 762333 usertrap_amd64.go:122] [ 796: 797] Allocate a new trap: 0xc000762c00 11 D0713 00:00:29.173732 762333 usertrap_amd64.go:225] [ 796: 797] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:29.174344 762333 usertrap_amd64.go:212] [ 796: 797] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:29.174412 762333 usertrap_amd64.go:122] [ 796: 797] Allocate a new trap: 0xc000762c00 12 D0713 00:00:29.174743 762333 usertrap_amd64.go:225] [ 796: 797] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:29.175293 762333 task_signals.go:470] [ 796: 796] Notified of signal 23 D0713 00:00:29.176020 762333 task_signals.go:220] [ 796: 796] Signal 23: delivering to handler executing program D0713 00:00:29.187650 762333 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46af29:sysno 293 D0713 00:00:29.187743 762333 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc000762c00 13 D0713 00:00:29.187901 762333 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:29.188870 762333 task_signals.go:470] [ 796: 796] Notified of signal 23 D0713 00:00:29.189381 762333 task_signals.go:220] [ 796: 796] Signal 23: delivering to handler D0713 00:00:29.191299 762333 task_signals.go:470] [ 796: 796] Notified of signal 23 D0713 00:00:29.191608 762333 task_signals.go:220] [ 796: 796] Signal 23: delivering to handler D0713 00:00:29.207845 762333 task_signals.go:470] [ 796: 796] Notified of signal 23 D0713 00:00:29.208782 762333 task_signals.go:220] [ 796: 796] Signal 23: delivering to handler D0713 00:00:29.221154 762333 usertrap_amd64.go:212] [ 796: 796] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:29.221239 762333 usertrap_amd64.go:122] [ 796: 796] Allocate a new trap: 0xc000762c00 14 D0713 00:00:29.221369 762333 usertrap_amd64.go:225] [ 796: 796] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:29.221814 762333 task_exit.go:204] [ 796: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.222240 762333 task_signals.go:204] [ 796: 799] Signal 796, PID: 799, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.222240 762333 task_signals.go:204] [ 796: 797] Signal 796, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.222423 762333 task_signals.go:204] [ 796: 800] Signal 796, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.222228 762333 task_signals.go:204] [ 796: 798] Signal 796, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.222453 762333 task_signals.go:204] [ 796: 801] Signal 796, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.222554 762333 task_exit.go:204] [ 796: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.222900 762333 task_exit.go:204] [ 796: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.223171 762333 task_exit.go:204] [ 796: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.223522 762333 task_exit.go:204] [ 796: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.223795 762333 task_exit.go:204] [ 796: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.224493 762333 task_exit.go:204] [ 796: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.224571 762333 task_exit.go:204] [ 796: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.224904 762333 task_exit.go:204] [ 796: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.225038 762333 task_exit.go:204] [ 796: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.225278 762333 task_exit.go:204] [ 796: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.225350 762333 task_exit.go:204] [ 796: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.225420 762333 task_exit.go:204] [ 796: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.225707 762333 task_exit.go:204] [ 796: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.225779 762333 task_exit.go:204] [ 796: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.247160 762333 task_exit.go:204] [ 796: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.247308 762333 task_exit.go:204] [ 796: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.247635 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:29.247903 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:29.247986 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:29.249641 762333 task_exit.go:204] [ 796: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.258423 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.258716 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:29.284453 762333 syscalls.go:262] [ 802: 802] Allocating stack with size of 8388608 bytes D0713 00:00:29.287886 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.288674 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:29.290518 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:29.290879 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:29.292876 762333 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:29.293160 762333 usertrap_amd64.go:106] [ 802: 802] Map a usertrap vma at 64000 D0713 00:00:29.294329 762333 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001e2a720 1 D0713 00:00:29.294800 762333 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:29.297268 762333 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:29.297352 762333 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001e2a720 2 D0713 00:00:29.297486 762333 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:29.300294 762333 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:29.300406 762333 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001e2a720 3 D0713 00:00:29.300592 762333 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:29.323812 762333 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:29.323934 762333 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001e2a720 4 D0713 00:00:29.324130 762333 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:29.327243 762333 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:29.327308 762333 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001e2a720 5 D0713 00:00:29.327442 762333 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:29.327908 762333 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b214:sysno 13 D0713 00:00:29.327955 762333 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001e2a720 6 D0713 00:00:29.328160 762333 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:29.348578 762333 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:29.348669 762333 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001e2a720 7 D0713 00:00:29.348828 762333 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:29.350645 762333 usertrap_amd64.go:212] [ 802: 803] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:29.350777 762333 usertrap_amd64.go:122] [ 802: 803] Allocate a new trap: 0xc001e2a720 8 D0713 00:00:29.351061 762333 usertrap_amd64.go:225] [ 802: 803] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:29.352928 762333 usertrap_amd64.go:212] [ 802: 803] Found the pattern at ip 46af76:sysno 35 D0713 00:00:29.353077 762333 usertrap_amd64.go:122] [ 802: 803] Allocate a new trap: 0xc001e2a720 9 D0713 00:00:29.353516 762333 usertrap_amd64.go:225] [ 802: 803] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:29.354678 762333 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:29.354753 762333 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001e2a720 10 D0713 00:00:29.355498 762333 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:29.367240 762333 usertrap_amd64.go:212] [ 802: 803] Found the pattern at ip 46b020:sysno 39 D0713 00:00:29.367322 762333 usertrap_amd64.go:122] [ 802: 803] Allocate a new trap: 0xc001e2a720 11 D0713 00:00:29.367968 762333 usertrap_amd64.go:225] [ 802: 803] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:29.368830 762333 usertrap_amd64.go:212] [ 802: 803] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:29.368879 762333 usertrap_amd64.go:122] [ 802: 803] Allocate a new trap: 0xc001e2a720 12 D0713 00:00:29.369086 762333 usertrap_amd64.go:225] [ 802: 803] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:29.369703 762333 task_signals.go:470] [ 802: 802] Notified of signal 23 D0713 00:00:29.369979 762333 task_signals.go:220] [ 802: 802] Signal 23: delivering to handler D0713 00:00:29.376413 762333 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46af29:sysno 293 D0713 00:00:29.376530 762333 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001e2a720 13 D0713 00:00:29.376729 762333 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:29.383419 762333 task_signals.go:470] [ 802: 802] Notified of signal 23 D0713 00:00:29.384040 762333 task_signals.go:220] [ 802: 802] Signal 23: delivering to handler D0713 00:00:29.404840 762333 usertrap_amd64.go:212] [ 802: 802] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:29.404966 762333 usertrap_amd64.go:122] [ 802: 802] Allocate a new trap: 0xc001e2a720 14 D0713 00:00:29.405140 762333 usertrap_amd64.go:225] [ 802: 802] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:29.405594 762333 task_exit.go:204] [ 802: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.406102 762333 task_signals.go:204] [ 802: 803] Signal 802, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.406109 762333 task_signals.go:204] [ 802: 805] Signal 802, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.406247 762333 task_signals.go:204] [ 802: 806] Signal 802, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.406323 762333 task_signals.go:204] [ 802: 804] Signal 802, PID: 804, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.406372 762333 task_exit.go:204] [ 802: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.406750 762333 task_exit.go:204] [ 802: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.406964 762333 task_exit.go:204] [ 802: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.407380 762333 task_exit.go:204] [ 802: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.407489 762333 task_exit.go:204] [ 802: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.407907 762333 task_exit.go:204] [ 802: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.408286 762333 task_exit.go:204] [ 802: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.408782 762333 task_exit.go:204] [ 802: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.408884 762333 task_exit.go:204] [ 802: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.409266 762333 task_exit.go:204] [ 802: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.409372 762333 task_exit.go:204] [ 802: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.432051 762333 task_exit.go:204] [ 802: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.432163 762333 task_exit.go:204] [ 802: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.432411 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:29.432605 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:29.432678 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:29.434342 762333 task_exit.go:204] [ 802: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.441379 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.442858 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:29.461608 762333 syscalls.go:262] [ 807: 807] Allocating stack with size of 8388608 bytes D0713 00:00:29.464460 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.464918 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:29.468302 762333 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:29.468522 762333 usertrap_amd64.go:106] [ 807: 807] Map a usertrap vma at 68000 D0713 00:00:29.469578 762333 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc000c84bd0 1 D0713 00:00:29.469868 762333 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:29.471927 762333 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:29.471979 762333 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc000c84bd0 2 D0713 00:00:29.472094 762333 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:29.474538 762333 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:29.474589 762333 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc000c84bd0 3 D0713 00:00:29.474689 762333 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:29.495219 762333 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:29.495299 762333 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc000c84bd0 4 D0713 00:00:29.495428 762333 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:29.498036 762333 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:29.498090 762333 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc000c84bd0 5 D0713 00:00:29.498253 762333 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:29.498732 762333 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46b214:sysno 13 D0713 00:00:29.498806 762333 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc000c84bd0 6 D0713 00:00:29.498956 762333 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:29.518559 762333 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:29.518628 762333 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc000c84bd0 7 D0713 00:00:29.518794 762333 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:29.520782 762333 usertrap_amd64.go:212] [ 807: 808] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:29.520925 762333 usertrap_amd64.go:122] [ 807: 808] Allocate a new trap: 0xc000c84bd0 8 D0713 00:00:29.521247 762333 usertrap_amd64.go:225] [ 807: 808] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:29.524369 762333 usertrap_amd64.go:212] [ 807: 808] Found the pattern at ip 46af76:sysno 35 D0713 00:00:29.524551 762333 usertrap_amd64.go:122] [ 807: 808] Allocate a new trap: 0xc000c84bd0 9 D0713 00:00:29.525336 762333 usertrap_amd64.go:225] [ 807: 808] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:29.525937 762333 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:29.526018 762333 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc000c84bd0 10 D0713 00:00:29.526334 762333 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:29.539151 762333 usertrap_amd64.go:212] [ 807: 808] Found the pattern at ip 46b020:sysno 39 D0713 00:00:29.539223 762333 usertrap_amd64.go:122] [ 807: 808] Allocate a new trap: 0xc000c84bd0 11 D0713 00:00:29.539996 762333 usertrap_amd64.go:225] [ 807: 808] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:29.541642 762333 usertrap_amd64.go:212] [ 807: 808] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:29.541699 762333 usertrap_amd64.go:122] [ 807: 808] Allocate a new trap: 0xc000c84bd0 12 D0713 00:00:29.542292 762333 usertrap_amd64.go:225] [ 807: 808] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:29.542876 762333 task_signals.go:470] [ 807: 807] Notified of signal 23 D0713 00:00:29.543684 762333 task_signals.go:220] [ 807: 807] Signal 23: delivering to handler D0713 00:00:29.548250 762333 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46af29:sysno 293 D0713 00:00:29.548318 762333 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc000c84bd0 13 D0713 00:00:29.548601 762333 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:29.554056 762333 task_signals.go:470] [ 807: 807] Notified of signal 23 D0713 00:00:29.556117 762333 task_signals.go:220] [ 807: 807] Signal 23: delivering to handler D0713 00:00:29.569032 762333 usertrap_amd64.go:212] [ 807: 807] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:29.569100 762333 usertrap_amd64.go:122] [ 807: 807] Allocate a new trap: 0xc000c84bd0 14 D0713 00:00:29.569250 762333 usertrap_amd64.go:225] [ 807: 807] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:29.569662 762333 task_exit.go:204] [ 807: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.570078 762333 task_signals.go:204] [ 807: 810] Signal 807, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.570353 762333 task_signals.go:204] [ 807: 812] Signal 807, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.570400 762333 task_signals.go:204] [ 807: 811] Signal 807, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.570371 762333 task_signals.go:204] [ 807: 808] Signal 807, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.570704 762333 task_exit.go:204] [ 807: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.570870 762333 task_signals.go:204] [ 807: 809] Signal 807, PID: 809, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.571059 762333 task_exit.go:204] [ 807: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.571288 762333 task_exit.go:204] [ 807: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.571586 762333 task_exit.go:204] [ 807: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.571868 762333 task_exit.go:204] [ 807: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.572119 762333 task_exit.go:204] [ 807: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.572522 762333 task_exit.go:204] [ 807: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.572597 762333 task_exit.go:204] [ 807: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.572811 762333 task_exit.go:204] [ 807: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.572872 762333 task_exit.go:204] [ 807: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.573061 762333 task_exit.go:204] [ 807: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.573128 762333 task_exit.go:204] [ 807: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.573452 762333 task_exit.go:204] [ 807: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.573519 762333 task_exit.go:204] [ 807: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.595611 762333 task_exit.go:204] [ 807: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.595719 762333 task_exit.go:204] [ 807: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.595938 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:29.596256 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:29.596349 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:29.598020 762333 task_exit.go:204] [ 807: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.606010 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.606797 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:29.627371 762333 syscalls.go:262] [ 813: 813] Allocating stack with size of 8388608 bytes D0713 00:00:29.630487 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.631205 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:29.635574 762333 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:29.635792 762333 usertrap_amd64.go:106] [ 813: 813] Map a usertrap vma at 66000 D0713 00:00:29.636877 762333 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc00172a210 1 D0713 00:00:29.637239 762333 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:29.639153 762333 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:29.639204 762333 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc00172a210 2 D0713 00:00:29.639336 762333 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:29.641968 762333 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:29.642031 762333 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc00172a210 3 D0713 00:00:29.642170 762333 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:29.661294 762333 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:29.661356 762333 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc00172a210 4 D0713 00:00:29.661535 762333 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:29.664240 762333 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:29.664294 762333 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc00172a210 5 D0713 00:00:29.664435 762333 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:29.664817 762333 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b214:sysno 13 D0713 00:00:29.664881 762333 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc00172a210 6 D0713 00:00:29.665062 762333 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:29.683388 762333 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:29.683466 762333 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc00172a210 7 D0713 00:00:29.683588 762333 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:29.685029 762333 usertrap_amd64.go:212] [ 813: 814] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:29.685095 762333 usertrap_amd64.go:122] [ 813: 814] Allocate a new trap: 0xc00172a210 8 D0713 00:00:29.685354 762333 usertrap_amd64.go:225] [ 813: 814] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:29.687480 762333 usertrap_amd64.go:212] [ 813: 814] Found the pattern at ip 46af76:sysno 35 D0713 00:00:29.687550 762333 usertrap_amd64.go:122] [ 813: 814] Allocate a new trap: 0xc00172a210 9 D0713 00:00:29.687731 762333 usertrap_amd64.go:225] [ 813: 814] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:29.690452 762333 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:29.690529 762333 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc00172a210 10 D0713 00:00:29.690723 762333 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:29.693713 762333 usertrap_amd64.go:212] [ 813: 814] Found the pattern at ip 46b020:sysno 39 D0713 00:00:29.693829 762333 usertrap_amd64.go:122] [ 813: 814] Allocate a new trap: 0xc00172a210 11 D0713 00:00:29.694459 762333 usertrap_amd64.go:225] [ 813: 814] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:29.695011 762333 usertrap_amd64.go:212] [ 813: 814] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:29.695088 762333 usertrap_amd64.go:122] [ 813: 814] Allocate a new trap: 0xc00172a210 12 D0713 00:00:29.695985 762333 usertrap_amd64.go:225] [ 813: 814] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:29.696624 762333 task_signals.go:470] [ 813: 813] Notified of signal 23 D0713 00:00:29.696903 762333 task_signals.go:220] [ 813: 813] Signal 23: delivering to handler D0713 00:00:29.709806 762333 task_signals.go:470] [ 813: 813] Notified of signal 23 D0713 00:00:29.710296 762333 task_signals.go:220] [ 813: 813] Signal 23: delivering to handler D0713 00:00:29.711818 762333 task_signals.go:470] [ 813: 813] Notified of signal 23 D0713 00:00:29.712020 762333 task_signals.go:220] [ 813: 813] Signal 23: delivering to handler D0713 00:00:29.720327 762333 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46af29:sysno 293 D0713 00:00:29.720392 762333 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc00172a210 13 D0713 00:00:29.720570 762333 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:29.725820 762333 task_signals.go:470] [ 813: 813] Notified of signal 23 D0713 00:00:29.726210 762333 task_signals.go:179] [ 813: 813] Restarting syscall 202: interrupted by signal 23 D0713 00:00:29.726249 762333 task_signals.go:220] [ 813: 813] Signal 23: delivering to handler D0713 00:00:29.741078 762333 task_signals.go:470] [ 813: 813] Notified of signal 23 D0713 00:00:29.741521 762333 task_signals.go:220] [ 813: 813] Signal 23: delivering to handler D0713 00:00:29.747763 762333 usertrap_amd64.go:212] [ 813: 813] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:29.747946 762333 usertrap_amd64.go:122] [ 813: 813] Allocate a new trap: 0xc00172a210 14 D0713 00:00:29.748144 762333 usertrap_amd64.go:225] [ 813: 813] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:29.748736 762333 task_exit.go:204] [ 813: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.749495 762333 task_signals.go:204] [ 813: 817] Signal 813, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.749560 762333 task_signals.go:204] [ 813: 815] Signal 813, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.749834 762333 task_signals.go:204] [ 813: 814] Signal 813, PID: 814, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.749856 762333 task_signals.go:204] [ 813: 816] Signal 813, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.749937 762333 task_exit.go:204] [ 813: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.750168 762333 task_exit.go:204] [ 813: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.750422 762333 task_exit.go:204] [ 813: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.751356 762333 task_exit.go:204] [ 813: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.751633 762333 task_exit.go:204] [ 813: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.752044 762333 task_exit.go:204] [ 813: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.752140 762333 task_exit.go:204] [ 813: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.752772 762333 task_exit.go:204] [ 813: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.752875 762333 task_exit.go:204] [ 813: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.753207 762333 task_exit.go:204] [ 813: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.753299 762333 task_exit.go:204] [ 813: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.779011 762333 task_exit.go:204] [ 813: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.779126 762333 task_exit.go:204] [ 813: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.779358 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:29.779719 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:29.779874 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:29.781968 762333 task_exit.go:204] [ 813: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.789938 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:29.790207 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.811568 762333 syscalls.go:262] [ 818: 818] Allocating stack with size of 8388608 bytes D0713 00:00:29.817975 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.819082 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:29.823426 762333 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:29.823743 762333 usertrap_amd64.go:106] [ 818: 818] Map a usertrap vma at 67000 D0713 00:00:29.824583 762333 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000c84f30 1 D0713 00:00:29.824873 762333 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:29.826657 762333 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:29.826705 762333 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000c84f30 2 D0713 00:00:29.826846 762333 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:29.829744 762333 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:29.829823 762333 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000c84f30 3 D0713 00:00:29.829931 762333 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:29.849904 762333 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:29.849986 762333 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000c84f30 4 D0713 00:00:29.850133 762333 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:29.852928 762333 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:29.853029 762333 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000c84f30 5 D0713 00:00:29.853175 762333 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:29.853536 762333 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46b214:sysno 13 D0713 00:00:29.853575 762333 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000c84f30 6 D0713 00:00:29.853692 762333 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:29.878955 762333 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:29.879016 762333 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000c84f30 7 D0713 00:00:29.879141 762333 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:29.880578 762333 usertrap_amd64.go:212] [ 818: 819] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:29.880728 762333 usertrap_amd64.go:122] [ 818: 819] Allocate a new trap: 0xc000c84f30 8 D0713 00:00:29.880979 762333 usertrap_amd64.go:225] [ 818: 819] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:29.883299 762333 usertrap_amd64.go:212] [ 818: 819] Found the pattern at ip 46af76:sysno 35 D0713 00:00:29.883360 762333 usertrap_amd64.go:122] [ 818: 819] Allocate a new trap: 0xc000c84f30 9 D0713 00:00:29.883555 762333 usertrap_amd64.go:225] [ 818: 819] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:29.884743 762333 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:29.884797 762333 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000c84f30 10 D0713 00:00:29.885034 762333 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:29.899134 762333 usertrap_amd64.go:212] [ 818: 819] Found the pattern at ip 46b020:sysno 39 D0713 00:00:29.899210 762333 usertrap_amd64.go:122] [ 818: 819] Allocate a new trap: 0xc000c84f30 11 D0713 00:00:29.899411 762333 usertrap_amd64.go:225] [ 818: 819] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:29.900026 762333 usertrap_amd64.go:212] [ 818: 819] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:29.900107 762333 usertrap_amd64.go:122] [ 818: 819] Allocate a new trap: 0xc000c84f30 12 D0713 00:00:29.900296 762333 usertrap_amd64.go:225] [ 818: 819] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:29.900746 762333 task_signals.go:470] [ 818: 818] Notified of signal 23 D0713 00:00:29.901447 762333 task_signals.go:220] [ 818: 818] Signal 23: delivering to handler D0713 00:00:29.911472 762333 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46af29:sysno 293 D0713 00:00:29.911541 762333 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000c84f30 13 D0713 00:00:29.911694 762333 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:29.912551 762333 task_signals.go:470] [ 818: 818] Notified of signal 23 D0713 00:00:29.912746 762333 task_signals.go:220] [ 818: 818] Signal 23: delivering to handler D0713 00:00:29.932589 762333 task_signals.go:470] [ 818: 818] Notified of signal 23 D0713 00:00:29.932812 762333 task_signals.go:220] [ 818: 818] Signal 23: delivering to handler D0713 00:00:29.939437 762333 usertrap_amd64.go:212] [ 818: 818] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:29.939548 762333 usertrap_amd64.go:122] [ 818: 818] Allocate a new trap: 0xc000c84f30 14 D0713 00:00:29.939724 762333 usertrap_amd64.go:225] [ 818: 818] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:29.940308 762333 task_exit.go:204] [ 818: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.940777 762333 task_signals.go:204] [ 818: 819] Signal 818, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.940825 762333 task_signals.go:204] [ 818: 821] Signal 818, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.941123 762333 task_exit.go:204] [ 818: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.941518 762333 task_signals.go:204] [ 818: 820] Signal 818, PID: 820, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.941726 762333 task_exit.go:204] [ 818: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.942143 762333 task_signals.go:204] [ 818: 823] Signal 818, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.942237 762333 task_exit.go:204] [ 818: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.942459 762333 task_signals.go:204] [ 818: 822] Signal 818, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.942718 762333 task_exit.go:204] [ 818: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.943105 762333 task_exit.go:204] [ 818: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.943182 762333 task_exit.go:204] [ 818: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.943651 762333 task_exit.go:204] [ 818: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.943925 762333 task_exit.go:204] [ 818: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.944192 762333 task_exit.go:204] [ 818: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.944264 762333 task_exit.go:204] [ 818: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.944870 762333 task_exit.go:204] [ 818: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.944990 762333 task_exit.go:204] [ 818: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.945226 762333 task_exit.go:204] [ 818: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.945330 762333 task_exit.go:204] [ 818: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.969761 762333 task_exit.go:204] [ 818: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.969905 762333 task_exit.go:204] [ 818: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.970185 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:29.970496 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:29.970564 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:29.972661 762333 task_exit.go:204] [ 818: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.980889 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.981108 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:30.000687 762333 syscalls.go:262] [ 824: 824] Allocating stack with size of 8388608 bytes D0713 00:00:30.003421 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.004069 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:30.006967 762333 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:30.007144 762333 usertrap_amd64.go:106] [ 824: 824] Map a usertrap vma at 69000 D0713 00:00:30.007891 762333 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc001e2b7d0 1 D0713 00:00:30.008123 762333 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:30.009922 762333 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:30.009978 762333 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc001e2b7d0 2 D0713 00:00:30.010079 762333 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:30.012384 762333 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:30.012460 762333 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc001e2b7d0 3 D0713 00:00:30.012603 762333 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:30.034921 762333 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:30.035017 762333 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc001e2b7d0 4 D0713 00:00:30.035153 762333 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:30.038060 762333 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:30.038121 762333 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc001e2b7d0 5 D0713 00:00:30.038236 762333 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:30.038628 762333 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b214:sysno 13 D0713 00:00:30.038728 762333 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc001e2b7d0 6 D0713 00:00:30.038915 762333 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:30.055701 762333 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:30.055772 762333 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc001e2b7d0 7 D0713 00:00:30.055897 762333 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:30.057322 762333 usertrap_amd64.go:212] [ 824: 825] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:30.057410 762333 usertrap_amd64.go:122] [ 824: 825] Allocate a new trap: 0xc001e2b7d0 8 D0713 00:00:30.057639 762333 usertrap_amd64.go:225] [ 824: 825] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:30.059250 762333 usertrap_amd64.go:212] [ 824: 825] Found the pattern at ip 46af76:sysno 35 D0713 00:00:30.059338 762333 usertrap_amd64.go:122] [ 824: 825] Allocate a new trap: 0xc001e2b7d0 9 D0713 00:00:30.059511 762333 usertrap_amd64.go:225] [ 824: 825] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:30.060376 762333 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:30.060461 762333 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc001e2b7d0 10 D0713 00:00:30.060709 762333 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:30.073261 762333 usertrap_amd64.go:212] [ 824: 825] Found the pattern at ip 46b020:sysno 39 D0713 00:00:30.073365 762333 usertrap_amd64.go:122] [ 824: 825] Allocate a new trap: 0xc001e2b7d0 11 D0713 00:00:30.073637 762333 usertrap_amd64.go:225] [ 824: 825] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:30.074183 762333 usertrap_amd64.go:212] [ 824: 825] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:30.074236 762333 usertrap_amd64.go:122] [ 824: 825] Allocate a new trap: 0xc001e2b7d0 12 D0713 00:00:30.074930 762333 usertrap_amd64.go:225] [ 824: 825] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:30.075396 762333 task_signals.go:470] [ 824: 824] Notified of signal 23 D0713 00:00:30.075590 762333 task_signals.go:220] [ 824: 824] Signal 23: delivering to handler D0713 00:00:30.085983 762333 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46af29:sysno 293 D0713 00:00:30.086076 762333 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc001e2b7d0 13 D0713 00:00:30.086324 762333 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:30.086400 762333 task_signals.go:470] [ 824: 824] Notified of signal 23 D0713 00:00:30.086710 762333 task_signals.go:220] [ 824: 824] Signal 23: delivering to handler D0713 00:00:30.088765 762333 task_signals.go:470] [ 824: 824] Notified of signal 23 D0713 00:00:30.089005 762333 task_signals.go:220] [ 824: 824] Signal 23: delivering to handler D0713 00:00:30.102438 762333 task_signals.go:470] [ 824: 824] Notified of signal 23 D0713 00:00:30.103048 762333 task_signals.go:220] [ 824: 824] Signal 23: delivering to handler D0713 00:00:30.117237 762333 usertrap_amd64.go:212] [ 824: 824] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:30.117347 762333 usertrap_amd64.go:122] [ 824: 824] Allocate a new trap: 0xc001e2b7d0 14 D0713 00:00:30.117501 762333 usertrap_amd64.go:225] [ 824: 824] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:30.118138 762333 task_exit.go:204] [ 824: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.118615 762333 task_signals.go:204] [ 824: 826] Signal 824, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.118911 762333 task_signals.go:204] [ 824: 825] Signal 824, PID: 825, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.118982 762333 task_signals.go:204] [ 824: 827] Signal 824, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.119062 762333 task_signals.go:204] [ 824: 828] Signal 824, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.119097 762333 task_exit.go:204] [ 824: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.119534 762333 task_exit.go:204] [ 824: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.119903 762333 task_exit.go:204] [ 824: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.120644 762333 task_exit.go:204] [ 824: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.120750 762333 task_exit.go:204] [ 824: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.121081 762333 task_exit.go:204] [ 824: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.121181 762333 task_exit.go:204] [ 824: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.121718 762333 task_exit.go:204] [ 824: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.121954 762333 task_exit.go:204] [ 824: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.122349 762333 task_exit.go:204] [ 824: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.122463 762333 task_exit.go:204] [ 824: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.145663 762333 task_exit.go:204] [ 824: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.145765 762333 task_exit.go:204] [ 824: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.145984 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:30.146296 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:30.146416 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:30.148484 762333 task_exit.go:204] [ 824: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.156139 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.156549 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:30.177317 762333 syscalls.go:262] [ 829: 829] Allocating stack with size of 8388608 bytes D0713 00:00:30.181251 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.181831 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:30.186229 762333 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:30.186374 762333 usertrap_amd64.go:106] [ 829: 829] Map a usertrap vma at 65000 D0713 00:00:30.187391 762333 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc001dd8120 1 D0713 00:00:30.187712 762333 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:30.190001 762333 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:30.190060 762333 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc001dd8120 2 D0713 00:00:30.190246 762333 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:30.193320 762333 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:30.193388 762333 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc001dd8120 3 D0713 00:00:30.193550 762333 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:30.214650 762333 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:30.214736 762333 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc001dd8120 4 D0713 00:00:30.214895 762333 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:30.217775 762333 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:30.217832 762333 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc001dd8120 5 D0713 00:00:30.217996 762333 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:30.218349 762333 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46b214:sysno 13 D0713 00:00:30.218400 762333 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc001dd8120 6 D0713 00:00:30.218521 762333 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:30.240051 762333 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:30.240161 762333 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc001dd8120 7 D0713 00:00:30.240288 762333 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:30.242023 762333 usertrap_amd64.go:212] [ 829: 830] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:30.242118 762333 usertrap_amd64.go:122] [ 829: 830] Allocate a new trap: 0xc001dd8120 8 D0713 00:00:30.242372 762333 usertrap_amd64.go:225] [ 829: 830] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:30.245316 762333 usertrap_amd64.go:212] [ 829: 830] Found the pattern at ip 46af76:sysno 35 D0713 00:00:30.245399 762333 usertrap_amd64.go:122] [ 829: 830] Allocate a new trap: 0xc001dd8120 9 D0713 00:00:30.245626 762333 usertrap_amd64.go:225] [ 829: 830] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:30.247020 762333 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:30.247124 762333 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc001dd8120 10 D0713 00:00:30.247325 762333 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:30.260701 762333 usertrap_amd64.go:212] [ 829: 830] Found the pattern at ip 46b020:sysno 39 D0713 00:00:30.260824 762333 usertrap_amd64.go:122] [ 829: 830] Allocate a new trap: 0xc001dd8120 11 D0713 00:00:30.261074 762333 usertrap_amd64.go:225] [ 829: 830] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:30.261659 762333 usertrap_amd64.go:212] [ 829: 830] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:30.261759 762333 usertrap_amd64.go:122] [ 829: 830] Allocate a new trap: 0xc001dd8120 12 D0713 00:00:30.262966 762333 usertrap_amd64.go:225] [ 829: 830] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:30.264295 762333 task_signals.go:470] [ 829: 829] Notified of signal 23 D0713 00:00:30.264786 762333 task_signals.go:220] [ 829: 829] Signal 23: delivering to handler D0713 00:00:30.272804 762333 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46af29:sysno 293 D0713 00:00:30.272891 762333 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc001dd8120 13 D0713 00:00:30.273193 762333 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:30.279806 762333 task_signals.go:470] [ 829: 829] Notified of signal 23 D0713 00:00:30.282646 762333 task_signals.go:220] [ 829: 829] Signal 23: delivering to handler D0713 00:00:30.300510 762333 usertrap_amd64.go:212] [ 829: 829] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:30.300624 762333 usertrap_amd64.go:122] [ 829: 829] Allocate a new trap: 0xc001dd8120 14 D0713 00:00:30.300770 762333 usertrap_amd64.go:225] [ 829: 829] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:30.301322 762333 task_exit.go:204] [ 829: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.301646 762333 task_signals.go:204] [ 829: 832] Signal 829, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.301979 762333 task_signals.go:204] [ 829: 831] Signal 829, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.302020 762333 task_exit.go:204] [ 829: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.302348 762333 task_signals.go:204] [ 829: 830] Signal 829, PID: 830, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.302340 762333 task_signals.go:204] [ 829: 834] Signal 829, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.302355 762333 task_signals.go:204] [ 829: 833] Signal 829, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.302593 762333 task_exit.go:204] [ 829: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.303035 762333 task_exit.go:204] [ 829: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.303485 762333 task_exit.go:204] [ 829: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.304129 762333 task_exit.go:204] [ 829: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.304798 762333 task_exit.go:204] [ 829: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.304888 762333 task_exit.go:204] [ 829: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.305217 762333 task_exit.go:204] [ 829: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.305300 762333 task_exit.go:204] [ 829: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.305682 762333 task_exit.go:204] [ 829: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.305892 762333 task_exit.go:204] [ 829: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.305964 762333 task_exit.go:204] [ 829: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.306252 762333 task_exit.go:204] [ 829: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.306309 762333 task_exit.go:204] [ 829: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.327726 762333 task_exit.go:204] [ 829: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.327803 762333 task_exit.go:204] [ 829: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.328004 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:30.328304 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:30.328368 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:30.329922 762333 task_exit.go:204] [ 829: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.338739 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:30.338970 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:30.340348 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:30.340521 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:30.346078 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.351613 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:30.366616 762333 syscalls.go:262] [ 835: 835] Allocating stack with size of 8388608 bytes D0713 00:00:30.370001 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.370541 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:30.373479 762333 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:30.373693 762333 usertrap_amd64.go:106] [ 835: 835] Map a usertrap vma at 68000 D0713 00:00:30.374443 762333 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0021a0330 1 D0713 00:00:30.374723 762333 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:30.376506 762333 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:30.376558 762333 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0021a0330 2 D0713 00:00:30.376695 762333 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:30.379352 762333 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:30.379403 762333 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0021a0330 3 D0713 00:00:30.379530 762333 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:30.399964 762333 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:30.400051 762333 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0021a0330 4 D0713 00:00:30.400264 762333 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:30.403435 762333 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:30.403520 762333 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0021a0330 5 D0713 00:00:30.403695 762333 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:30.404153 762333 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b214:sysno 13 D0713 00:00:30.404218 762333 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0021a0330 6 D0713 00:00:30.404348 762333 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:30.427998 762333 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:30.428101 762333 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0021a0330 7 D0713 00:00:30.428270 762333 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:30.430164 762333 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:30.430248 762333 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc0021a0330 8 D0713 00:00:30.430487 762333 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:30.433566 762333 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46af76:sysno 35 D0713 00:00:30.433652 762333 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc0021a0330 9 D0713 00:00:30.434645 762333 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:30.435194 762333 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:30.435309 762333 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0021a0330 10 D0713 00:00:30.435558 762333 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:30.451109 762333 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b020:sysno 39 D0713 00:00:30.451231 762333 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc0021a0330 11 D0713 00:00:30.451433 762333 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:30.452170 762333 usertrap_amd64.go:212] [ 835: 836] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:30.452244 762333 usertrap_amd64.go:122] [ 835: 836] Allocate a new trap: 0xc0021a0330 12 D0713 00:00:30.452474 762333 usertrap_amd64.go:225] [ 835: 836] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:30.453918 762333 task_signals.go:470] [ 835: 835] Notified of signal 23 D0713 00:00:30.454146 762333 task_signals.go:220] [ 835: 835] Signal 23: delivering to handler D0713 00:00:30.463156 762333 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46af29:sysno 293 D0713 00:00:30.463244 762333 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0021a0330 13 D0713 00:00:30.463416 762333 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:30.465300 762333 task_signals.go:470] [ 835: 835] Notified of signal 23 D0713 00:00:30.465467 762333 task_signals.go:220] [ 835: 835] Signal 23: delivering to handler D0713 00:00:30.477894 762333 task_signals.go:470] [ 835: 835] Notified of signal 23 D0713 00:00:30.480143 762333 task_signals.go:220] [ 835: 835] Signal 23: delivering to handler I0713 00:00:30.489357 762333 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0713 00:00:30.489640 762333 usertrap_amd64.go:212] [ 835: 835] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:30.489711 762333 usertrap_amd64.go:122] [ 835: 835] Allocate a new trap: 0xc0021a0330 14 D0713 00:00:30.489870 762333 usertrap_amd64.go:225] [ 835: 835] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:30.490596 762333 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.490774 762333 task_signals.go:204] [ 835: 836] Signal 835, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.490949 762333 task_signals.go:204] [ 835: 839] Signal 835, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.491023 762333 task_signals.go:204] [ 835: 838] Signal 835, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.491037 762333 task_signals.go:204] [ 835: 840] Signal 835, PID: 840, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.491109 762333 task_signals.go:204] [ 835: 837] Signal 835, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.491206 762333 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.491426 762333 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.491615 762333 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.492195 762333 task_exit.go:204] [ 835: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.492464 762333 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.493049 762333 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.493223 762333 task_exit.go:204] [ 835: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.493292 762333 task_exit.go:204] [ 835: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.493753 762333 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.493819 762333 task_exit.go:204] [ 835: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.494063 762333 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.494122 762333 task_exit.go:204] [ 835: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.494298 762333 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.494379 762333 task_exit.go:204] [ 835: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.514391 762333 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.514462 762333 task_exit.go:204] [ 835: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.514632 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:30.514869 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:30.514925 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:30.516450 762333 task_exit.go:204] [ 835: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.522580 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.525255 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:30.541458 762333 syscalls.go:262] [ 841: 841] Allocating stack with size of 8388608 bytes D0713 00:00:30.544753 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.545402 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:30.548400 762333 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:30.548581 762333 usertrap_amd64.go:106] [ 841: 841] Map a usertrap vma at 68000 D0713 00:00:30.549337 762333 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc00172aab0 1 D0713 00:00:30.549614 762333 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:30.551466 762333 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:30.551524 762333 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc00172aab0 2 D0713 00:00:30.551644 762333 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:30.554545 762333 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:30.554609 762333 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc00172aab0 3 D0713 00:00:30.554711 762333 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:30.575241 762333 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:30.575325 762333 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc00172aab0 4 D0713 00:00:30.575449 762333 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:30.578092 762333 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:30.578177 762333 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc00172aab0 5 D0713 00:00:30.578284 762333 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:30.578636 762333 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b214:sysno 13 D0713 00:00:30.578692 762333 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc00172aab0 6 D0713 00:00:30.578814 762333 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:30.597661 762333 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:30.597736 762333 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc00172aab0 7 D0713 00:00:30.597867 762333 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:30.599369 762333 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:30.599437 762333 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc00172aab0 8 D0713 00:00:30.599576 762333 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:30.601994 762333 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46af76:sysno 35 D0713 00:00:30.602100 762333 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc00172aab0 9 D0713 00:00:30.602289 762333 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:30.603247 762333 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:30.603315 762333 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc00172aab0 10 D0713 00:00:30.603485 762333 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:30.615115 762333 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46b020:sysno 39 D0713 00:00:30.615211 762333 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc00172aab0 11 D0713 00:00:30.615400 762333 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:30.616896 762333 usertrap_amd64.go:212] [ 841: 842] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:30.617018 762333 usertrap_amd64.go:122] [ 841: 842] Allocate a new trap: 0xc00172aab0 12 D0713 00:00:30.617193 762333 usertrap_amd64.go:225] [ 841: 842] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:30.617709 762333 task_signals.go:470] [ 841: 841] Notified of signal 23 D0713 00:00:30.617942 762333 task_signals.go:220] [ 841: 841] Signal 23: delivering to handler D0713 00:00:30.624892 762333 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46af29:sysno 293 D0713 00:00:30.625022 762333 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc00172aab0 13 D0713 00:00:30.625179 762333 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:30.630056 762333 task_signals.go:470] [ 841: 841] Notified of signal 23 D0713 00:00:30.632926 762333 task_signals.go:220] [ 841: 841] Signal 23: delivering to handler D0713 00:00:30.639969 762333 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:30.640040 762333 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc00172aab0 14 D0713 00:00:30.640156 762333 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46b6e0 trap addr 68460 ([184 24 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:30.645132 762333 task_signals.go:470] [ 841: 841] Notified of signal 23 D0713 00:00:30.646407 762333 task_signals.go:220] [ 841: 841] Signal 23: delivering to handler I0713 00:00:30.648152 762333 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0713 00:00:30.648388 762333 usertrap_amd64.go:212] [ 841: 841] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:30.648488 762333 usertrap_amd64.go:122] [ 841: 841] Allocate a new trap: 0xc00172aab0 15 D0713 00:00:30.648645 762333 usertrap_amd64.go:225] [ 841: 841] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 00:00:30.649151 762333 task_exit.go:204] [ 841: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.649538 762333 task_signals.go:204] [ 841: 843] Signal 841, PID: 843, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.649571 762333 task_signals.go:204] [ 841: 845] Signal 841, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.649562 762333 task_signals.go:204] [ 841: 842] Signal 841, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.649555 762333 task_signals.go:204] [ 841: 844] Signal 841, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.649765 762333 task_exit.go:204] [ 841: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.649941 762333 task_exit.go:204] [ 841: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.650185 762333 task_exit.go:204] [ 841: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.650783 762333 task_exit.go:204] [ 841: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.650836 762333 task_exit.go:204] [ 841: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.651054 762333 task_exit.go:204] [ 841: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.651608 762333 task_exit.go:204] [ 841: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.652181 762333 task_exit.go:204] [ 841: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.652260 762333 task_exit.go:204] [ 841: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.652493 762333 task_exit.go:204] [ 841: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.652552 762333 task_exit.go:204] [ 841: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.673897 762333 task_exit.go:204] [ 841: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.673991 762333 task_exit.go:204] [ 841: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.674229 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:30.674592 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:30.674716 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:30.676436 762333 task_exit.go:204] [ 841: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.685031 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.685193 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:30.707979 762333 syscalls.go:262] [ 846: 846] Allocating stack with size of 8388608 bytes D0713 00:00:30.711620 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.712288 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:30.716102 762333 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:30.716362 762333 usertrap_amd64.go:106] [ 846: 846] Map a usertrap vma at 65000 D0713 00:00:30.717375 762333 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001dd86c0 1 D0713 00:00:30.717749 762333 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:30.719826 762333 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:30.719877 762333 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001dd86c0 2 D0713 00:00:30.719986 762333 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:30.723226 762333 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:30.723294 762333 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001dd86c0 3 D0713 00:00:30.723424 762333 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:30.748077 762333 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:30.748168 762333 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001dd86c0 4 D0713 00:00:30.748299 762333 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:30.751028 762333 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:30.751117 762333 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001dd86c0 5 D0713 00:00:30.751232 762333 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:30.751603 762333 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b214:sysno 13 D0713 00:00:30.751658 762333 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001dd86c0 6 D0713 00:00:30.751762 762333 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:30.772808 762333 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:30.772905 762333 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001dd86c0 7 D0713 00:00:30.773091 762333 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:30.774704 762333 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:30.774789 762333 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc001dd86c0 8 D0713 00:00:30.775007 762333 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:30.777334 762333 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46af76:sysno 35 D0713 00:00:30.777411 762333 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc001dd86c0 9 D0713 00:00:30.777523 762333 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:30.778358 762333 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:30.778441 762333 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001dd86c0 10 D0713 00:00:30.778594 762333 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:30.792109 762333 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b020:sysno 39 D0713 00:00:30.792207 762333 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc001dd86c0 11 D0713 00:00:30.792385 762333 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:30.792856 762333 usertrap_amd64.go:212] [ 846: 847] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:30.792983 762333 usertrap_amd64.go:122] [ 846: 847] Allocate a new trap: 0xc001dd86c0 12 D0713 00:00:30.793179 762333 usertrap_amd64.go:225] [ 846: 847] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:30.793783 762333 task_signals.go:470] [ 846: 846] Notified of signal 23 D0713 00:00:30.794633 762333 task_signals.go:220] [ 846: 846] Signal 23: delivering to handler D0713 00:00:30.806355 762333 task_signals.go:470] [ 846: 846] Notified of signal 23 D0713 00:00:30.806416 762333 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46af29:sysno 293 D0713 00:00:30.806529 762333 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001dd86c0 13 D0713 00:00:30.806774 762333 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:30.807186 762333 task_signals.go:220] [ 846: 846] Signal 23: delivering to handler D0713 00:00:30.808448 762333 task_signals.go:470] [ 846: 846] Notified of signal 23 D0713 00:00:30.809182 762333 task_signals.go:220] [ 846: 846] Signal 23: delivering to handler D0713 00:00:30.810443 762333 task_signals.go:470] [ 846: 846] Notified of signal 23 D0713 00:00:30.810644 762333 task_signals.go:220] [ 846: 846] Signal 23: delivering to handler D0713 00:00:30.830063 762333 task_signals.go:470] [ 846: 846] Notified of signal 23 D0713 00:00:30.830338 762333 task_signals.go:220] [ 846: 846] Signal 23: delivering to handler I0713 00:00:30.837408 762333 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0713 00:00:30.837839 762333 usertrap_amd64.go:212] [ 846: 846] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:30.837914 762333 usertrap_amd64.go:122] [ 846: 846] Allocate a new trap: 0xc001dd86c0 14 D0713 00:00:30.838142 762333 usertrap_amd64.go:225] [ 846: 846] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:30.838694 762333 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.839226 762333 task_signals.go:204] [ 846: 850] Signal 846, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.839177 762333 task_signals.go:204] [ 846: 848] Signal 846, PID: 848, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.839479 762333 task_signals.go:204] [ 846: 849] Signal 846, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.839504 762333 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.839685 762333 task_signals.go:204] [ 846: 847] Signal 846, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.839761 762333 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.840170 762333 task_signals.go:204] [ 846: 851] Signal 846, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.840412 762333 task_exit.go:204] [ 846: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.841070 762333 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.841181 762333 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.841539 762333 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.841633 762333 task_exit.go:204] [ 846: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.842195 762333 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.842294 762333 task_exit.go:204] [ 846: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.842555 762333 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.842782 762333 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.842850 762333 task_exit.go:204] [ 846: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.843143 762333 task_exit.go:204] [ 846: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.843233 762333 task_exit.go:204] [ 846: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.868628 762333 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.868746 762333 task_exit.go:204] [ 846: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.869067 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:30.869500 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:30.869610 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:30.871473 762333 task_exit.go:204] [ 846: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.878997 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.879244 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:30.900006 762333 syscalls.go:262] [ 852: 852] Allocating stack with size of 8388608 bytes D0713 00:00:30.903158 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.904089 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:30.906043 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:30.906354 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:30.909382 762333 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:30.909534 762333 usertrap_amd64.go:106] [ 852: 852] Map a usertrap vma at 68000 D0713 00:00:30.910429 762333 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc001dd8960 1 D0713 00:00:30.910726 762333 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:30.912517 762333 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:30.912597 762333 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc001dd8960 2 D0713 00:00:30.912715 762333 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:30.915247 762333 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:30.915331 762333 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc001dd8960 3 D0713 00:00:30.915437 762333 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:30.935455 762333 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:30.935523 762333 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc001dd8960 4 D0713 00:00:30.935671 762333 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:30.938880 762333 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:30.938947 762333 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc001dd8960 5 D0713 00:00:30.939118 762333 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:30.939601 762333 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b214:sysno 13 D0713 00:00:30.939679 762333 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc001dd8960 6 D0713 00:00:30.939822 762333 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:30.960150 762333 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:30.960249 762333 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc001dd8960 7 D0713 00:00:30.960431 762333 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:30.962572 762333 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:30.962652 762333 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc001dd8960 8 D0713 00:00:30.962870 762333 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:30.965061 762333 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46af76:sysno 35 D0713 00:00:30.965142 762333 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc001dd8960 9 D0713 00:00:30.965324 762333 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:30.966953 762333 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:30.967051 762333 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc001dd8960 10 D0713 00:00:30.967348 762333 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:30.979107 762333 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46b020:sysno 39 D0713 00:00:30.979231 762333 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc001dd8960 11 D0713 00:00:30.979843 762333 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:30.980173 762333 usertrap_amd64.go:212] [ 852: 853] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:30.980231 762333 usertrap_amd64.go:122] [ 852: 853] Allocate a new trap: 0xc001dd8960 12 D0713 00:00:30.980394 762333 usertrap_amd64.go:225] [ 852: 853] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:30.980809 762333 task_signals.go:470] [ 852: 852] Notified of signal 23 D0713 00:00:30.981658 762333 task_signals.go:220] [ 852: 852] Signal 23: delivering to handler D0713 00:00:30.989586 762333 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46af29:sysno 293 D0713 00:00:30.989649 762333 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc001dd8960 13 D0713 00:00:30.989800 762333 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:30.995063 762333 task_signals.go:470] [ 852: 852] Notified of signal 23 D0713 00:00:30.998021 762333 task_signals.go:220] [ 852: 852] Signal 23: delivering to handler D0713 00:00:31.015512 762333 usertrap_amd64.go:212] [ 852: 852] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:31.015596 762333 usertrap_amd64.go:122] [ 852: 852] Allocate a new trap: 0xc001dd8960 14 D0713 00:00:31.015752 762333 usertrap_amd64.go:225] [ 852: 852] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:31.016232 762333 task_exit.go:204] [ 852: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.016705 762333 task_signals.go:204] [ 852: 855] Signal 852, PID: 855, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.016754 762333 task_signals.go:204] [ 852: 856] Signal 852, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.017050 762333 task_exit.go:204] [ 852: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.017261 762333 task_signals.go:204] [ 852: 853] Signal 852, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.017271 762333 task_signals.go:204] [ 852: 854] Signal 852, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.017459 762333 task_exit.go:204] [ 852: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.018305 762333 task_exit.go:204] [ 852: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.018523 762333 task_exit.go:204] [ 852: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.019058 762333 task_exit.go:204] [ 852: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.019143 762333 task_exit.go:204] [ 852: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.019520 762333 task_exit.go:204] [ 852: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.020248 762333 task_exit.go:204] [ 852: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.020324 762333 task_exit.go:204] [ 852: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.020568 762333 task_exit.go:204] [ 852: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.020628 762333 task_exit.go:204] [ 852: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.047093 762333 task_exit.go:204] [ 852: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.047193 762333 task_exit.go:204] [ 852: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.047410 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:31.047728 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:31.047796 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:31.049663 762333 task_exit.go:204] [ 852: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.057904 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:31.058866 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.082271 762333 syscalls.go:262] [ 857: 857] Allocating stack with size of 8388608 bytes D0713 00:00:31.085861 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.086637 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:31.091388 762333 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:31.091571 762333 usertrap_amd64.go:106] [ 857: 857] Map a usertrap vma at 65000 D0713 00:00:31.092592 762333 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000931050 1 D0713 00:00:31.093030 762333 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:31.095818 762333 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:31.095885 762333 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000931050 2 D0713 00:00:31.096050 762333 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:31.099677 762333 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:31.099783 762333 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000931050 3 D0713 00:00:31.099924 762333 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:31.123461 762333 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:31.123562 762333 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000931050 4 D0713 00:00:31.123782 762333 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:31.126875 762333 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:31.126956 762333 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000931050 5 D0713 00:00:31.127094 762333 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:31.127436 762333 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b214:sysno 13 D0713 00:00:31.127503 762333 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000931050 6 D0713 00:00:31.127647 762333 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:31.150240 762333 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:31.150393 762333 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000931050 7 D0713 00:00:31.150595 762333 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:31.154504 762333 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:31.154601 762333 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc000931050 8 D0713 00:00:31.154903 762333 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:31.157042 762333 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:31.157189 762333 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000931050 9 D0713 00:00:31.157454 762333 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:31.158788 762333 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46af76:sysno 35 D0713 00:00:31.158917 762333 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc000931050 10 D0713 00:00:31.159244 762333 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:31.170931 762333 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46b020:sysno 39 D0713 00:00:31.171002 762333 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc000931050 11 D0713 00:00:31.171186 762333 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:31.171603 762333 usertrap_amd64.go:212] [ 857: 858] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:31.171674 762333 usertrap_amd64.go:122] [ 857: 858] Allocate a new trap: 0xc000931050 12 D0713 00:00:31.171875 762333 usertrap_amd64.go:225] [ 857: 858] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:31.172342 762333 task_signals.go:470] [ 857: 857] Notified of signal 23 D0713 00:00:31.173162 762333 task_signals.go:220] [ 857: 857] Signal 23: delivering to handler D0713 00:00:31.182024 762333 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46af29:sysno 293 D0713 00:00:31.182089 762333 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000931050 13 D0713 00:00:31.182284 762333 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:31.184161 762333 task_signals.go:470] [ 857: 857] Notified of signal 23 D0713 00:00:31.184646 762333 task_signals.go:220] [ 857: 857] Signal 23: delivering to handler D0713 00:00:31.197961 762333 task_signals.go:470] [ 857: 857] Notified of signal 23 D0713 00:00:31.201881 762333 task_signals.go:220] [ 857: 857] Signal 23: delivering to handler I0713 00:00:31.210546 762333 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0713 00:00:31.210799 762333 usertrap_amd64.go:212] [ 857: 857] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:31.210888 762333 usertrap_amd64.go:122] [ 857: 857] Allocate a new trap: 0xc000931050 14 D0713 00:00:31.211328 762333 usertrap_amd64.go:225] [ 857: 857] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:31.211893 762333 task_exit.go:204] [ 857: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.212158 762333 task_signals.go:204] [ 857: 858] Signal 857, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.212422 762333 task_signals.go:204] [ 857: 860] Signal 857, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.212532 762333 task_signals.go:204] [ 857: 859] Signal 857, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.212605 762333 task_signals.go:204] [ 857: 861] Signal 857, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.212706 762333 task_exit.go:204] [ 857: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.212969 762333 task_exit.go:204] [ 857: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.213270 762333 task_exit.go:204] [ 857: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.213509 762333 task_exit.go:204] [ 857: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.213969 762333 task_exit.go:204] [ 857: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.214355 762333 task_exit.go:204] [ 857: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.214427 762333 task_exit.go:204] [ 857: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.214836 762333 task_exit.go:204] [ 857: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.214936 762333 task_exit.go:204] [ 857: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.215196 762333 task_exit.go:204] [ 857: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.215278 762333 task_exit.go:204] [ 857: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.240134 762333 task_exit.go:204] [ 857: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.240221 762333 task_exit.go:204] [ 857: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.240417 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:31.240652 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:31.240695 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:31.242334 762333 task_exit.go:204] [ 857: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.254682 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:31.256229 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.278267 762333 syscalls.go:262] [ 862: 862] Allocating stack with size of 8388608 bytes D0713 00:00:31.282268 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.282910 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:31.290136 762333 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:31.290318 762333 usertrap_amd64.go:106] [ 862: 862] Map a usertrap vma at 63000 D0713 00:00:31.291238 762333 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc00298e0c0 1 D0713 00:00:31.291693 762333 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:31.295065 762333 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:31.295134 762333 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc00298e0c0 2 D0713 00:00:31.295313 762333 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:31.298842 762333 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:31.298911 762333 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc00298e0c0 3 D0713 00:00:31.299141 762333 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:31.325788 762333 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:31.325894 762333 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc00298e0c0 4 D0713 00:00:31.326126 762333 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:31.329395 762333 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:31.329456 762333 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc00298e0c0 5 D0713 00:00:31.329594 762333 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:31.330175 762333 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46b214:sysno 13 D0713 00:00:31.330241 762333 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc00298e0c0 6 D0713 00:00:31.330462 762333 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:31.353061 762333 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:31.353186 762333 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc00298e0c0 7 D0713 00:00:31.353393 762333 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:31.356020 762333 usertrap_amd64.go:212] [ 862: 863] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:31.356173 762333 usertrap_amd64.go:122] [ 862: 863] Allocate a new trap: 0xc00298e0c0 8 D0713 00:00:31.356572 762333 usertrap_amd64.go:225] [ 862: 863] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:31.359762 762333 usertrap_amd64.go:212] [ 862: 863] Found the pattern at ip 46af76:sysno 35 D0713 00:00:31.359938 762333 usertrap_amd64.go:122] [ 862: 863] Allocate a new trap: 0xc00298e0c0 9 D0713 00:00:31.360290 762333 usertrap_amd64.go:225] [ 862: 863] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:31.363377 762333 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:31.363580 762333 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc00298e0c0 10 D0713 00:00:31.364203 762333 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:31.367923 762333 usertrap_amd64.go:212] [ 862: 863] Found the pattern at ip 46b020:sysno 39 D0713 00:00:31.368011 762333 usertrap_amd64.go:122] [ 862: 863] Allocate a new trap: 0xc00298e0c0 11 D0713 00:00:31.368450 762333 usertrap_amd64.go:225] [ 862: 863] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:31.369208 762333 usertrap_amd64.go:212] [ 862: 863] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:31.369315 762333 usertrap_amd64.go:122] [ 862: 863] Allocate a new trap: 0xc00298e0c0 12 D0713 00:00:31.369567 762333 usertrap_amd64.go:225] [ 862: 863] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:31.371309 762333 task_signals.go:470] [ 862: 865] Notified of signal 23 D0713 00:00:31.371788 762333 task_signals.go:179] [ 862: 865] Restarting syscall 202: interrupted by signal 23 D0713 00:00:31.371933 762333 task_signals.go:220] [ 862: 865] Signal 23: delivering to handler D0713 00:00:31.382935 762333 task_signals.go:470] [ 862: 862] Notified of signal 23 D0713 00:00:31.383522 762333 task_signals.go:220] [ 862: 862] Signal 23: delivering to handler D0713 00:00:31.385192 762333 task_signals.go:470] [ 862: 862] Notified of signal 23 D0713 00:00:31.385410 762333 task_signals.go:220] [ 862: 862] Signal 23: delivering to handler D0713 00:00:31.393405 762333 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46af29:sysno 293 D0713 00:00:31.393490 762333 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc00298e0c0 13 D0713 00:00:31.393626 762333 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:31.398046 762333 task_signals.go:470] [ 862: 862] Notified of signal 23 D0713 00:00:31.398388 762333 task_signals.go:220] [ 862: 862] Signal 23: delivering to handler D0713 00:00:31.411558 762333 task_signals.go:470] [ 862: 862] Notified of signal 23 D0713 00:00:31.411957 762333 task_signals.go:220] [ 862: 862] Signal 23: delivering to handler I0713 00:00:31.417246 762333 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0713 00:00:31.417545 762333 usertrap_amd64.go:212] [ 862: 862] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:31.417608 762333 usertrap_amd64.go:122] [ 862: 862] Allocate a new trap: 0xc00298e0c0 14 D0713 00:00:31.417818 762333 usertrap_amd64.go:225] [ 862: 862] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:31.418356 762333 task_exit.go:204] [ 862: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.418750 762333 task_signals.go:204] [ 862: 866] Signal 862, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.419044 762333 task_exit.go:204] [ 862: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.419066 762333 task_signals.go:204] [ 862: 865] Signal 862, PID: 865, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.419281 762333 task_signals.go:204] [ 862: 864] Signal 862, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.419371 762333 task_signals.go:204] [ 862: 863] Signal 862, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.419573 762333 task_exit.go:204] [ 862: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.420305 762333 task_exit.go:204] [ 862: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.420602 762333 task_exit.go:204] [ 862: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.420831 762333 task_exit.go:204] [ 862: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.420984 762333 task_exit.go:204] [ 862: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.421062 762333 task_exit.go:204] [ 862: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.421534 762333 task_exit.go:204] [ 862: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.421600 762333 task_exit.go:204] [ 862: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.421774 762333 task_exit.go:204] [ 862: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.421890 762333 task_exit.go:204] [ 862: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.444913 762333 task_exit.go:204] [ 862: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.445089 762333 task_exit.go:204] [ 862: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.445332 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:31.445578 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:31.445643 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:31.447208 762333 task_exit.go:204] [ 862: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.454994 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.455899 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:31.478974 762333 syscalls.go:262] [ 867: 867] Allocating stack with size of 8388608 bytes D0713 00:00:31.482135 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.482893 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:31.486946 762333 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:31.487154 762333 usertrap_amd64.go:106] [ 867: 867] Map a usertrap vma at 64000 D0713 00:00:31.488236 762333 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00172a180 1 D0713 00:00:31.488562 762333 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:31.491568 762333 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:31.491680 762333 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00172a180 2 D0713 00:00:31.491822 762333 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:31.495388 762333 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:31.495529 762333 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00172a180 3 D0713 00:00:31.495714 762333 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:31.519878 762333 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:31.519976 762333 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00172a180 4 D0713 00:00:31.520155 762333 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:31.522974 762333 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:31.523044 762333 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00172a180 5 D0713 00:00:31.523168 762333 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:31.523535 762333 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b214:sysno 13 D0713 00:00:31.523580 762333 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00172a180 6 D0713 00:00:31.523729 762333 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:31.550628 762333 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:31.550727 762333 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00172a180 7 D0713 00:00:31.550931 762333 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:31.552758 762333 usertrap_amd64.go:212] [ 867: 868] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:31.552868 762333 usertrap_amd64.go:122] [ 867: 868] Allocate a new trap: 0xc00172a180 8 D0713 00:00:31.553225 762333 usertrap_amd64.go:225] [ 867: 868] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:31.557444 762333 usertrap_amd64.go:212] [ 867: 868] Found the pattern at ip 46af76:sysno 35 D0713 00:00:31.557527 762333 usertrap_amd64.go:122] [ 867: 868] Allocate a new trap: 0xc00172a180 9 D0713 00:00:31.557780 762333 usertrap_amd64.go:225] [ 867: 868] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:31.558229 762333 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:31.558292 762333 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00172a180 10 D0713 00:00:31.558507 762333 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:31.571748 762333 usertrap_amd64.go:212] [ 867: 868] Found the pattern at ip 46b020:sysno 39 D0713 00:00:31.571831 762333 usertrap_amd64.go:122] [ 867: 868] Allocate a new trap: 0xc00172a180 11 D0713 00:00:31.572030 762333 usertrap_amd64.go:225] [ 867: 868] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:31.572536 762333 usertrap_amd64.go:212] [ 867: 868] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:31.572609 762333 usertrap_amd64.go:122] [ 867: 868] Allocate a new trap: 0xc00172a180 12 D0713 00:00:31.572861 762333 usertrap_amd64.go:225] [ 867: 868] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:31.573363 762333 task_signals.go:470] [ 867: 867] Notified of signal 23 D0713 00:00:31.573987 762333 task_signals.go:220] [ 867: 867] Signal 23: delivering to handler D0713 00:00:31.586646 762333 task_signals.go:470] [ 867: 867] Notified of signal 23 D0713 00:00:31.587490 762333 task_signals.go:220] [ 867: 867] Signal 23: delivering to handler D0713 00:00:31.589781 762333 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46af29:sysno 293 D0713 00:00:31.589853 762333 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00172a180 13 D0713 00:00:31.590062 762333 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:31.597978 762333 task_signals.go:470] [ 867: 867] Notified of signal 23 D0713 00:00:31.598390 762333 task_signals.go:220] [ 867: 867] Signal 23: delivering to handler D0713 00:00:31.614780 762333 usertrap_amd64.go:212] [ 867: 867] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:31.614877 762333 usertrap_amd64.go:122] [ 867: 867] Allocate a new trap: 0xc00172a180 14 D0713 00:00:31.615101 762333 usertrap_amd64.go:225] [ 867: 867] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:31.615887 762333 task_signals.go:470] [ 867: 867] Notified of signal 23 D0713 00:00:31.616080 762333 task_exit.go:204] [ 867: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.616292 762333 task_signals.go:204] [ 867: 869] Signal 867, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.616366 762333 task_signals.go:204] [ 867: 870] Signal 867, PID: 870, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.616503 762333 task_signals.go:204] [ 867: 872] Signal 867, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.616583 762333 task_exit.go:204] [ 867: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.616574 762333 task_signals.go:204] [ 867: 868] Signal 867, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.616768 762333 task_signals.go:204] [ 867: 871] Signal 867, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.616791 762333 task_exit.go:204] [ 867: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.616970 762333 task_exit.go:204] [ 867: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.617459 762333 task_exit.go:204] [ 867: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.617781 762333 task_exit.go:204] [ 867: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.617873 762333 task_exit.go:204] [ 867: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.618453 762333 task_exit.go:204] [ 867: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.619145 762333 task_exit.go:204] [ 867: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.619314 762333 task_exit.go:204] [ 867: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.619442 762333 task_exit.go:204] [ 867: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.619720 762333 task_exit.go:204] [ 867: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.619810 762333 task_exit.go:204] [ 867: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.620023 762333 task_exit.go:204] [ 867: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.620105 762333 task_exit.go:204] [ 867: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.646606 762333 task_exit.go:204] [ 867: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.646711 762333 task_exit.go:204] [ 867: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.646990 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:31.647252 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:31.647303 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:31.649568 762333 task_exit.go:204] [ 867: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.657910 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.658056 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:31.676127 762333 syscalls.go:262] [ 873: 873] Allocating stack with size of 8388608 bytes D0713 00:00:31.678970 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.679854 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:31.684336 762333 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:31.684524 762333 usertrap_amd64.go:106] [ 873: 873] Map a usertrap vma at 67000 D0713 00:00:31.685785 762333 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000930780 1 D0713 00:00:31.686102 762333 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:31.687989 762333 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:31.688071 762333 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000930780 2 D0713 00:00:31.688221 762333 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:31.691302 762333 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:31.691382 762333 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000930780 3 D0713 00:00:31.691521 762333 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:31.721290 762333 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:31.721436 762333 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000930780 4 D0713 00:00:31.721587 762333 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:31.724720 762333 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:31.724795 762333 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000930780 5 D0713 00:00:31.725032 762333 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:31.725457 762333 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b214:sysno 13 D0713 00:00:31.725509 762333 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000930780 6 D0713 00:00:31.725642 762333 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:31.745398 762333 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:31.745516 762333 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000930780 7 D0713 00:00:31.745672 762333 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:31.747578 762333 usertrap_amd64.go:212] [ 873: 874] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:31.747660 762333 usertrap_amd64.go:122] [ 873: 874] Allocate a new trap: 0xc000930780 8 D0713 00:00:31.747835 762333 usertrap_amd64.go:225] [ 873: 874] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:31.749760 762333 usertrap_amd64.go:212] [ 873: 874] Found the pattern at ip 46af76:sysno 35 D0713 00:00:31.749874 762333 usertrap_amd64.go:122] [ 873: 874] Allocate a new trap: 0xc000930780 9 D0713 00:00:31.750090 762333 usertrap_amd64.go:225] [ 873: 874] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:31.751157 762333 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:31.751322 762333 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000930780 10 D0713 00:00:31.751594 762333 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:31.754731 762333 usertrap_amd64.go:212] [ 873: 874] Found the pattern at ip 46b020:sysno 39 D0713 00:00:31.754815 762333 usertrap_amd64.go:122] [ 873: 874] Allocate a new trap: 0xc000930780 11 D0713 00:00:31.755671 762333 usertrap_amd64.go:225] [ 873: 874] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:31.756128 762333 usertrap_amd64.go:212] [ 873: 874] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:31.756213 762333 usertrap_amd64.go:122] [ 873: 874] Allocate a new trap: 0xc000930780 12 D0713 00:00:31.756919 762333 usertrap_amd64.go:225] [ 873: 874] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:31.757731 762333 task_signals.go:470] [ 873: 873] Notified of signal 23 D0713 00:00:31.757994 762333 task_signals.go:220] [ 873: 873] Signal 23: delivering to handler D0713 00:00:31.770894 762333 task_signals.go:470] [ 873: 873] Notified of signal 23 D0713 00:00:31.771166 762333 task_signals.go:220] [ 873: 873] Signal 23: delivering to handler D0713 00:00:31.772548 762333 task_signals.go:470] [ 873: 873] Notified of signal 23 D0713 00:00:31.772805 762333 task_signals.go:220] [ 873: 873] Signal 23: delivering to handler D0713 00:00:31.774209 762333 task_signals.go:470] [ 873: 873] Notified of signal 23 D0713 00:00:31.774495 762333 task_signals.go:220] [ 873: 873] Signal 23: delivering to handler D0713 00:00:31.782775 762333 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46af29:sysno 293 D0713 00:00:31.782847 762333 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000930780 13 D0713 00:00:31.783033 762333 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:31.789234 762333 task_signals.go:470] [ 873: 873] Notified of signal 23 D0713 00:00:31.792079 762333 task_signals.go:220] [ 873: 873] Signal 23: delivering to handler I0713 00:00:31.809635 762333 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0713 00:00:31.810458 762333 usertrap_amd64.go:212] [ 873: 873] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:31.810554 762333 usertrap_amd64.go:122] [ 873: 873] Allocate a new trap: 0xc000930780 14 D0713 00:00:31.810753 762333 usertrap_amd64.go:225] [ 873: 873] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:31.811330 762333 task_exit.go:204] [ 873: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.811828 762333 task_signals.go:204] [ 873: 875] Signal 873, PID: 875, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.811832 762333 task_signals.go:204] [ 873: 874] Signal 873, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.812118 762333 task_exit.go:204] [ 873: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.812327 762333 task_signals.go:204] [ 873: 877] Signal 873, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.812544 762333 task_exit.go:204] [ 873: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.812719 762333 task_signals.go:204] [ 873: 876] Signal 873, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.813073 762333 task_exit.go:204] [ 873: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.813379 762333 task_exit.go:204] [ 873: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.814072 762333 task_exit.go:204] [ 873: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.814565 762333 task_exit.go:204] [ 873: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.814633 762333 task_exit.go:204] [ 873: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.814925 762333 task_exit.go:204] [ 873: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.814996 762333 task_exit.go:204] [ 873: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.815255 762333 task_exit.go:204] [ 873: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.815322 762333 task_exit.go:204] [ 873: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.838008 762333 task_exit.go:204] [ 873: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.838106 762333 task_exit.go:204] [ 873: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.838502 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:31.838974 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:31.839063 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:31.841305 762333 task_exit.go:204] [ 873: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.849371 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:31.850350 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.878415 762333 syscalls.go:262] [ 878: 878] Allocating stack with size of 8388608 bytes D0713 00:00:31.882428 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.883039 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:31.887464 762333 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:31.887731 762333 usertrap_amd64.go:106] [ 878: 878] Map a usertrap vma at 63000 D0713 00:00:31.889753 762333 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc000930960 1 D0713 00:00:31.890221 762333 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:31.895159 762333 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:31.895268 762333 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc000930960 2 D0713 00:00:31.895448 762333 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:31.898379 762333 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:31.898453 762333 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc000930960 3 D0713 00:00:31.898609 762333 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:31.919546 762333 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:31.919648 762333 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc000930960 4 D0713 00:00:31.919847 762333 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:31.923133 762333 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:31.923186 762333 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc000930960 5 D0713 00:00:31.923338 762333 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:31.923741 762333 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b214:sysno 13 D0713 00:00:31.923786 762333 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc000930960 6 D0713 00:00:31.923917 762333 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:31.946966 762333 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:31.947065 762333 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc000930960 7 D0713 00:00:31.947192 762333 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:31.949104 762333 usertrap_amd64.go:212] [ 878: 879] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:31.949244 762333 usertrap_amd64.go:122] [ 878: 879] Allocate a new trap: 0xc000930960 8 D0713 00:00:31.949587 762333 usertrap_amd64.go:225] [ 878: 879] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:31.951640 762333 usertrap_amd64.go:212] [ 878: 879] Found the pattern at ip 46af76:sysno 35 D0713 00:00:31.951744 762333 usertrap_amd64.go:122] [ 878: 879] Allocate a new trap: 0xc000930960 9 D0713 00:00:31.951946 762333 usertrap_amd64.go:225] [ 878: 879] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:31.953875 762333 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:31.953982 762333 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc000930960 10 D0713 00:00:31.954243 762333 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:31.968929 762333 usertrap_amd64.go:212] [ 878: 879] Found the pattern at ip 46b020:sysno 39 D0713 00:00:31.969091 762333 usertrap_amd64.go:122] [ 878: 879] Allocate a new trap: 0xc000930960 11 D0713 00:00:31.969387 762333 usertrap_amd64.go:225] [ 878: 879] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:31.971259 762333 usertrap_amd64.go:212] [ 878: 879] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:31.971404 762333 usertrap_amd64.go:122] [ 878: 879] Allocate a new trap: 0xc000930960 12 D0713 00:00:31.972297 762333 usertrap_amd64.go:225] [ 878: 879] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:31.973768 762333 task_signals.go:470] [ 878: 878] Notified of signal 23 D0713 00:00:31.974978 762333 task_signals.go:220] [ 878: 878] Signal 23: delivering to handler D0713 00:00:31.982583 762333 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46af29:sysno 293 D0713 00:00:31.982662 762333 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc000930960 13 D0713 00:00:31.982842 762333 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:31.988770 762333 task_signals.go:470] [ 878: 878] Notified of signal 23 D0713 00:00:31.992377 762333 task_signals.go:220] [ 878: 878] Signal 23: delivering to handler D0713 00:00:32.009591 762333 task_signals.go:470] [ 878: 878] Notified of signal 23 D0713 00:00:32.009871 762333 task_signals.go:220] [ 878: 878] Signal 23: delivering to handler I0713 00:00:32.012922 762333 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0713 00:00:32.013271 762333 usertrap_amd64.go:212] [ 878: 878] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:32.013342 762333 usertrap_amd64.go:122] [ 878: 878] Allocate a new trap: 0xc000930960 14 D0713 00:00:32.013469 762333 usertrap_amd64.go:225] [ 878: 878] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:32.013870 762333 task_exit.go:204] [ 878: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.014225 762333 task_signals.go:204] [ 878: 879] Signal 878, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.014465 762333 task_signals.go:204] [ 878: 883] Signal 878, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.014502 762333 task_exit.go:204] [ 878: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.014463 762333 task_signals.go:204] [ 878: 882] Signal 878, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.014746 762333 task_exit.go:204] [ 878: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.015151 762333 task_exit.go:204] [ 878: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.015221 762333 task_exit.go:204] [ 878: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.015632 762333 task_signals.go:204] [ 878: 880] Signal 878, PID: 880, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.015716 762333 task_signals.go:204] [ 878: 881] Signal 878, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.015768 762333 task_exit.go:204] [ 878: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.015987 762333 task_exit.go:204] [ 878: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.016194 762333 task_exit.go:204] [ 878: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.016709 762333 task_exit.go:204] [ 878: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.016803 762333 task_exit.go:204] [ 878: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.017035 762333 task_exit.go:204] [ 878: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.018793 762333 task_exit.go:204] [ 878: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.018856 762333 task_exit.go:204] [ 878: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.019033 762333 task_exit.go:204] [ 878: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.019126 762333 task_exit.go:204] [ 878: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.043845 762333 task_exit.go:204] [ 878: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.044081 762333 task_exit.go:204] [ 878: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.044343 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:32.044740 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:32.044832 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:32.046808 762333 task_exit.go:204] [ 878: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.054353 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.055334 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:32.075878 762333 syscalls.go:262] [ 884: 884] Allocating stack with size of 8388608 bytes D0713 00:00:32.079193 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.079765 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:32.082926 762333 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:32.083118 762333 usertrap_amd64.go:106] [ 884: 884] Map a usertrap vma at 61000 D0713 00:00:32.084040 762333 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc00298efc0 1 D0713 00:00:32.084353 762333 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:32.086445 762333 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:32.086508 762333 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc00298efc0 2 D0713 00:00:32.086652 762333 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:32.089277 762333 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:32.089335 762333 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc00298efc0 3 D0713 00:00:32.089461 762333 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:32.112040 762333 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:32.112117 762333 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc00298efc0 4 D0713 00:00:32.112259 762333 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:32.115195 762333 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:32.115278 762333 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc00298efc0 5 D0713 00:00:32.115465 762333 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:32.115978 762333 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b214:sysno 13 D0713 00:00:32.116040 762333 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc00298efc0 6 D0713 00:00:32.116200 762333 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:32.134987 762333 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:32.135087 762333 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc00298efc0 7 D0713 00:00:32.135217 762333 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:32.136705 762333 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:32.136788 762333 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc00298efc0 8 D0713 00:00:32.136929 762333 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:32.139572 762333 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46af76:sysno 35 D0713 00:00:32.139679 762333 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc00298efc0 9 D0713 00:00:32.140697 762333 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:32.141192 762333 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:32.141283 762333 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc00298efc0 10 D0713 00:00:32.141479 762333 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:32.154686 762333 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46b020:sysno 39 D0713 00:00:32.154772 762333 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc00298efc0 11 D0713 00:00:32.154969 762333 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:32.155434 762333 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:32.155496 762333 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc00298efc0 12 D0713 00:00:32.155763 762333 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:32.157166 762333 task_signals.go:470] [ 884: 884] Notified of signal 23 D0713 00:00:32.157549 762333 task_signals.go:220] [ 884: 884] Signal 23: delivering to handler D0713 00:00:32.166486 762333 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46af29:sysno 293 D0713 00:00:32.166546 762333 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc00298efc0 13 D0713 00:00:32.166695 762333 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:32.173772 762333 task_signals.go:470] [ 884: 884] Notified of signal 23 D0713 00:00:32.175015 762333 task_signals.go:220] [ 884: 884] Signal 23: delivering to handler executing program D0713 00:00:32.196452 762333 task_signals.go:470] [ 884: 884] Notified of signal 23 D0713 00:00:32.198488 762333 task_signals.go:220] [ 884: 884] Signal 23: delivering to handler D0713 00:00:32.201585 762333 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:32.201679 762333 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc00298efc0 14 D0713 00:00:32.201863 762333 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:32.202388 762333 task_exit.go:204] [ 884: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.202895 762333 task_signals.go:204] [ 884: 886] Signal 884, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.202894 762333 task_signals.go:204] [ 884: 885] Signal 884, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.203174 762333 task_signals.go:204] [ 884: 889] Signal 884, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.203407 762333 task_exit.go:204] [ 884: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.203668 762333 task_signals.go:204] [ 884: 888] Signal 884, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.203803 762333 task_signals.go:204] [ 884: 887] Signal 884, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.204008 762333 task_exit.go:204] [ 884: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.204254 762333 task_exit.go:204] [ 884: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.204446 762333 task_exit.go:204] [ 884: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.204740 762333 task_exit.go:204] [ 884: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.204925 762333 task_exit.go:204] [ 884: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.206107 762333 task_exit.go:204] [ 884: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.206189 762333 task_exit.go:204] [ 884: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.206547 762333 task_exit.go:204] [ 884: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.206618 762333 task_exit.go:204] [ 884: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.206822 762333 task_exit.go:204] [ 884: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.206895 762333 task_exit.go:204] [ 884: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.207043 762333 task_exit.go:204] [ 884: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.207148 762333 task_exit.go:204] [ 884: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.232291 762333 task_exit.go:204] [ 884: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.232400 762333 task_exit.go:204] [ 884: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.232699 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:32.233055 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:32.233181 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:32.235097 762333 task_exit.go:204] [ 884: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.242325 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.243057 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:32.264413 762333 syscalls.go:262] [ 890: 890] Allocating stack with size of 8388608 bytes D0713 00:00:32.268417 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.269153 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:32.274739 762333 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:32.274954 762333 usertrap_amd64.go:106] [ 890: 890] Map a usertrap vma at 67000 D0713 00:00:32.276069 762333 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0021a0630 1 D0713 00:00:32.276462 762333 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:32.279183 762333 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:32.279264 762333 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0021a0630 2 D0713 00:00:32.279447 762333 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:32.282204 762333 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:32.282331 762333 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0021a0630 3 D0713 00:00:32.282594 762333 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:32.306083 762333 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:32.306174 762333 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0021a0630 4 D0713 00:00:32.306411 762333 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:32.309855 762333 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:32.309956 762333 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0021a0630 5 D0713 00:00:32.310121 762333 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:32.310550 762333 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b214:sysno 13 D0713 00:00:32.310608 762333 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0021a0630 6 D0713 00:00:32.310759 762333 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:32.338758 762333 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:32.338859 762333 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0021a0630 7 D0713 00:00:32.338990 762333 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:32.340655 762333 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:32.340733 762333 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc0021a0630 8 D0713 00:00:32.340883 762333 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:32.342517 762333 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46af76:sysno 35 D0713 00:00:32.342579 762333 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc0021a0630 9 D0713 00:00:32.342742 762333 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:32.343926 762333 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:32.344015 762333 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0021a0630 10 D0713 00:00:32.344871 762333 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:32.356807 762333 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b020:sysno 39 D0713 00:00:32.356896 762333 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc0021a0630 11 D0713 00:00:32.357075 762333 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:32.359840 762333 usertrap_amd64.go:212] [ 890: 891] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:32.359980 762333 usertrap_amd64.go:122] [ 890: 891] Allocate a new trap: 0xc0021a0630 12 D0713 00:00:32.360161 762333 usertrap_amd64.go:225] [ 890: 891] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:32.360924 762333 task_signals.go:470] [ 890: 890] Notified of signal 23 D0713 00:00:32.361333 762333 task_signals.go:220] [ 890: 890] Signal 23: delivering to handler D0713 00:00:32.371147 762333 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46af29:sysno 293 D0713 00:00:32.371259 762333 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0021a0630 13 D0713 00:00:32.371431 762333 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:32.372175 762333 task_signals.go:470] [ 890: 890] Notified of signal 23 D0713 00:00:32.372334 762333 task_signals.go:220] [ 890: 890] Signal 23: delivering to handler D0713 00:00:32.387887 762333 task_signals.go:470] [ 890: 890] Notified of signal 23 D0713 00:00:32.388484 762333 task_signals.go:220] [ 890: 890] Signal 23: delivering to handler D0713 00:00:32.399601 762333 usertrap_amd64.go:212] [ 890: 890] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:32.399721 762333 usertrap_amd64.go:122] [ 890: 890] Allocate a new trap: 0xc0021a0630 14 D0713 00:00:32.399903 762333 usertrap_amd64.go:225] [ 890: 890] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:32.400438 762333 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.400830 762333 task_signals.go:204] [ 890: 893] Signal 890, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.400889 762333 task_signals.go:204] [ 890: 891] Signal 890, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.401244 762333 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.401472 762333 task_signals.go:204] [ 890: 892] Signal 890, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.401824 762333 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.402026 762333 task_signals.go:204] [ 890: 894] Signal 890, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.402495 762333 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.402576 762333 task_exit.go:204] [ 890: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.402850 762333 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.403144 762333 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.403598 762333 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.403913 762333 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.403999 762333 task_exit.go:204] [ 890: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.404290 762333 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.404352 762333 task_exit.go:204] [ 890: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.424203 762333 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.424367 762333 task_exit.go:204] [ 890: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.424681 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:32.425089 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:32.425232 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:32.426788 762333 task_exit.go:204] [ 890: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.435176 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.435385 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:32.457583 762333 syscalls.go:262] [ 895: 895] Allocating stack with size of 8388608 bytes D0713 00:00:32.460726 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.461398 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:32.465655 762333 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:32.465801 762333 usertrap_amd64.go:106] [ 895: 895] Map a usertrap vma at 69000 D0713 00:00:32.466716 762333 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc00298f770 1 D0713 00:00:32.467082 762333 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:32.470246 762333 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:32.470357 762333 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc00298f770 2 D0713 00:00:32.470536 762333 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:32.475166 762333 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:32.475257 762333 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc00298f770 3 D0713 00:00:32.475544 762333 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:32.498816 762333 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:32.498913 762333 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc00298f770 4 D0713 00:00:32.499089 762333 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:32.501993 762333 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:32.502080 762333 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc00298f770 5 D0713 00:00:32.502224 762333 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:32.502600 762333 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b214:sysno 13 D0713 00:00:32.502661 762333 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc00298f770 6 D0713 00:00:32.502771 762333 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:32.522101 762333 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:32.522197 762333 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc00298f770 7 D0713 00:00:32.522350 762333 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:32.523893 762333 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:32.523968 762333 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc00298f770 8 D0713 00:00:32.524243 762333 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:32.527055 762333 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46af76:sysno 35 D0713 00:00:32.527167 762333 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc00298f770 9 D0713 00:00:32.527397 762333 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:32.529690 762333 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:32.529822 762333 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc00298f770 10 D0713 00:00:32.530098 762333 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:32.542618 762333 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b020:sysno 39 D0713 00:00:32.542735 762333 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc00298f770 11 D0713 00:00:32.543025 762333 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:32.543606 762333 usertrap_amd64.go:212] [ 895: 896] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:32.543697 762333 usertrap_amd64.go:122] [ 895: 896] Allocate a new trap: 0xc00298f770 12 D0713 00:00:32.543840 762333 usertrap_amd64.go:225] [ 895: 896] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:32.544295 762333 task_signals.go:470] [ 895: 895] Notified of signal 23 D0713 00:00:32.544555 762333 task_signals.go:220] [ 895: 895] Signal 23: delivering to handler D0713 00:00:32.557689 762333 task_signals.go:470] [ 895: 895] Notified of signal 23 D0713 00:00:32.557757 762333 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46af29:sysno 293 D0713 00:00:32.557833 762333 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc00298f770 13 D0713 00:00:32.558058 762333 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:32.558389 762333 task_signals.go:220] [ 895: 895] Signal 23: delivering to handler D0713 00:00:32.559587 762333 task_signals.go:470] [ 895: 895] Notified of signal 23 D0713 00:00:32.559998 762333 task_signals.go:220] [ 895: 895] Signal 23: delivering to handler D0713 00:00:32.577078 762333 task_signals.go:470] [ 895: 895] Notified of signal 23 D0713 00:00:32.578393 762333 task_signals.go:220] [ 895: 895] Signal 23: delivering to handler D0713 00:00:32.588226 762333 usertrap_amd64.go:212] [ 895: 895] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:32.588334 762333 usertrap_amd64.go:122] [ 895: 895] Allocate a new trap: 0xc00298f770 14 D0713 00:00:32.588556 762333 usertrap_amd64.go:225] [ 895: 895] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:32.589250 762333 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.589746 762333 task_signals.go:204] [ 895: 898] Signal 895, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.589781 762333 task_signals.go:204] [ 895: 896] Signal 895, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.590027 762333 task_signals.go:204] [ 895: 897] Signal 895, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.590133 762333 task_signals.go:204] [ 895: 899] Signal 895, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.590317 762333 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.590938 762333 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.591018 762333 task_exit.go:204] [ 895: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.591319 762333 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.591505 762333 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.591893 762333 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.592199 762333 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.593373 762333 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.593458 762333 task_exit.go:204] [ 895: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.593831 762333 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.593920 762333 task_exit.go:204] [ 895: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.617995 762333 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.618130 762333 task_exit.go:204] [ 895: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.618414 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:32.618905 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:32.618991 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:32.620652 762333 task_exit.go:204] [ 895: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.628130 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.631136 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:32.649265 762333 syscalls.go:262] [ 900: 900] Allocating stack with size of 8388608 bytes D0713 00:00:32.653148 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.654078 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:32.656002 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:32.656325 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:32.659594 762333 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:32.659846 762333 usertrap_amd64.go:106] [ 900: 900] Map a usertrap vma at 65000 D0713 00:00:32.661143 762333 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0021a0a50 1 D0713 00:00:32.661540 762333 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:32.664033 762333 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:32.664115 762333 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0021a0a50 2 D0713 00:00:32.664299 762333 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:32.667608 762333 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:32.667686 762333 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0021a0a50 3 D0713 00:00:32.667841 762333 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:32.707555 762333 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:32.707664 762333 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0021a0a50 4 D0713 00:00:32.707935 762333 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:32.712165 762333 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:32.712238 762333 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0021a0a50 5 D0713 00:00:32.712369 762333 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:32.713325 762333 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b214:sysno 13 D0713 00:00:32.713443 762333 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0021a0a50 6 D0713 00:00:32.713597 762333 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:32.742099 762333 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:32.742230 762333 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0021a0a50 7 D0713 00:00:32.742372 762333 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:32.744062 762333 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:32.744181 762333 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc0021a0a50 8 D0713 00:00:32.744500 762333 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:32.747769 762333 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:32.747889 762333 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0021a0a50 9 D0713 00:00:32.748100 762333 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:32.748847 762333 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46af76:sysno 35 D0713 00:00:32.748920 762333 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc0021a0a50 10 D0713 00:00:32.750114 762333 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:32.763387 762333 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b020:sysno 39 D0713 00:00:32.763516 762333 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc0021a0a50 11 D0713 00:00:32.763958 762333 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:32.765349 762333 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:32.765420 762333 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc0021a0a50 12 D0713 00:00:32.765591 762333 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:32.766173 762333 task_signals.go:470] [ 900: 900] Notified of signal 23 D0713 00:00:32.766510 762333 task_signals.go:220] [ 900: 900] Signal 23: delivering to handler D0713 00:00:32.782328 762333 task_signals.go:470] [ 900: 900] Notified of signal 23 D0713 00:00:32.782360 762333 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46af29:sysno 293 D0713 00:00:32.782471 762333 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0021a0a50 13 D0713 00:00:32.782667 762333 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:32.783036 762333 task_signals.go:220] [ 900: 900] Signal 23: delivering to handler D0713 00:00:32.803733 762333 task_signals.go:470] [ 900: 900] Notified of signal 23 D0713 00:00:32.806175 762333 task_signals.go:220] [ 900: 900] Signal 23: delivering to handler D0713 00:00:32.816004 762333 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:32.816100 762333 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0021a0a50 14 D0713 00:00:32.816313 762333 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:32.817044 762333 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.817548 762333 task_signals.go:204] [ 900: 904] Signal 900, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.817712 762333 task_signals.go:204] [ 900: 901] Signal 900, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.817754 762333 task_signals.go:204] [ 900: 902] Signal 900, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.817784 762333 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.818041 762333 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.818250 762333 task_signals.go:204] [ 900: 903] Signal 900, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.818426 762333 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.819037 762333 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.819136 762333 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.819368 762333 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.819763 762333 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.819852 762333 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.820209 762333 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.820277 762333 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.820474 762333 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.845214 762333 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.845330 762333 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.845721 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:32.846189 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:32.846373 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:32.848573 762333 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.856539 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:32.858787 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.886610 762333 syscalls.go:262] [ 905: 905] Allocating stack with size of 8388608 bytes D0713 00:00:32.891394 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.892152 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:32.896385 762333 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:32.896592 762333 usertrap_amd64.go:106] [ 905: 905] Map a usertrap vma at 68000 D0713 00:00:32.897722 762333 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc00111d620 1 D0713 00:00:32.898028 762333 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:32.900063 762333 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:32.900121 762333 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc00111d620 2 D0713 00:00:32.900241 762333 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:32.903209 762333 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:32.903279 762333 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc00111d620 3 D0713 00:00:32.903404 762333 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:32.932210 762333 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:32.932348 762333 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc00111d620 4 D0713 00:00:32.932567 762333 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:32.936437 762333 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:32.936506 762333 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc00111d620 5 D0713 00:00:32.936705 762333 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:32.937305 762333 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b214:sysno 13 D0713 00:00:32.937372 762333 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc00111d620 6 D0713 00:00:32.937592 762333 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:32.963668 762333 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:32.963780 762333 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc00111d620 7 D0713 00:00:32.963980 762333 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:32.966186 762333 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:32.966272 762333 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc00111d620 8 D0713 00:00:32.966526 762333 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:32.968536 762333 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46af76:sysno 35 D0713 00:00:32.968593 762333 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc00111d620 9 D0713 00:00:32.968763 762333 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:32.970234 762333 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:32.970318 762333 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc00111d620 10 D0713 00:00:32.970533 762333 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:32.982469 762333 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b020:sysno 39 D0713 00:00:32.982542 762333 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc00111d620 11 D0713 00:00:32.983332 762333 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:32.983859 762333 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:32.983919 762333 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc00111d620 12 D0713 00:00:32.984142 762333 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:32.984680 762333 task_signals.go:470] [ 905: 905] Notified of signal 23 D0713 00:00:32.985712 762333 task_signals.go:220] [ 905: 905] Signal 23: delivering to handler D0713 00:00:32.993811 762333 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46af29:sysno 293 D0713 00:00:32.993898 762333 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc00111d620 13 D0713 00:00:32.994096 762333 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:32.999753 762333 task_signals.go:470] [ 905: 905] Notified of signal 23 D0713 00:00:33.002927 762333 task_signals.go:220] [ 905: 905] Signal 23: delivering to handler D0713 00:00:33.017513 762333 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:33.017593 762333 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc00111d620 14 D0713 00:00:33.017729 762333 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:33.018156 762333 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.018572 762333 task_signals.go:204] [ 905: 908] Signal 905, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.018617 762333 task_signals.go:204] [ 905: 907] Signal 905, PID: 907, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.018796 762333 task_signals.go:204] [ 905: 909] Signal 905, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.019011 762333 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.019180 762333 task_signals.go:204] [ 905: 906] Signal 905, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.019266 762333 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.019462 762333 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.019741 762333 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.020408 762333 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.020492 762333 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.021237 762333 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.021327 762333 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.021505 762333 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.021620 762333 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.021669 762333 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.043134 762333 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.043218 762333 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.043498 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:33.043832 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:33.043932 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:33.045555 762333 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.053443 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.053647 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:33.078273 762333 syscalls.go:262] [ 910: 910] Allocating stack with size of 8388608 bytes D0713 00:00:33.081930 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.082653 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:33.087894 762333 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:33.088064 762333 usertrap_amd64.go:106] [ 910: 910] Map a usertrap vma at 64000 D0713 00:00:33.089035 762333 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000931ce0 1 D0713 00:00:33.089305 762333 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:33.091293 762333 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:33.091345 762333 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000931ce0 2 D0713 00:00:33.091445 762333 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:33.094181 762333 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:33.094232 762333 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000931ce0 3 D0713 00:00:33.094360 762333 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:33.116040 762333 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:33.116147 762333 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000931ce0 4 D0713 00:00:33.116322 762333 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:33.119757 762333 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:33.119864 762333 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000931ce0 5 D0713 00:00:33.120030 762333 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:33.120471 762333 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b214:sysno 13 D0713 00:00:33.120538 762333 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000931ce0 6 D0713 00:00:33.120708 762333 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:33.139825 762333 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:33.139927 762333 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000931ce0 7 D0713 00:00:33.140079 762333 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:33.141850 762333 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:33.141926 762333 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc000931ce0 8 D0713 00:00:33.142125 762333 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:33.144062 762333 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46af76:sysno 35 D0713 00:00:33.144164 762333 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc000931ce0 9 D0713 00:00:33.144451 762333 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:33.145386 762333 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:33.145457 762333 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000931ce0 10 D0713 00:00:33.146280 762333 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:33.158429 762333 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46b020:sysno 39 D0713 00:00:33.158543 762333 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc000931ce0 11 D0713 00:00:33.158779 762333 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:33.159410 762333 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:33.159489 762333 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc000931ce0 12 D0713 00:00:33.159677 762333 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:33.160212 762333 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 00:00:33.160579 762333 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 00:00:33.171910 762333 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 00:00:33.172661 762333 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 00:00:33.174367 762333 task_signals.go:481] [ 910: 910] No task notified of signal 23 D0713 00:00:33.174655 762333 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 00:00:33.176480 762333 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 00:00:33.176774 762333 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 00:00:33.183712 762333 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46af29:sysno 293 D0713 00:00:33.183802 762333 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000931ce0 13 D0713 00:00:33.184051 762333 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:33.190499 762333 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 00:00:33.193560 762333 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 00:00:33.210205 762333 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 00:00:33.210370 762333 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 00:00:33.211690 762333 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:33.211747 762333 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000931ce0 14 D0713 00:00:33.211897 762333 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:33.212241 762333 task_exit.go:204] [ 910: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.212530 762333 task_signals.go:204] [ 910: 913] Signal 910, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.212641 762333 task_signals.go:204] [ 910: 914] Signal 910, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.212689 762333 task_signals.go:204] [ 910: 911] Signal 910, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.212802 762333 task_signals.go:204] [ 910: 912] Signal 910, PID: 912, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.212885 762333 task_exit.go:204] [ 910: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.213122 762333 task_exit.go:204] [ 910: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.213316 762333 task_exit.go:204] [ 910: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.213796 762333 task_exit.go:204] [ 910: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.213985 762333 task_exit.go:204] [ 910: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.214725 762333 task_exit.go:204] [ 910: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.214810 762333 task_exit.go:204] [ 910: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.215146 762333 task_exit.go:204] [ 910: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.215218 762333 task_exit.go:204] [ 910: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.215435 762333 task_exit.go:204] [ 910: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.215500 762333 task_exit.go:204] [ 910: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.235392 762333 task_exit.go:204] [ 910: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.235499 762333 task_exit.go:204] [ 910: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.235740 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:33.236014 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:33.236100 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:33.237758 762333 task_exit.go:204] [ 910: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.245460 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.248421 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:33.267006 762333 syscalls.go:262] [ 915: 915] Allocating stack with size of 8388608 bytes D0713 00:00:33.270319 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.270814 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:33.275366 762333 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:33.275543 762333 usertrap_amd64.go:106] [ 915: 915] Map a usertrap vma at 69000 D0713 00:00:33.276468 762333 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc000931da0 1 D0713 00:00:33.276893 762333 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:33.279522 762333 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:33.279609 762333 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc000931da0 2 D0713 00:00:33.279786 762333 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:33.282664 762333 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:33.282721 762333 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc000931da0 3 D0713 00:00:33.282910 762333 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:33.308259 762333 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:33.308334 762333 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc000931da0 4 D0713 00:00:33.308493 762333 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:33.311851 762333 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:33.311948 762333 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc000931da0 5 D0713 00:00:33.312121 762333 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:33.312506 762333 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b214:sysno 13 D0713 00:00:33.312561 762333 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc000931da0 6 D0713 00:00:33.312679 762333 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:33.332741 762333 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:33.332849 762333 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc000931da0 7 D0713 00:00:33.333076 762333 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:33.334910 762333 usertrap_amd64.go:212] [ 915: 916] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:33.334997 762333 usertrap_amd64.go:122] [ 915: 916] Allocate a new trap: 0xc000931da0 8 D0713 00:00:33.335169 762333 usertrap_amd64.go:225] [ 915: 916] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:33.338074 762333 usertrap_amd64.go:212] [ 915: 916] Found the pattern at ip 46af76:sysno 35 D0713 00:00:33.338161 762333 usertrap_amd64.go:122] [ 915: 916] Allocate a new trap: 0xc000931da0 9 D0713 00:00:33.338422 762333 usertrap_amd64.go:225] [ 915: 916] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:33.339645 762333 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:33.339792 762333 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc000931da0 10 D0713 00:00:33.340083 762333 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:33.353954 762333 usertrap_amd64.go:212] [ 915: 916] Found the pattern at ip 46b020:sysno 39 D0713 00:00:33.354028 762333 usertrap_amd64.go:122] [ 915: 916] Allocate a new trap: 0xc000931da0 11 D0713 00:00:33.354191 762333 usertrap_amd64.go:225] [ 915: 916] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:33.355175 762333 usertrap_amd64.go:212] [ 915: 916] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:33.355267 762333 usertrap_amd64.go:122] [ 915: 916] Allocate a new trap: 0xc000931da0 12 D0713 00:00:33.356053 762333 usertrap_amd64.go:225] [ 915: 916] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:33.357208 762333 task_signals.go:470] [ 915: 915] Notified of signal 23 D0713 00:00:33.358138 762333 task_signals.go:220] [ 915: 915] Signal 23: delivering to handler D0713 00:00:33.359327 762333 task_signals.go:470] [ 915: 915] Notified of signal 23 D0713 00:00:33.359544 762333 task_signals.go:220] [ 915: 915] Signal 23: delivering to handler D0713 00:00:33.366063 762333 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46af29:sysno 293 D0713 00:00:33.366150 762333 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc000931da0 13 D0713 00:00:33.366288 762333 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:33.373184 762333 task_signals.go:470] [ 915: 915] Notified of signal 23 D0713 00:00:33.374837 762333 task_signals.go:220] [ 915: 915] Signal 23: delivering to handler D0713 00:00:33.391970 762333 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:33.392086 762333 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc000931da0 14 D0713 00:00:33.392329 762333 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:33.393131 762333 task_exit.go:204] [ 915: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.393632 762333 task_signals.go:204] [ 915: 919] Signal 915, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.393732 762333 task_signals.go:204] [ 915: 917] Signal 915, PID: 917, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.393798 762333 task_signals.go:204] [ 915: 916] Signal 915, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.393753 762333 task_signals.go:204] [ 915: 920] Signal 915, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.394020 762333 task_exit.go:204] [ 915: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.394305 762333 task_exit.go:204] [ 915: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.394294 762333 task_signals.go:204] [ 915: 918] Signal 915, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.394626 762333 task_exit.go:204] [ 915: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.394819 762333 task_exit.go:204] [ 915: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.395414 762333 task_exit.go:204] [ 915: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.395482 762333 task_exit.go:204] [ 915: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.395733 762333 task_exit.go:204] [ 915: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.396425 762333 task_exit.go:204] [ 915: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.396504 762333 task_exit.go:204] [ 915: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.397045 762333 task_exit.go:204] [ 915: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.397131 762333 task_exit.go:204] [ 915: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.397389 762333 task_exit.go:204] [ 915: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.397544 762333 task_exit.go:204] [ 915: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.397637 762333 task_exit.go:204] [ 915: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.422038 762333 task_exit.go:204] [ 915: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.422166 762333 task_exit.go:204] [ 915: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.422387 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:33.422712 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:33.422807 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:33.424182 762333 task_exit.go:204] [ 915: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.432324 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.433148 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:33.455269 762333 syscalls.go:262] [ 921: 921] Allocating stack with size of 8388608 bytes D0713 00:00:33.458980 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.459731 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:33.464105 762333 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:33.464303 762333 usertrap_amd64.go:106] [ 921: 921] Map a usertrap vma at 6a000 D0713 00:00:33.465307 762333 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc0004f5e60 1 D0713 00:00:33.465585 762333 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:33.467542 762333 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:33.467596 762333 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc0004f5e60 2 D0713 00:00:33.467700 762333 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:33.470029 762333 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:33.470077 762333 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc0004f5e60 3 D0713 00:00:33.470184 762333 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:33.489744 762333 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:33.489834 762333 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc0004f5e60 4 D0713 00:00:33.489997 762333 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:33.492726 762333 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:33.492788 762333 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc0004f5e60 5 D0713 00:00:33.493001 762333 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:33.493369 762333 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b214:sysno 13 D0713 00:00:33.493432 762333 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc0004f5e60 6 D0713 00:00:33.493560 762333 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:33.514315 762333 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:33.514393 762333 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc0004f5e60 7 D0713 00:00:33.514501 762333 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:33.515952 762333 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:33.516062 762333 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc0004f5e60 8 D0713 00:00:33.516291 762333 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:33.517939 762333 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46af76:sysno 35 D0713 00:00:33.518012 762333 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc0004f5e60 9 D0713 00:00:33.518225 762333 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:33.520800 762333 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:33.521038 762333 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc0004f5e60 10 D0713 00:00:33.521334 762333 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:33.533531 762333 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46b020:sysno 39 D0713 00:00:33.533605 762333 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc0004f5e60 11 D0713 00:00:33.533813 762333 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:33.534191 762333 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:33.534240 762333 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc0004f5e60 12 D0713 00:00:33.534366 762333 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:33.535624 762333 task_signals.go:470] [ 921: 921] Notified of signal 23 D0713 00:00:33.536102 762333 task_signals.go:220] [ 921: 921] Signal 23: delivering to handler D0713 00:00:33.543343 762333 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46af29:sysno 293 D0713 00:00:33.543414 762333 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc0004f5e60 13 D0713 00:00:33.543566 762333 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:33.547806 762333 task_signals.go:470] [ 921: 921] Notified of signal 23 D0713 00:00:33.548039 762333 task_signals.go:220] [ 921: 921] Signal 23: delivering to handler D0713 00:00:33.561068 762333 task_signals.go:470] [ 921: 921] Notified of signal 23 D0713 00:00:33.564129 762333 task_signals.go:220] [ 921: 921] Signal 23: delivering to handler D0713 00:00:33.566072 762333 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:33.566149 762333 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc0004f5e60 14 D0713 00:00:33.566278 762333 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:33.566689 762333 task_exit.go:204] [ 921: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.567118 762333 task_signals.go:204] [ 921: 925] Signal 921, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.567156 762333 task_signals.go:204] [ 921: 924] Signal 921, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.567137 762333 task_signals.go:204] [ 921: 923] Signal 921, PID: 923, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.567382 762333 task_exit.go:204] [ 921: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.567530 762333 task_signals.go:204] [ 921: 922] Signal 921, PID: 922, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.567623 762333 task_exit.go:204] [ 921: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.567854 762333 task_exit.go:204] [ 921: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.568340 762333 task_exit.go:204] [ 921: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.568585 762333 task_exit.go:204] [ 921: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.569139 762333 task_exit.go:204] [ 921: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.569218 762333 task_exit.go:204] [ 921: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.569533 762333 task_exit.go:204] [ 921: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.569601 762333 task_exit.go:204] [ 921: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.569819 762333 task_exit.go:204] [ 921: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.569872 762333 task_exit.go:204] [ 921: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.591077 762333 task_exit.go:204] [ 921: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.591199 762333 task_exit.go:204] [ 921: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.591425 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:33.591832 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:33.591903 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:33.593887 762333 task_exit.go:204] [ 921: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.602342 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.602504 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:33.622327 762333 syscalls.go:262] [ 926: 926] Allocating stack with size of 8388608 bytes D0713 00:00:33.625332 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.625810 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:33.629022 762333 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:33.629172 762333 usertrap_amd64.go:106] [ 926: 926] Map a usertrap vma at 66000 D0713 00:00:33.629878 762333 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc000049770 1 D0713 00:00:33.630194 762333 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:33.632018 762333 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:33.632077 762333 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc000049770 2 D0713 00:00:33.632185 762333 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:33.634725 762333 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:33.634797 762333 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc000049770 3 D0713 00:00:33.634905 762333 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:33.656443 762333 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:33.656560 762333 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc000049770 4 D0713 00:00:33.656798 762333 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:33.666480 762333 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:33.666579 762333 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc000049770 5 D0713 00:00:33.666714 762333 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:33.667053 762333 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b214:sysno 13 D0713 00:00:33.667112 762333 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc000049770 6 D0713 00:00:33.667217 762333 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:33.686380 762333 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:33.686452 762333 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc000049770 7 D0713 00:00:33.686594 762333 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:33.687989 762333 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:33.688054 762333 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc000049770 8 D0713 00:00:33.688230 762333 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:33.690560 762333 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46af76:sysno 35 D0713 00:00:33.690680 762333 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc000049770 9 D0713 00:00:33.690857 762333 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:33.691966 762333 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:33.692071 762333 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc000049770 10 D0713 00:00:33.692261 762333 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:33.706593 762333 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b020:sysno 39 D0713 00:00:33.706673 762333 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc000049770 11 D0713 00:00:33.707379 762333 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:33.708199 762333 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:33.708286 762333 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc000049770 12 D0713 00:00:33.708466 762333 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:33.709075 762333 task_signals.go:470] [ 926: 926] Notified of signal 23 D0713 00:00:33.709946 762333 task_signals.go:220] [ 926: 926] Signal 23: delivering to handler D0713 00:00:33.722475 762333 task_signals.go:470] [ 926: 926] Notified of signal 23 D0713 00:00:33.722472 762333 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46af29:sysno 293 D0713 00:00:33.722836 762333 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc000049770 13 D0713 00:00:33.723067 762333 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:33.723428 762333 task_signals.go:220] [ 926: 926] Signal 23: delivering to handler D0713 00:00:33.724868 762333 task_signals.go:470] [ 926: 926] Notified of signal 23 D0713 00:00:33.725502 762333 task_signals.go:220] [ 926: 926] Signal 23: delivering to handler D0713 00:00:33.742572 762333 task_signals.go:470] [ 926: 926] Notified of signal 23 D0713 00:00:33.744251 762333 task_signals.go:220] [ 926: 926] Signal 23: delivering to handler D0713 00:00:33.750723 762333 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:33.750849 762333 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc000049770 14 D0713 00:00:33.751099 762333 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:33.751718 762333 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.752066 762333 task_signals.go:204] [ 926: 927] Signal 926, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.752288 762333 task_signals.go:204] [ 926: 928] Signal 926, PID: 928, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.752499 762333 task_signals.go:204] [ 926: 930] Signal 926, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.752603 762333 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.752765 762333 task_signals.go:204] [ 926: 931] Signal 926, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.753040 762333 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.753301 762333 task_signals.go:204] [ 926: 929] Signal 926, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.753430 762333 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.753703 762333 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.754195 762333 task_exit.go:204] [ 926: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.754472 762333 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.754911 762333 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.755005 762333 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.755411 762333 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.755499 762333 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.756040 762333 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.756111 762333 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.756500 762333 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.756583 762333 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.784483 762333 task_exit.go:204] [ 926: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.784640 762333 task_exit.go:204] [ 926: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.785105 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:33.785637 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:33.785739 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:33.788284 762333 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.796114 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:33.797266 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.820456 762333 syscalls.go:262] [ 932: 932] Allocating stack with size of 8388608 bytes D0713 00:00:33.823561 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.824228 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:33.828646 762333 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:33.828872 762333 usertrap_amd64.go:106] [ 932: 932] Map a usertrap vma at 68000 D0713 00:00:33.829884 762333 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00051ec30 1 D0713 00:00:33.830196 762333 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:33.832407 762333 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:33.832470 762333 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00051ec30 2 D0713 00:00:33.832685 762333 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:33.835754 762333 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:33.835845 762333 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00051ec30 3 D0713 00:00:33.836007 762333 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:33.860779 762333 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:33.860905 762333 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00051ec30 4 D0713 00:00:33.861120 762333 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:33.864166 762333 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:33.864252 762333 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00051ec30 5 D0713 00:00:33.864484 762333 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:33.864860 762333 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b214:sysno 13 D0713 00:00:33.864919 762333 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00051ec30 6 D0713 00:00:33.865117 762333 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:33.894380 762333 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:33.894475 762333 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00051ec30 7 D0713 00:00:33.894689 762333 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:33.896487 762333 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:33.896564 762333 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc00051ec30 8 D0713 00:00:33.896802 762333 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:33.899018 762333 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46af76:sysno 35 D0713 00:00:33.899144 762333 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc00051ec30 9 D0713 00:00:33.899456 762333 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:33.902092 762333 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:33.902209 762333 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00051ec30 10 D0713 00:00:33.902467 762333 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:33.914970 762333 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b020:sysno 39 D0713 00:00:33.915113 762333 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc00051ec30 11 D0713 00:00:33.915701 762333 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:33.916193 762333 usertrap_amd64.go:212] [ 932: 933] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:33.916259 762333 usertrap_amd64.go:122] [ 932: 933] Allocate a new trap: 0xc00051ec30 12 D0713 00:00:33.916443 762333 usertrap_amd64.go:225] [ 932: 933] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:33.916978 762333 task_signals.go:470] [ 932: 932] Notified of signal 23 D0713 00:00:33.917379 762333 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0713 00:00:33.927981 762333 task_signals.go:470] [ 932: 932] Notified of signal 23 D0713 00:00:33.938905 762333 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0713 00:00:33.940740 762333 task_signals.go:470] [ 932: 932] Notified of signal 23 D0713 00:00:33.941147 762333 task_signals.go:179] [ 932: 932] Restarting syscall 202: interrupted by signal 23 D0713 00:00:33.941231 762333 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0713 00:00:33.946588 762333 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46af29:sysno 293 D0713 00:00:33.946684 762333 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00051ec30 13 D0713 00:00:33.946841 762333 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:33.964784 762333 task_signals.go:470] [ 932: 932] Notified of signal 23 D0713 00:00:33.965780 762333 task_signals.go:220] [ 932: 932] Signal 23: delivering to handler D0713 00:00:33.972188 762333 usertrap_amd64.go:212] [ 932: 932] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:33.972301 762333 usertrap_amd64.go:122] [ 932: 932] Allocate a new trap: 0xc00051ec30 14 D0713 00:00:33.972473 762333 usertrap_amd64.go:225] [ 932: 932] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:33.973026 762333 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.973514 762333 task_signals.go:204] [ 932: 933] Signal 932, PID: 933, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.973761 762333 task_signals.go:204] [ 932: 934] Signal 932, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.973833 762333 task_signals.go:204] [ 932: 935] Signal 932, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.973937 762333 task_signals.go:204] [ 932: 936] Signal 932, PID: 936, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.973921 762333 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.974140 762333 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.974476 762333 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.975038 762333 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.975386 762333 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.976012 762333 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.976145 762333 task_exit.go:204] [ 932: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.976409 762333 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.976482 762333 task_exit.go:204] [ 932: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.976695 762333 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.976768 762333 task_exit.go:204] [ 932: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.998453 762333 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.998538 762333 task_exit.go:204] [ 932: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.998736 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:33.998986 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:33.999048 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:34.001336 762333 task_exit.go:204] [ 932: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.009416 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:34.010777 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.033777 762333 syscalls.go:262] [ 937: 937] Allocating stack with size of 8388608 bytes D0713 00:00:34.037110 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.037778 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:34.040869 762333 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:34.041117 762333 usertrap_amd64.go:106] [ 937: 937] Map a usertrap vma at 60000 D0713 00:00:34.042190 762333 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000b0db90 1 D0713 00:00:34.042479 762333 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:34.044203 762333 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:34.044264 762333 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000b0db90 2 D0713 00:00:34.044395 762333 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:34.046916 762333 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:34.046977 762333 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000b0db90 3 D0713 00:00:34.047085 762333 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:34.070209 762333 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:34.070302 762333 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000b0db90 4 D0713 00:00:34.070514 762333 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:34.073596 762333 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:34.073693 762333 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000b0db90 5 D0713 00:00:34.073865 762333 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:34.074316 762333 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b214:sysno 13 D0713 00:00:34.074377 762333 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000b0db90 6 D0713 00:00:34.074569 762333 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:34.094699 762333 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:34.094790 762333 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000b0db90 7 D0713 00:00:34.094963 762333 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:34.096987 762333 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:34.097048 762333 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc000b0db90 8 D0713 00:00:34.097211 762333 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:34.100635 762333 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46af76:sysno 35 D0713 00:00:34.100779 762333 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc000b0db90 9 D0713 00:00:34.101075 762333 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:34.101622 762333 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:34.101714 762333 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000b0db90 10 D0713 00:00:34.102772 762333 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:34.117297 762333 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b020:sysno 39 D0713 00:00:34.117407 762333 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc000b0db90 11 D0713 00:00:34.117643 762333 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:34.118202 762333 usertrap_amd64.go:212] [ 937: 938] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:34.118267 762333 usertrap_amd64.go:122] [ 937: 938] Allocate a new trap: 0xc000b0db90 12 D0713 00:00:34.118471 762333 usertrap_amd64.go:225] [ 937: 938] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:34.120038 762333 task_signals.go:470] [ 937: 937] Notified of signal 23 D0713 00:00:34.120659 762333 task_signals.go:220] [ 937: 937] Signal 23: delivering to handler D0713 00:00:34.130711 762333 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46af29:sysno 293 D0713 00:00:34.130792 762333 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000b0db90 13 D0713 00:00:34.130952 762333 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:34.131752 762333 task_signals.go:470] [ 937: 937] Notified of signal 23 D0713 00:00:34.131914 762333 task_signals.go:220] [ 937: 937] Signal 23: delivering to handler D0713 00:00:34.148372 762333 task_signals.go:470] [ 937: 937] Notified of signal 23 D0713 00:00:34.148767 762333 task_signals.go:220] [ 937: 937] Signal 23: delivering to handler D0713 00:00:34.160174 762333 usertrap_amd64.go:212] [ 937: 937] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:34.160259 762333 usertrap_amd64.go:122] [ 937: 937] Allocate a new trap: 0xc000b0db90 14 D0713 00:00:34.160406 762333 usertrap_amd64.go:225] [ 937: 937] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:34.160990 762333 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.161444 762333 task_signals.go:204] [ 937: 938] Signal 937, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.161456 762333 task_signals.go:204] [ 937: 941] Signal 937, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.161603 762333 task_signals.go:204] [ 937: 942] Signal 937, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.161708 762333 task_signals.go:204] [ 937: 939] Signal 937, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.161739 762333 task_signals.go:204] [ 937: 940] Signal 937, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.161758 762333 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.162081 762333 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.162242 762333 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.162424 762333 task_exit.go:204] [ 937: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.162652 762333 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.163563 762333 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.163632 762333 task_exit.go:204] [ 937: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.163833 762333 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.163881 762333 task_exit.go:204] [ 937: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.164036 762333 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.164086 762333 task_exit.go:204] [ 937: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.164222 762333 task_exit.go:204] [ 937: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.164281 762333 task_exit.go:204] [ 937: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.164467 762333 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.190137 762333 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.190241 762333 task_exit.go:204] [ 937: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.190476 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:34.190840 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:34.190934 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:34.193249 762333 task_exit.go:204] [ 937: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.201186 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:34.203040 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.230916 762333 syscalls.go:262] [ 943: 943] Allocating stack with size of 8388608 bytes D0713 00:00:34.235394 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.236397 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:34.241964 762333 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:34.242187 762333 usertrap_amd64.go:106] [ 943: 943] Map a usertrap vma at 61000 D0713 00:00:34.243434 762333 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001b0f440 1 D0713 00:00:34.243932 762333 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:34.246690 762333 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:34.246768 762333 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001b0f440 2 D0713 00:00:34.246942 762333 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:34.250346 762333 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:34.250487 762333 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001b0f440 3 D0713 00:00:34.250616 762333 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:34.276355 762333 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:34.276485 762333 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001b0f440 4 D0713 00:00:34.276712 762333 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:34.280314 762333 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:34.280402 762333 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001b0f440 5 D0713 00:00:34.280609 762333 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:34.281144 762333 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b214:sysno 13 D0713 00:00:34.281211 762333 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001b0f440 6 D0713 00:00:34.281381 762333 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:34.302584 762333 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:34.302720 762333 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001b0f440 7 D0713 00:00:34.302916 762333 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:34.304803 762333 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:34.304889 762333 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc001b0f440 8 D0713 00:00:34.305184 762333 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:34.307462 762333 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46af76:sysno 35 D0713 00:00:34.307531 762333 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc001b0f440 9 D0713 00:00:34.307753 762333 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:34.309083 762333 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:34.309182 762333 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001b0f440 10 D0713 00:00:34.309464 762333 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:34.322066 762333 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b020:sysno 39 D0713 00:00:34.322156 762333 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc001b0f440 11 D0713 00:00:34.322385 762333 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:34.324168 762333 usertrap_amd64.go:212] [ 943: 944] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:34.324291 762333 usertrap_amd64.go:122] [ 943: 944] Allocate a new trap: 0xc001b0f440 12 D0713 00:00:34.324431 762333 usertrap_amd64.go:225] [ 943: 944] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:34.324843 762333 task_signals.go:470] [ 943: 943] Notified of signal 23 D0713 00:00:34.325079 762333 task_signals.go:220] [ 943: 943] Signal 23: delivering to handler D0713 00:00:34.332351 762333 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46af29:sysno 293 D0713 00:00:34.332455 762333 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001b0f440 13 D0713 00:00:34.332607 762333 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:34.338371 762333 task_signals.go:470] [ 943: 943] Notified of signal 23 D0713 00:00:34.341274 762333 task_signals.go:220] [ 943: 943] Signal 23: delivering to handler D0713 00:00:34.350018 762333 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:34.350139 762333 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001b0f440 14 D0713 00:00:34.350356 762333 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46b6e0 trap addr 61460 ([184 24 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:34.359551 762333 usertrap_amd64.go:212] [ 943: 943] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:34.359644 762333 usertrap_amd64.go:122] [ 943: 943] Allocate a new trap: 0xc001b0f440 15 D0713 00:00:34.359792 762333 usertrap_amd64.go:225] [ 943: 943] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 00:00:34.360230 762333 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.360517 762333 task_signals.go:204] [ 943: 947] Signal 943, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.360549 762333 task_signals.go:204] [ 943: 944] Signal 943, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.360587 762333 task_signals.go:204] [ 943: 946] Signal 943, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.360788 762333 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.361137 762333 task_signals.go:204] [ 943: 945] Signal 943, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.361171 762333 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.361381 762333 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.361554 762333 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.362106 762333 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.362592 762333 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.362696 762333 task_exit.go:204] [ 943: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.363526 762333 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.363621 762333 task_exit.go:204] [ 943: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.363860 762333 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.363925 762333 task_exit.go:204] [ 943: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.390254 762333 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.390352 762333 task_exit.go:204] [ 943: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.390617 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:34.391049 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:34.391163 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:34.393239 762333 task_exit.go:204] [ 943: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.401961 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.402287 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:34.423324 762333 syscalls.go:262] [ 948: 948] Allocating stack with size of 8388608 bytes D0713 00:00:34.426403 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.426973 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:34.431935 762333 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:34.432112 762333 usertrap_amd64.go:106] [ 948: 948] Map a usertrap vma at 63000 D0713 00:00:34.433214 762333 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001b0f6b0 1 D0713 00:00:34.433602 762333 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:34.436404 762333 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:34.436481 762333 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001b0f6b0 2 D0713 00:00:34.436655 762333 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:34.439616 762333 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:34.439711 762333 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001b0f6b0 3 D0713 00:00:34.439881 762333 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:34.467231 762333 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:34.467313 762333 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001b0f6b0 4 D0713 00:00:34.467471 762333 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:34.471219 762333 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:34.471312 762333 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001b0f6b0 5 D0713 00:00:34.471481 762333 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:34.471898 762333 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b214:sysno 13 D0713 00:00:34.472007 762333 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001b0f6b0 6 D0713 00:00:34.472123 762333 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:34.492095 762333 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:34.492175 762333 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001b0f6b0 7 D0713 00:00:34.492321 762333 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:34.493949 762333 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:34.494061 762333 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc001b0f6b0 8 D0713 00:00:34.494314 762333 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:34.496722 762333 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46af76:sysno 35 D0713 00:00:34.496798 762333 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc001b0f6b0 9 D0713 00:00:34.497695 762333 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:34.498048 762333 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:34.498133 762333 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001b0f6b0 10 D0713 00:00:34.498348 762333 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:34.512852 762333 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b020:sysno 39 D0713 00:00:34.513004 762333 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc001b0f6b0 11 D0713 00:00:34.514947 762333 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:34.516252 762333 usertrap_amd64.go:212] [ 948: 949] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:34.516333 762333 usertrap_amd64.go:122] [ 948: 949] Allocate a new trap: 0xc001b0f6b0 12 D0713 00:00:34.516597 762333 usertrap_amd64.go:225] [ 948: 949] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:34.518003 762333 task_signals.go:470] [ 948: 948] Notified of signal 23 D0713 00:00:34.518283 762333 task_signals.go:220] [ 948: 948] Signal 23: delivering to handler D0713 00:00:34.525642 762333 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46af29:sysno 293 D0713 00:00:34.525716 762333 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001b0f6b0 13 D0713 00:00:34.525850 762333 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:34.533309 762333 task_signals.go:470] [ 948: 948] Notified of signal 23 D0713 00:00:34.533655 762333 task_signals.go:220] [ 948: 948] Signal 23: delivering to handler D0713 00:00:34.548808 762333 usertrap_amd64.go:212] [ 948: 948] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:34.548922 762333 usertrap_amd64.go:122] [ 948: 948] Allocate a new trap: 0xc001b0f6b0 14 D0713 00:00:34.549138 762333 usertrap_amd64.go:225] [ 948: 948] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:34.549644 762333 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.550106 762333 task_signals.go:204] [ 948: 950] Signal 948, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.550395 762333 task_signals.go:204] [ 948: 949] Signal 948, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.550813 762333 task_signals.go:204] [ 948: 952] Signal 948, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.550943 762333 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.551156 762333 task_signals.go:204] [ 948: 951] Signal 948, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.551186 762333 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.551142 762333 task_signals.go:204] [ 948: 953] Signal 948, PID: 953, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.551566 762333 task_exit.go:204] [ 948: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.552176 762333 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.552460 762333 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.552712 762333 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.553046 762333 task_exit.go:204] [ 948: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.553182 762333 task_exit.go:204] [ 948: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.553515 762333 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.553604 762333 task_exit.go:204] [ 948: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.554606 762333 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.554669 762333 task_exit.go:204] [ 948: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.554818 762333 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.554865 762333 task_exit.go:204] [ 948: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.577756 762333 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.577853 762333 task_exit.go:204] [ 948: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.578074 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:34.578383 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:34.578472 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:34.580176 762333 task_exit.go:204] [ 948: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.588444 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.590025 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:34.614552 762333 syscalls.go:262] [ 954: 954] Allocating stack with size of 8388608 bytes D0713 00:00:34.618998 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.619662 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:34.625163 762333 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:34.625379 762333 usertrap_amd64.go:106] [ 954: 954] Map a usertrap vma at 64000 D0713 00:00:34.626472 762333 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc001e2a120 1 D0713 00:00:34.626854 762333 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:34.629424 762333 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:34.629511 762333 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc001e2a120 2 D0713 00:00:34.629689 762333 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:34.634696 762333 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:34.634771 762333 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc001e2a120 3 D0713 00:00:34.634941 762333 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:34.660361 762333 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:34.660450 762333 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc001e2a120 4 D0713 00:00:34.660635 762333 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:34.663875 762333 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:34.663939 762333 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc001e2a120 5 D0713 00:00:34.664064 762333 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:34.664438 762333 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b214:sysno 13 D0713 00:00:34.664480 762333 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc001e2a120 6 D0713 00:00:34.664592 762333 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:34.688670 762333 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:34.688741 762333 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc001e2a120 7 D0713 00:00:34.688886 762333 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:34.690888 762333 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:34.690972 762333 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc001e2a120 8 D0713 00:00:34.691235 762333 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:34.693715 762333 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46af76:sysno 35 D0713 00:00:34.693792 762333 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc001e2a120 9 D0713 00:00:34.694053 762333 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:34.695972 762333 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:34.696061 762333 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc001e2a120 10 D0713 00:00:34.696331 762333 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:34.710702 762333 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b020:sysno 39 D0713 00:00:34.710779 762333 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc001e2a120 11 D0713 00:00:34.711024 762333 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:34.711639 762333 usertrap_amd64.go:212] [ 954: 955] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:34.711738 762333 usertrap_amd64.go:122] [ 954: 955] Allocate a new trap: 0xc001e2a120 12 D0713 00:00:34.712597 762333 usertrap_amd64.go:225] [ 954: 955] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:34.714495 762333 task_signals.go:470] [ 954: 954] Notified of signal 23 D0713 00:00:34.714746 762333 task_signals.go:220] [ 954: 954] Signal 23: delivering to handler D0713 00:00:34.727776 762333 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46af29:sysno 293 D0713 00:00:34.727900 762333 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc001e2a120 13 D0713 00:00:34.728028 762333 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:34.735185 762333 task_signals.go:470] [ 954: 954] Notified of signal 23 D0713 00:00:34.736499 762333 task_signals.go:220] [ 954: 954] Signal 23: delivering to handler D0713 00:00:34.753862 762333 usertrap_amd64.go:212] [ 954: 954] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:34.753949 762333 usertrap_amd64.go:122] [ 954: 954] Allocate a new trap: 0xc001e2a120 14 D0713 00:00:34.754070 762333 usertrap_amd64.go:225] [ 954: 954] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:34.754678 762333 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.755084 762333 task_signals.go:204] [ 954: 956] Signal 954, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.755180 762333 task_signals.go:204] [ 954: 959] Signal 954, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.755374 762333 task_signals.go:204] [ 954: 955] Signal 954, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.755434 762333 task_signals.go:204] [ 954: 958] Signal 954, PID: 958, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.755580 762333 task_exit.go:204] [ 954: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.755748 762333 task_signals.go:204] [ 954: 957] Signal 954, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.755932 762333 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.756116 762333 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.756515 762333 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.756593 762333 task_exit.go:204] [ 954: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.756785 762333 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.756867 762333 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.757154 762333 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.757454 762333 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.757507 762333 task_exit.go:204] [ 954: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.758110 762333 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.758181 762333 task_exit.go:204] [ 954: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.758379 762333 task_exit.go:204] [ 954: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.758441 762333 task_exit.go:204] [ 954: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.784918 762333 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.785071 762333 task_exit.go:204] [ 954: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.785612 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:34.786224 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:34.786395 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:34.788125 762333 task_exit.go:204] [ 954: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.796467 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.798082 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:34.820158 762333 syscalls.go:262] [ 960: 960] Allocating stack with size of 8388608 bytes D0713 00:00:34.823731 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.824261 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:34.833317 762333 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:34.833524 762333 usertrap_amd64.go:106] [ 960: 960] Map a usertrap vma at 62000 D0713 00:00:34.845175 762333 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0017169c0 1 D0713 00:00:34.845826 762333 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:34.848624 762333 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:34.848724 762333 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0017169c0 2 D0713 00:00:34.848914 762333 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:34.852445 762333 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:34.852545 762333 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0017169c0 3 D0713 00:00:34.852691 762333 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:34.879147 762333 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:34.879225 762333 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0017169c0 4 D0713 00:00:34.879406 762333 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:34.883028 762333 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:34.883103 762333 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0017169c0 5 D0713 00:00:34.883259 762333 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:34.883698 762333 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b214:sysno 13 D0713 00:00:34.883737 762333 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0017169c0 6 D0713 00:00:34.883871 762333 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:34.907583 762333 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:34.907659 762333 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0017169c0 7 D0713 00:00:34.907848 762333 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:34.909781 762333 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:34.909879 762333 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc0017169c0 8 D0713 00:00:34.910103 762333 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:34.911445 762333 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46af76:sysno 35 D0713 00:00:34.911520 762333 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc0017169c0 9 D0713 00:00:34.911762 762333 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:34.912771 762333 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:34.912863 762333 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0017169c0 10 D0713 00:00:34.914169 762333 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:34.928591 762333 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b020:sysno 39 D0713 00:00:34.928722 762333 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc0017169c0 11 D0713 00:00:34.929027 762333 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:34.929653 762333 usertrap_amd64.go:212] [ 960: 961] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:34.929768 762333 usertrap_amd64.go:122] [ 960: 961] Allocate a new trap: 0xc0017169c0 12 D0713 00:00:34.930672 762333 usertrap_amd64.go:225] [ 960: 961] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:34.931091 762333 task_signals.go:470] [ 960: 960] Notified of signal 23 D0713 00:00:34.931336 762333 task_signals.go:220] [ 960: 960] Signal 23: delivering to handler D0713 00:00:34.944347 762333 task_signals.go:470] [ 960: 960] Notified of signal 23 D0713 00:00:34.944603 762333 task_signals.go:220] [ 960: 960] Signal 23: delivering to handler D0713 00:00:34.946451 762333 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46af29:sysno 293 D0713 00:00:34.946537 762333 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0017169c0 13 D0713 00:00:34.946846 762333 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:34.947378 762333 task_signals.go:470] [ 960: 960] Notified of signal 23 D0713 00:00:34.947941 762333 task_signals.go:220] [ 960: 960] Signal 23: delivering to handler D0713 00:00:34.949532 762333 task_signals.go:470] [ 960: 960] Notified of signal 23 D0713 00:00:34.949978 762333 task_signals.go:220] [ 960: 960] Signal 23: delivering to handler D0713 00:00:34.968016 762333 task_signals.go:470] [ 960: 960] Notified of signal 23 D0713 00:00:34.970531 762333 task_signals.go:220] [ 960: 960] Signal 23: delivering to handler D0713 00:00:34.988402 762333 usertrap_amd64.go:212] [ 960: 960] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:34.988552 762333 usertrap_amd64.go:122] [ 960: 960] Allocate a new trap: 0xc0017169c0 14 D0713 00:00:34.988820 762333 usertrap_amd64.go:225] [ 960: 960] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:34.989413 762333 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.989855 762333 task_signals.go:204] [ 960: 963] Signal 960, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.989973 762333 task_signals.go:204] [ 960: 964] Signal 960, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.990141 762333 task_signals.go:204] [ 960: 965] Signal 960, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.990223 762333 task_signals.go:204] [ 960: 962] Signal 960, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.990291 762333 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.990504 762333 task_signals.go:204] [ 960: 961] Signal 960, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.990576 762333 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.990991 762333 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.991948 762333 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.992143 762333 task_exit.go:204] [ 960: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.992460 762333 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.993164 762333 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.993242 762333 task_exit.go:204] [ 960: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.993874 762333 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.993987 762333 task_exit.go:204] [ 960: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.994238 762333 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.994306 762333 task_exit.go:204] [ 960: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.994467 762333 task_exit.go:204] [ 960: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.994575 762333 task_exit.go:204] [ 960: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.021480 762333 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.021601 762333 task_exit.go:204] [ 960: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.021922 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:35.022327 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:35.022454 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:35.024579 762333 task_exit.go:204] [ 960: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.033662 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.033993 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:35.055989 762333 syscalls.go:262] [ 966: 966] Allocating stack with size of 8388608 bytes D0713 00:00:35.058990 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.059857 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:35.063935 762333 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:35.064111 762333 usertrap_amd64.go:106] [ 966: 966] Map a usertrap vma at 62000 D0713 00:00:35.065226 762333 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc00051f2f0 1 D0713 00:00:35.065545 762333 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:35.067547 762333 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:35.067625 762333 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc00051f2f0 2 D0713 00:00:35.067739 762333 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:35.070567 762333 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:35.070624 762333 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc00051f2f0 3 D0713 00:00:35.070754 762333 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:35.093764 762333 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:35.093841 762333 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc00051f2f0 4 D0713 00:00:35.093990 762333 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:35.097164 762333 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:35.097236 762333 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc00051f2f0 5 D0713 00:00:35.097385 762333 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:35.097838 762333 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b214:sysno 13 D0713 00:00:35.097905 762333 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc00051f2f0 6 D0713 00:00:35.098020 762333 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:35.119337 762333 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:35.119418 762333 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc00051f2f0 7 D0713 00:00:35.119539 762333 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:35.121375 762333 usertrap_amd64.go:212] [ 966: 967] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:35.121495 762333 usertrap_amd64.go:122] [ 966: 967] Allocate a new trap: 0xc00051f2f0 8 D0713 00:00:35.121716 762333 usertrap_amd64.go:225] [ 966: 967] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:35.124146 762333 usertrap_amd64.go:212] [ 966: 967] Found the pattern at ip 46af76:sysno 35 D0713 00:00:35.124237 762333 usertrap_amd64.go:122] [ 966: 967] Allocate a new trap: 0xc00051f2f0 9 D0713 00:00:35.124460 762333 usertrap_amd64.go:225] [ 966: 967] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:35.125393 762333 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:35.125561 762333 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc00051f2f0 10 D0713 00:00:35.127309 762333 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:35.140511 762333 usertrap_amd64.go:212] [ 966: 967] Found the pattern at ip 46b020:sysno 39 D0713 00:00:35.140604 762333 usertrap_amd64.go:122] [ 966: 967] Allocate a new trap: 0xc00051f2f0 11 D0713 00:00:35.140814 762333 usertrap_amd64.go:225] [ 966: 967] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:35.141617 762333 usertrap_amd64.go:212] [ 966: 967] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:35.141698 762333 usertrap_amd64.go:122] [ 966: 967] Allocate a new trap: 0xc00051f2f0 12 D0713 00:00:35.142613 762333 usertrap_amd64.go:225] [ 966: 967] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:35.145264 762333 task_signals.go:470] [ 966: 966] Notified of signal 23 D0713 00:00:35.145964 762333 task_signals.go:220] [ 966: 966] Signal 23: delivering to handler D0713 00:00:35.152529 762333 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46af29:sysno 293 D0713 00:00:35.152624 762333 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc00051f2f0 13 D0713 00:00:35.152883 762333 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:35.158010 762333 task_signals.go:470] [ 966: 966] Notified of signal 23 D0713 00:00:35.158348 762333 task_signals.go:220] [ 966: 966] Signal 23: delivering to handler D0713 00:00:35.171260 762333 task_signals.go:470] [ 966: 966] Notified of signal 23 D0713 00:00:35.171690 762333 task_signals.go:220] [ 966: 966] Signal 23: delivering to handler I0713 00:00:35.177537 762333 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0713 00:00:35.177840 762333 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:35.177908 762333 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc00051f2f0 14 D0713 00:00:35.178105 762333 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:35.178569 762333 task_exit.go:204] [ 966: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.178945 762333 task_signals.go:204] [ 966: 967] Signal 966, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.179073 762333 task_signals.go:204] [ 966: 969] Signal 966, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.179262 762333 task_signals.go:204] [ 966: 968] Signal 966, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.179422 762333 task_signals.go:204] [ 966: 971] Signal 966, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.179506 762333 task_exit.go:204] [ 966: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated executing program D0713 00:00:35.179732 762333 task_signals.go:204] [ 966: 970] Signal 966, PID: 970, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.180273 762333 task_exit.go:204] [ 966: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.180446 762333 task_exit.go:204] [ 966: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.180589 762333 task_exit.go:204] [ 966: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.181137 762333 task_exit.go:204] [ 966: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.181502 762333 task_exit.go:204] [ 966: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.181571 762333 task_exit.go:204] [ 966: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.181822 762333 task_exit.go:204] [ 966: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.182296 762333 task_exit.go:204] [ 966: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.182418 762333 task_exit.go:204] [ 966: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.182642 762333 task_exit.go:204] [ 966: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.182704 762333 task_exit.go:204] [ 966: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.182899 762333 task_exit.go:204] [ 966: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.182990 762333 task_exit.go:204] [ 966: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.205239 762333 task_exit.go:204] [ 966: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.205355 762333 task_exit.go:204] [ 966: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.205628 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:35.206047 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:35.206127 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:35.208437 762333 task_exit.go:204] [ 966: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.216176 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:35.217658 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.241423 762333 syscalls.go:262] [ 972: 972] Allocating stack with size of 8388608 bytes D0713 00:00:35.244499 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.245596 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:35.251397 762333 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:35.251601 762333 usertrap_amd64.go:106] [ 972: 972] Map a usertrap vma at 68000 D0713 00:00:35.252564 762333 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc00051faa0 1 D0713 00:00:35.252868 762333 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:35.255274 762333 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:35.255354 762333 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc00051faa0 2 D0713 00:00:35.255518 762333 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:35.261911 762333 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:35.261997 762333 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc00051faa0 3 D0713 00:00:35.262138 762333 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:35.290468 762333 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:35.290569 762333 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc00051faa0 4 D0713 00:00:35.290741 762333 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:35.294264 762333 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:35.294327 762333 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc00051faa0 5 D0713 00:00:35.294469 762333 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:35.294839 762333 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b214:sysno 13 D0713 00:00:35.294897 762333 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc00051faa0 6 D0713 00:00:35.295013 762333 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:35.311278 762333 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:35.311350 762333 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc00051faa0 7 D0713 00:00:35.311456 762333 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:35.312911 762333 usertrap_amd64.go:212] [ 972: 973] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:35.313080 762333 usertrap_amd64.go:122] [ 972: 973] Allocate a new trap: 0xc00051faa0 8 D0713 00:00:35.313305 762333 usertrap_amd64.go:225] [ 972: 973] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:35.316532 762333 usertrap_amd64.go:212] [ 972: 973] Found the pattern at ip 46af76:sysno 35 D0713 00:00:35.316602 762333 usertrap_amd64.go:122] [ 972: 973] Allocate a new trap: 0xc00051faa0 9 D0713 00:00:35.316770 762333 usertrap_amd64.go:225] [ 972: 973] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:35.317253 762333 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:35.317341 762333 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc00051faa0 10 D0713 00:00:35.318137 762333 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:35.331272 762333 usertrap_amd64.go:212] [ 972: 973] Found the pattern at ip 46b020:sysno 39 D0713 00:00:35.331423 762333 usertrap_amd64.go:122] [ 972: 973] Allocate a new trap: 0xc00051faa0 11 D0713 00:00:35.331647 762333 usertrap_amd64.go:225] [ 972: 973] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:35.331985 762333 usertrap_amd64.go:212] [ 972: 973] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:35.332023 762333 usertrap_amd64.go:122] [ 972: 973] Allocate a new trap: 0xc00051faa0 12 D0713 00:00:35.332168 762333 usertrap_amd64.go:225] [ 972: 973] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:35.333478 762333 task_signals.go:470] [ 972: 972] Notified of signal 23 D0713 00:00:35.333690 762333 task_signals.go:220] [ 972: 972] Signal 23: delivering to handler D0713 00:00:35.343290 762333 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46af29:sysno 293 D0713 00:00:35.343403 762333 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc00051faa0 13 D0713 00:00:35.343606 762333 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:35.344399 762333 task_signals.go:470] [ 972: 972] Notified of signal 23 D0713 00:00:35.344570 762333 task_signals.go:220] [ 972: 972] Signal 23: delivering to handler D0713 00:00:35.345640 762333 task_signals.go:470] [ 972: 972] Notified of signal 23 D0713 00:00:35.345841 762333 task_signals.go:220] [ 972: 972] Signal 23: delivering to handler D0713 00:00:35.358189 762333 task_signals.go:470] [ 972: 972] Notified of signal 23 D0713 00:00:35.358371 762333 task_signals.go:220] [ 972: 972] Signal 23: delivering to handler D0713 00:00:35.371666 762333 usertrap_amd64.go:212] [ 972: 972] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:35.371770 762333 usertrap_amd64.go:122] [ 972: 972] Allocate a new trap: 0xc00051faa0 14 D0713 00:00:35.371954 762333 usertrap_amd64.go:225] [ 972: 972] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:35.372936 762333 task_exit.go:204] [ 972: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.373266 762333 task_signals.go:204] [ 972: 973] Signal 972, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.373303 762333 task_signals.go:204] [ 972: 975] Signal 972, PID: 975, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.373572 762333 task_signals.go:204] [ 972: 974] Signal 972, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.373634 762333 task_signals.go:204] [ 972: 976] Signal 972, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.373669 762333 task_exit.go:204] [ 972: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.374057 762333 task_signals.go:204] [ 972: 977] Signal 972, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.374105 762333 task_exit.go:204] [ 972: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.374500 762333 task_exit.go:204] [ 972: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.374738 762333 task_exit.go:204] [ 972: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.375471 762333 task_exit.go:204] [ 972: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.376415 762333 task_exit.go:204] [ 972: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.376499 762333 task_exit.go:204] [ 972: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.376796 762333 task_exit.go:204] [ 972: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.377021 762333 task_exit.go:204] [ 972: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.377110 762333 task_exit.go:204] [ 972: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.377344 762333 task_exit.go:204] [ 972: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.377421 762333 task_exit.go:204] [ 972: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.377666 762333 task_exit.go:204] [ 972: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.377750 762333 task_exit.go:204] [ 972: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.399182 762333 task_exit.go:204] [ 972: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.399262 762333 task_exit.go:204] [ 972: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.399508 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:35.399748 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:35.399819 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:35.401484 762333 task_exit.go:204] [ 972: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.449587 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:35.449800 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:35.475514 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:35.475936 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:35.505185 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:35.505675 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:35.541590 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:35.542172 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:35.575261 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:35.575492 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:35.587506 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:35.587813 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:35.614613 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:35.614884 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:35.632544 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:35.634856 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.658584 762333 syscalls.go:262] [ 978: 978] Allocating stack with size of 8388608 bytes D0713 00:00:35.661796 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.662771 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:35.666751 762333 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:35.667018 762333 usertrap_amd64.go:106] [ 978: 978] Map a usertrap vma at 6a000 D0713 00:00:35.668000 762333 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc000a43560 1 D0713 00:00:35.668470 762333 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:35.671008 762333 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:35.671071 762333 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc000a43560 2 D0713 00:00:35.671181 762333 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:35.673991 762333 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:35.674051 762333 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc000a43560 3 D0713 00:00:35.674208 762333 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:35.697186 762333 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:35.697293 762333 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc000a43560 4 D0713 00:00:35.697433 762333 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:35.700244 762333 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:35.700331 762333 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc000a43560 5 D0713 00:00:35.700459 762333 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:35.700796 762333 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b214:sysno 13 D0713 00:00:35.700856 762333 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc000a43560 6 D0713 00:00:35.701005 762333 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:35.719574 762333 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:35.719646 762333 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc000a43560 7 D0713 00:00:35.719810 762333 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:35.721592 762333 usertrap_amd64.go:212] [ 978: 979] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:35.721685 762333 usertrap_amd64.go:122] [ 978: 979] Allocate a new trap: 0xc000a43560 8 D0713 00:00:35.721915 762333 usertrap_amd64.go:225] [ 978: 979] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:35.723626 762333 usertrap_amd64.go:212] [ 978: 979] Found the pattern at ip 46af76:sysno 35 D0713 00:00:35.723754 762333 usertrap_amd64.go:122] [ 978: 979] Allocate a new trap: 0xc000a43560 9 D0713 00:00:35.724660 762333 usertrap_amd64.go:225] [ 978: 979] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:35.725187 762333 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:35.725337 762333 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc000a43560 10 D0713 00:00:35.725535 762333 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:35.738113 762333 usertrap_amd64.go:212] [ 978: 979] Found the pattern at ip 46b020:sysno 39 D0713 00:00:35.738232 762333 usertrap_amd64.go:122] [ 978: 979] Allocate a new trap: 0xc000a43560 11 D0713 00:00:35.738947 762333 usertrap_amd64.go:225] [ 978: 979] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:35.739443 762333 usertrap_amd64.go:212] [ 978: 979] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:35.739516 762333 usertrap_amd64.go:122] [ 978: 979] Allocate a new trap: 0xc000a43560 12 D0713 00:00:35.739728 762333 usertrap_amd64.go:225] [ 978: 979] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:35.740223 762333 task_signals.go:470] [ 978: 978] Notified of signal 23 D0713 00:00:35.740485 762333 task_signals.go:220] [ 978: 978] Signal 23: delivering to handler D0713 00:00:35.748374 762333 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46af29:sysno 293 D0713 00:00:35.748456 762333 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc000a43560 13 D0713 00:00:35.748682 762333 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:35.753499 762333 task_signals.go:470] [ 978: 978] Notified of signal 23 D0713 00:00:35.753918 762333 task_signals.go:220] [ 978: 978] Signal 23: delivering to handler D0713 00:00:35.767653 762333 task_signals.go:470] [ 978: 978] Notified of signal 23 D0713 00:00:35.769542 762333 task_signals.go:220] [ 978: 978] Signal 23: delivering to handler I0713 00:00:35.771324 762333 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0713 00:00:35.771623 762333 usertrap_amd64.go:212] [ 978: 978] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:35.771693 762333 usertrap_amd64.go:122] [ 978: 978] Allocate a new trap: 0xc000a43560 14 D0713 00:00:35.771842 762333 usertrap_amd64.go:225] [ 978: 978] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:35.773247 762333 task_exit.go:204] [ 978: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.773572 762333 task_signals.go:204] [ 978: 980] Signal 978, PID: 980, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.773620 762333 task_signals.go:204] [ 978: 982] Signal 978, PID: 982, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.773624 762333 task_signals.go:204] [ 978: 979] Signal 978, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.773785 762333 task_exit.go:204] [ 978: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.773776 762333 task_signals.go:204] [ 978: 981] Signal 978, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.773952 762333 task_exit.go:204] [ 978: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.774376 762333 task_exit.go:204] [ 978: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.775011 762333 task_exit.go:204] [ 978: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.775262 762333 task_exit.go:204] [ 978: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.775478 762333 task_exit.go:204] [ 978: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.775570 762333 task_exit.go:204] [ 978: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.775987 762333 task_exit.go:204] [ 978: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.776076 762333 task_exit.go:204] [ 978: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.776271 762333 task_exit.go:204] [ 978: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.776332 762333 task_exit.go:204] [ 978: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.797624 762333 task_exit.go:204] [ 978: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.797705 762333 task_exit.go:204] [ 978: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.797976 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:35.798427 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:35.798562 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:35.800356 762333 task_exit.go:204] [ 978: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.807430 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.808378 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:35.828969 762333 syscalls.go:262] [ 983: 983] Allocating stack with size of 8388608 bytes D0713 00:00:35.832639 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.833238 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:35.835439 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:35.835925 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:35.837693 762333 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:35.837949 762333 usertrap_amd64.go:106] [ 983: 983] Map a usertrap vma at 61000 D0713 00:00:35.839422 762333 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc000762f00 1 D0713 00:00:35.839862 762333 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:35.842302 762333 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:35.842371 762333 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc000762f00 2 D0713 00:00:35.842530 762333 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:35.846690 762333 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:35.846803 762333 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc000762f00 3 D0713 00:00:35.846986 762333 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:35.870410 762333 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:35.870502 762333 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc000762f00 4 D0713 00:00:35.870667 762333 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:35.873982 762333 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:35.874039 762333 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc000762f00 5 D0713 00:00:35.874168 762333 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:35.874572 762333 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b214:sysno 13 D0713 00:00:35.874633 762333 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc000762f00 6 D0713 00:00:35.874801 762333 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:35.895863 762333 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:35.895956 762333 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc000762f00 7 D0713 00:00:35.896090 762333 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:35.897644 762333 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:35.897766 762333 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc000762f00 8 D0713 00:00:35.898001 762333 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:35.900746 762333 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46af76:sysno 35 D0713 00:00:35.900829 762333 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc000762f00 9 D0713 00:00:35.901046 762333 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:35.902157 762333 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:35.902237 762333 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc000762f00 10 D0713 00:00:35.902500 762333 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:35.916251 762333 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46b020:sysno 39 D0713 00:00:35.916366 762333 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc000762f00 11 D0713 00:00:35.916530 762333 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:35.916896 762333 usertrap_amd64.go:212] [ 983: 984] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:35.916993 762333 usertrap_amd64.go:122] [ 983: 984] Allocate a new trap: 0xc000762f00 12 D0713 00:00:35.917119 762333 usertrap_amd64.go:225] [ 983: 984] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:35.917579 762333 task_signals.go:470] [ 983: 983] Notified of signal 23 D0713 00:00:35.918025 762333 task_signals.go:220] [ 983: 983] Signal 23: delivering to handler D0713 00:00:35.928624 762333 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46af29:sysno 293 D0713 00:00:35.928738 762333 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc000762f00 13 D0713 00:00:35.928871 762333 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:35.929130 762333 task_signals.go:470] [ 983: 983] Notified of signal 23 D0713 00:00:35.929874 762333 task_signals.go:220] [ 983: 983] Signal 23: delivering to handler D0713 00:00:35.930879 762333 task_signals.go:470] [ 983: 983] Notified of signal 23 D0713 00:00:35.931115 762333 task_signals.go:220] [ 983: 983] Signal 23: delivering to handler D0713 00:00:35.945283 762333 task_signals.go:470] [ 983: 983] Notified of signal 23 D0713 00:00:35.945587 762333 task_signals.go:220] [ 983: 983] Signal 23: delivering to handler I0713 00:00:35.957069 762333 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0713 00:00:35.957372 762333 usertrap_amd64.go:212] [ 983: 983] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:35.957468 762333 usertrap_amd64.go:122] [ 983: 983] Allocate a new trap: 0xc000762f00 14 D0713 00:00:35.957659 762333 usertrap_amd64.go:225] [ 983: 983] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:35.958223 762333 task_exit.go:204] [ 983: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.958819 762333 task_signals.go:204] [ 983: 986] Signal 983, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.958892 762333 task_signals.go:204] [ 983: 984] Signal 983, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.958905 762333 task_signals.go:204] [ 983: 985] Signal 983, PID: 985, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.959311 762333 task_signals.go:204] [ 983: 988] Signal 983, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.959465 762333 task_signals.go:204] [ 983: 987] Signal 983, PID: 987, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.959558 762333 task_exit.go:204] [ 983: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.959963 762333 task_exit.go:204] [ 983: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.960228 762333 task_exit.go:204] [ 983: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.960480 762333 task_exit.go:204] [ 983: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.960747 762333 task_exit.go:204] [ 983: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.961061 762333 task_exit.go:204] [ 983: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.961781 762333 task_exit.go:204] [ 983: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.961863 762333 task_exit.go:204] [ 983: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.962203 762333 task_exit.go:204] [ 983: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.962263 762333 task_exit.go:204] [ 983: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.962685 762333 task_exit.go:204] [ 983: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.962761 762333 task_exit.go:204] [ 983: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.962942 762333 task_exit.go:204] [ 983: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.963024 762333 task_exit.go:204] [ 983: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.987588 762333 task_exit.go:204] [ 983: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.987667 762333 task_exit.go:204] [ 983: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.987897 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:35.988207 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:35.988286 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:35.990022 762333 task_exit.go:204] [ 983: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.998230 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.998402 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:36.021702 762333 syscalls.go:262] [ 989: 989] Allocating stack with size of 8388608 bytes D0713 00:00:36.025819 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.026464 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:36.031131 762333 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:36.031298 762333 usertrap_amd64.go:106] [ 989: 989] Map a usertrap vma at 6a000 D0713 00:00:36.032283 762333 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001717bf0 1 D0713 00:00:36.032593 762333 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:36.034620 762333 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:36.034717 762333 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001717bf0 2 D0713 00:00:36.034893 762333 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:36.037316 762333 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:36.037376 762333 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001717bf0 3 D0713 00:00:36.037494 762333 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:36.059094 762333 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:36.059188 762333 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001717bf0 4 D0713 00:00:36.059461 762333 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:36.062947 762333 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:36.063009 762333 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001717bf0 5 D0713 00:00:36.063163 762333 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:36.063546 762333 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b214:sysno 13 D0713 00:00:36.063592 762333 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001717bf0 6 D0713 00:00:36.063721 762333 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:36.087771 762333 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:36.087895 762333 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001717bf0 7 D0713 00:00:36.088111 762333 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:36.089962 762333 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:36.090024 762333 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc001717bf0 8 D0713 00:00:36.090223 762333 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:36.092491 762333 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46af76:sysno 35 D0713 00:00:36.092564 762333 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc001717bf0 9 D0713 00:00:36.092804 762333 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:36.095366 762333 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:36.095487 762333 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001717bf0 10 D0713 00:00:36.095777 762333 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:36.108084 762333 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46b020:sysno 39 D0713 00:00:36.108248 762333 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc001717bf0 11 D0713 00:00:36.108540 762333 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:36.109190 762333 usertrap_amd64.go:212] [ 989: 990] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:36.109299 762333 usertrap_amd64.go:122] [ 989: 990] Allocate a new trap: 0xc001717bf0 12 D0713 00:00:36.109417 762333 usertrap_amd64.go:225] [ 989: 990] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:36.109785 762333 task_signals.go:470] [ 989: 989] Notified of signal 23 D0713 00:00:36.110044 762333 task_signals.go:220] [ 989: 989] Signal 23: delivering to handler D0713 00:00:36.122603 762333 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46af29:sysno 293 D0713 00:00:36.122694 762333 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001717bf0 13 D0713 00:00:36.122875 762333 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:36.123300 762333 task_signals.go:470] [ 989: 989] Notified of signal 23 D0713 00:00:36.123875 762333 task_signals.go:220] [ 989: 989] Signal 23: delivering to handler D0713 00:00:36.141781 762333 task_signals.go:470] [ 989: 989] Notified of signal 23 D0713 00:00:36.142469 762333 task_signals.go:220] [ 989: 989] Signal 23: delivering to handler I0713 00:00:36.149667 762333 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0713 00:00:36.149970 762333 usertrap_amd64.go:212] [ 989: 989] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:36.150045 762333 usertrap_amd64.go:122] [ 989: 989] Allocate a new trap: 0xc001717bf0 14 D0713 00:00:36.150249 762333 usertrap_amd64.go:225] [ 989: 989] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:36.150807 762333 task_exit.go:204] [ 989: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.151350 762333 task_signals.go:204] [ 989: 991] Signal 989, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.151566 762333 task_signals.go:204] [ 989: 990] Signal 989, PID: 990, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.151608 762333 task_signals.go:204] [ 989: 993] Signal 989, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.151801 762333 task_signals.go:204] [ 989: 992] Signal 989, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.151862 762333 task_exit.go:204] [ 989: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.152115 762333 task_exit.go:204] [ 989: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.152410 762333 task_exit.go:204] [ 989: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.152585 762333 task_exit.go:204] [ 989: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.152851 762333 task_exit.go:204] [ 989: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.153583 762333 task_exit.go:204] [ 989: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.153654 762333 task_exit.go:204] [ 989: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.153947 762333 task_exit.go:204] [ 989: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.154005 762333 task_exit.go:204] [ 989: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.154256 762333 task_exit.go:204] [ 989: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.154305 762333 task_exit.go:204] [ 989: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.175851 762333 task_exit.go:204] [ 989: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.175960 762333 task_exit.go:204] [ 989: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.176218 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:36.176571 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:36.176682 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:36.178343 762333 task_exit.go:204] [ 989: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.185359 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.186739 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:36.209097 762333 syscalls.go:262] [ 994: 994] Allocating stack with size of 8388608 bytes D0713 00:00:36.212595 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.213212 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:36.216835 762333 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:36.217057 762333 usertrap_amd64.go:106] [ 994: 994] Map a usertrap vma at 62000 D0713 00:00:36.217884 762333 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc0025c4000 1 D0713 00:00:36.218138 762333 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:36.220011 762333 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:36.220077 762333 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc0025c4000 2 D0713 00:00:36.220205 762333 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:36.222797 762333 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:36.222847 762333 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc0025c4000 3 D0713 00:00:36.222972 762333 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:36.245252 762333 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:36.245340 762333 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc0025c4000 4 D0713 00:00:36.245488 762333 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:36.248562 762333 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:36.248656 762333 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc0025c4000 5 D0713 00:00:36.248815 762333 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:36.249592 762333 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b214:sysno 13 D0713 00:00:36.249746 762333 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc0025c4000 6 D0713 00:00:36.249937 762333 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:36.282025 762333 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:36.282150 762333 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc0025c4000 7 D0713 00:00:36.282291 762333 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:36.283666 762333 usertrap_amd64.go:212] [ 994: 995] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:36.283810 762333 usertrap_amd64.go:122] [ 994: 995] Allocate a new trap: 0xc0025c4000 8 D0713 00:00:36.284014 762333 usertrap_amd64.go:225] [ 994: 995] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:36.286169 762333 usertrap_amd64.go:212] [ 994: 995] Found the pattern at ip 46af76:sysno 35 D0713 00:00:36.286247 762333 usertrap_amd64.go:122] [ 994: 995] Allocate a new trap: 0xc0025c4000 9 D0713 00:00:36.286426 762333 usertrap_amd64.go:225] [ 994: 995] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:36.287067 762333 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:36.287143 762333 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc0025c4000 10 D0713 00:00:36.287312 762333 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:36.300658 762333 usertrap_amd64.go:212] [ 994: 995] Found the pattern at ip 46b020:sysno 39 D0713 00:00:36.300744 762333 usertrap_amd64.go:122] [ 994: 995] Allocate a new trap: 0xc0025c4000 11 D0713 00:00:36.300886 762333 usertrap_amd64.go:225] [ 994: 995] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:36.302693 762333 usertrap_amd64.go:212] [ 994: 995] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:36.302819 762333 usertrap_amd64.go:122] [ 994: 995] Allocate a new trap: 0xc0025c4000 12 D0713 00:00:36.303053 762333 usertrap_amd64.go:225] [ 994: 995] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:36.303620 762333 task_signals.go:470] [ 994: 994] Notified of signal 23 D0713 00:00:36.303860 762333 task_signals.go:220] [ 994: 994] Signal 23: delivering to handler D0713 00:00:36.310048 762333 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46af29:sysno 293 D0713 00:00:36.310124 762333 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc0025c4000 13 D0713 00:00:36.310262 762333 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:36.316230 762333 task_signals.go:470] [ 994: 994] Notified of signal 23 D0713 00:00:36.317854 762333 task_signals.go:220] [ 994: 994] Signal 23: delivering to handler I0713 00:00:36.331697 762333 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0713 00:00:36.331973 762333 usertrap_amd64.go:212] [ 994: 994] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:36.332049 762333 usertrap_amd64.go:122] [ 994: 994] Allocate a new trap: 0xc0025c4000 14 D0713 00:00:36.332246 762333 usertrap_amd64.go:225] [ 994: 994] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:36.332757 762333 task_exit.go:204] [ 994: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.333136 762333 task_signals.go:204] [ 994: 998] Signal 994, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.333305 762333 task_exit.go:204] [ 994: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.333145 762333 task_signals.go:204] [ 994: 996] Signal 994, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.333132 762333 task_signals.go:204] [ 994: 997] Signal 994, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.333529 762333 task_exit.go:204] [ 994: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.333145 762333 task_signals.go:204] [ 994: 995] Signal 994, PID: 995, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.333740 762333 task_exit.go:204] [ 994: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.334387 762333 task_exit.go:204] [ 994: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.334796 762333 task_exit.go:204] [ 994: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.334872 762333 task_exit.go:204] [ 994: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.335081 762333 task_exit.go:204] [ 994: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.335203 762333 task_exit.go:204] [ 994: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.335243 762333 task_exit.go:204] [ 994: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.335363 762333 task_exit.go:204] [ 994: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.335409 762333 task_exit.go:204] [ 994: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.355000 762333 task_exit.go:204] [ 994: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.355130 762333 task_exit.go:204] [ 994: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.355369 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:36.355653 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:36.355725 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:36.357545 762333 task_exit.go:204] [ 994: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.365625 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.368488 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:36.386035 762333 syscalls.go:262] [ 999: 999] Allocating stack with size of 8388608 bytes D0713 00:00:36.390161 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.390913 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:36.394344 762333 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:36.394556 762333 usertrap_amd64.go:106] [ 999: 999] Map a usertrap vma at 61000 D0713 00:00:36.395722 762333 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc0025c4330 1 D0713 00:00:36.396072 762333 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:36.398352 762333 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:36.398425 762333 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc0025c4330 2 D0713 00:00:36.398636 762333 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:36.401596 762333 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:36.401666 762333 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc0025c4330 3 D0713 00:00:36.401850 762333 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:36.424326 762333 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:36.424427 762333 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc0025c4330 4 D0713 00:00:36.424560 762333 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:36.428519 762333 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:36.428630 762333 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc0025c4330 5 D0713 00:00:36.428782 762333 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:36.429275 762333 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b214:sysno 13 D0713 00:00:36.429339 762333 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc0025c4330 6 D0713 00:00:36.429514 762333 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:36.453418 762333 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:36.453511 762333 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc0025c4330 7 D0713 00:00:36.453687 762333 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:36.455409 762333 usertrap_amd64.go:212] [ 999: 1000] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:36.455487 762333 usertrap_amd64.go:122] [ 999: 1000] Allocate a new trap: 0xc0025c4330 8 D0713 00:00:36.455746 762333 usertrap_amd64.go:225] [ 999: 1000] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:36.458054 762333 usertrap_amd64.go:212] [ 999: 1000] Found the pattern at ip 46af76:sysno 35 D0713 00:00:36.458128 762333 usertrap_amd64.go:122] [ 999: 1000] Allocate a new trap: 0xc0025c4330 9 D0713 00:00:36.459190 762333 usertrap_amd64.go:225] [ 999: 1000] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:36.459718 762333 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:36.459816 762333 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc0025c4330 10 D0713 00:00:36.460078 762333 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:36.472390 762333 usertrap_amd64.go:212] [ 999: 1000] Found the pattern at ip 46b020:sysno 39 D0713 00:00:36.472505 762333 usertrap_amd64.go:122] [ 999: 1000] Allocate a new trap: 0xc0025c4330 11 D0713 00:00:36.473241 762333 usertrap_amd64.go:225] [ 999: 1000] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:36.473656 762333 usertrap_amd64.go:212] [ 999: 1000] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:36.473716 762333 usertrap_amd64.go:122] [ 999: 1000] Allocate a new trap: 0xc0025c4330 12 D0713 00:00:36.473888 762333 usertrap_amd64.go:225] [ 999: 1000] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:36.474453 762333 task_signals.go:470] [ 999: 999] Notified of signal 23 D0713 00:00:36.475232 762333 task_signals.go:220] [ 999: 999] Signal 23: delivering to handler D0713 00:00:36.484485 762333 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46af29:sysno 293 D0713 00:00:36.484563 762333 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc0025c4330 13 D0713 00:00:36.484729 762333 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:36.485905 762333 task_signals.go:470] [ 999: 999] Notified of signal 23 D0713 00:00:36.486152 762333 task_signals.go:179] [ 999: 999] Restarting syscall 202: interrupted by signal 23 D0713 00:00:36.486217 762333 task_signals.go:220] [ 999: 999] Signal 23: delivering to handler D0713 00:00:36.502726 762333 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:36.502846 762333 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc0025c4330 14 D0713 00:00:36.503082 762333 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46b6e0 trap addr 61460 ([184 24 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:36.504024 762333 task_signals.go:470] [ 999: 999] Notified of signal 23 D0713 00:00:36.504638 762333 task_signals.go:179] [ 999: 999] Restarting syscall 202: interrupted by signal 23 D0713 00:00:36.504729 762333 task_signals.go:220] [ 999: 999] Signal 23: delivering to handler I0713 00:00:36.515994 762333 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0713 00:00:36.516618 762333 usertrap_amd64.go:212] [ 999: 999] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:36.516687 762333 usertrap_amd64.go:122] [ 999: 999] Allocate a new trap: 0xc0025c4330 15 D0713 00:00:36.516864 762333 usertrap_amd64.go:225] [ 999: 999] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 00:00:36.517420 762333 task_exit.go:204] [ 999: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.517824 762333 task_exit.go:204] [ 999: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.518176 762333 task_signals.go:204] [ 999: 1000] Signal 999, PID: 1000, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.518379 762333 task_exit.go:204] [ 999: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.518879 762333 task_exit.go:204] [ 999: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.518949 762333 task_exit.go:204] [ 999: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.519353 762333 task_signals.go:204] [ 999: 1001] Signal 999, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.519488 762333 task_exit.go:204] [ 999: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.519893 762333 task_exit.go:204] [ 999: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.519975 762333 task_exit.go:204] [ 999: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.520413 762333 task_signals.go:204] [ 999: 1003] Signal 999, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.520567 762333 task_exit.go:204] [ 999: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.520989 762333 task_exit.go:204] [ 999: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.521082 762333 task_exit.go:204] [ 999: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.521485 762333 task_signals.go:204] [ 999: 1002] Signal 999, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.521707 762333 task_exit.go:204] [ 999: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.546878 762333 task_exit.go:204] [ 999: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.546988 762333 task_exit.go:204] [ 999: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.547224 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:36.547573 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:36.547657 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:36.549328 762333 task_exit.go:204] [ 999: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.557809 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:36.559282 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.579991 762333 syscalls.go:262] [ 1004: 1004] Allocating stack with size of 8388608 bytes D0713 00:00:36.582847 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.583458 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:36.584871 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:36.585151 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:36.587570 762333 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:36.587798 762333 usertrap_amd64.go:106] [ 1004: 1004] Map a usertrap vma at 61000 D0713 00:00:36.589025 762333 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000c84c30 1 D0713 00:00:36.589428 762333 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:36.591704 762333 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:36.591763 762333 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000c84c30 2 D0713 00:00:36.591869 762333 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:36.594600 762333 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:36.594656 762333 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000c84c30 3 D0713 00:00:36.594772 762333 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:36.616611 762333 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:36.616686 762333 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000c84c30 4 D0713 00:00:36.616828 762333 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:36.619738 762333 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:36.619818 762333 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000c84c30 5 D0713 00:00:36.619922 762333 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:36.620306 762333 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b214:sysno 13 D0713 00:00:36.620370 762333 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000c84c30 6 D0713 00:00:36.620485 762333 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:36.641355 762333 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:36.641501 762333 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000c84c30 7 D0713 00:00:36.641691 762333 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:36.643928 762333 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:36.644117 762333 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc000c84c30 8 D0713 00:00:36.644338 762333 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:36.646519 762333 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46af76:sysno 35 D0713 00:00:36.646653 762333 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc000c84c30 9 D0713 00:00:36.646883 762333 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:36.647542 762333 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:36.647635 762333 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000c84c30 10 D0713 00:00:36.647889 762333 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:36.661272 762333 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46b020:sysno 39 D0713 00:00:36.661420 762333 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc000c84c30 11 D0713 00:00:36.661579 762333 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:36.662550 762333 usertrap_amd64.go:212] [ 1004: 1005] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:36.662653 762333 usertrap_amd64.go:122] [ 1004: 1005] Allocate a new trap: 0xc000c84c30 12 D0713 00:00:36.662779 762333 usertrap_amd64.go:225] [ 1004: 1005] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:36.663157 762333 task_signals.go:470] [ 1004: 1004] Notified of signal 23 D0713 00:00:36.663361 762333 task_signals.go:220] [ 1004: 1004] Signal 23: delivering to handler D0713 00:00:36.673024 762333 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46af29:sysno 293 D0713 00:00:36.673098 762333 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000c84c30 13 D0713 00:00:36.673262 762333 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:36.674555 762333 task_signals.go:470] [ 1004: 1004] Notified of signal 23 D0713 00:00:36.674839 762333 task_signals.go:220] [ 1004: 1004] Signal 23: delivering to handler D0713 00:00:36.689222 762333 task_signals.go:470] [ 1004: 1004] Notified of signal 23 D0713 00:00:36.689902 762333 task_signals.go:220] [ 1004: 1004] Signal 23: delivering to handler I0713 00:00:36.700270 762333 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0713 00:00:36.700536 762333 usertrap_amd64.go:212] [ 1004: 1004] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:36.700599 762333 usertrap_amd64.go:122] [ 1004: 1004] Allocate a new trap: 0xc000c84c30 14 D0713 00:00:36.700813 762333 usertrap_amd64.go:225] [ 1004: 1004] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:36.701272 762333 task_exit.go:204] [ 1004: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.701586 762333 task_signals.go:204] [ 1004: 1007] Signal 1004, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.701719 762333 task_signals.go:204] [ 1004: 1008] Signal 1004, PID: 1008, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.701751 762333 task_exit.go:204] [ 1004: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.702020 762333 task_signals.go:204] [ 1004: 1005] Signal 1004, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.702141 762333 task_exit.go:204] [ 1004: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.702397 762333 task_signals.go:204] [ 1004: 1006] Signal 1004, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.702709 762333 task_exit.go:204] [ 1004: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.703084 762333 task_exit.go:204] [ 1004: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.703274 762333 task_exit.go:204] [ 1004: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.703592 762333 task_exit.go:204] [ 1004: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.703707 762333 task_exit.go:204] [ 1004: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.704423 762333 task_exit.go:204] [ 1004: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.704501 762333 task_exit.go:204] [ 1004: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.704802 762333 task_exit.go:204] [ 1004: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.704872 762333 task_exit.go:204] [ 1004: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.726530 762333 task_exit.go:204] [ 1004: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.726734 762333 task_exit.go:204] [ 1004: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.727157 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:36.727583 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:36.727700 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:36.729579 762333 task_exit.go:204] [ 1004: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.735702 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.737400 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:36.754809 762333 syscalls.go:262] [ 1009: 1009] Allocating stack with size of 8388608 bytes D0713 00:00:36.757797 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.758366 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:36.761754 762333 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:36.761885 762333 usertrap_amd64.go:106] [ 1009: 1009] Map a usertrap vma at 67000 D0713 00:00:36.762681 762333 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0025c4b40 1 D0713 00:00:36.763012 762333 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:36.764916 762333 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:36.765026 762333 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0025c4b40 2 D0713 00:00:36.765152 762333 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:36.768118 762333 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:36.768199 762333 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0025c4b40 3 D0713 00:00:36.768367 762333 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:36.789435 762333 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:36.789552 762333 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0025c4b40 4 D0713 00:00:36.789790 762333 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:36.793319 762333 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:36.793393 762333 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0025c4b40 5 D0713 00:00:36.793572 762333 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:36.794001 762333 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b214:sysno 13 D0713 00:00:36.794080 762333 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0025c4b40 6 D0713 00:00:36.796819 762333 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:36.821791 762333 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:36.821908 762333 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0025c4b40 7 D0713 00:00:36.822035 762333 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:36.823661 762333 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:36.823772 762333 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0025c4b40 8 D0713 00:00:36.824040 762333 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:36.827469 762333 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46af76:sysno 35 D0713 00:00:36.827547 762333 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0025c4b40 9 D0713 00:00:36.827781 762333 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:36.828991 762333 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:36.829065 762333 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0025c4b40 10 D0713 00:00:36.829290 762333 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:36.842715 762333 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b020:sysno 39 D0713 00:00:36.842799 762333 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0025c4b40 11 D0713 00:00:36.842928 762333 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:36.843961 762333 usertrap_amd64.go:212] [ 1009: 1010] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:36.844047 762333 usertrap_amd64.go:122] [ 1009: 1010] Allocate a new trap: 0xc0025c4b40 12 D0713 00:00:36.844750 762333 usertrap_amd64.go:225] [ 1009: 1010] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:36.845975 762333 task_signals.go:470] [ 1009: 1009] Notified of signal 23 D0713 00:00:36.846718 762333 task_signals.go:220] [ 1009: 1009] Signal 23: delivering to handler D0713 00:00:36.847987 762333 task_signals.go:470] [ 1009: 1009] Notified of signal 23 D0713 00:00:36.848251 762333 task_signals.go:220] [ 1009: 1009] Signal 23: delivering to handler D0713 00:00:36.855184 762333 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46af29:sysno 293 D0713 00:00:36.855265 762333 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0025c4b40 13 D0713 00:00:36.855857 762333 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:36.861531 762333 task_signals.go:470] [ 1009: 1009] Notified of signal 23 D0713 00:00:36.864421 762333 task_signals.go:220] [ 1009: 1009] Signal 23: delivering to handler D0713 00:00:36.867878 762333 task_signals.go:470] [ 1009: 1009] Notified of signal 23 D0713 00:00:36.868019 762333 task_signals.go:220] [ 1009: 1009] Signal 23: delivering to handler D0713 00:00:36.884138 762333 usertrap_amd64.go:212] [ 1009: 1009] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:36.884243 762333 usertrap_amd64.go:122] [ 1009: 1009] Allocate a new trap: 0xc0025c4b40 14 D0713 00:00:36.884409 762333 usertrap_amd64.go:225] [ 1009: 1009] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:36.884883 762333 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.885516 762333 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.885911 762333 task_signals.go:204] [ 1009: 1011] Signal 1009, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.886222 762333 task_signals.go:204] [ 1009: 1013] Signal 1009, PID: 1013, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.886343 762333 task_signals.go:204] [ 1009: 1012] Signal 1009, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.886545 762333 task_signals.go:204] [ 1009: 1014] Signal 1009, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.886613 762333 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.887052 762333 task_signals.go:204] [ 1009: 1010] Signal 1009, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.887228 762333 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.887527 762333 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.887872 762333 task_exit.go:204] [ 1009: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.888305 762333 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.888917 762333 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.889067 762333 task_exit.go:204] [ 1009: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.889357 762333 task_exit.go:204] [ 1009: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.889447 762333 task_exit.go:204] [ 1009: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.889639 762333 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.889737 762333 task_exit.go:204] [ 1009: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.889956 762333 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.890034 762333 task_exit.go:204] [ 1009: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.913957 762333 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.914087 762333 task_exit.go:204] [ 1009: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.914344 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:36.914626 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:36.914724 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:36.916695 762333 task_exit.go:204] [ 1009: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.924512 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.924914 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:36.946274 762333 syscalls.go:262] [ 1015: 1015] Allocating stack with size of 8388608 bytes D0713 00:00:36.949055 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.949804 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:36.954522 762333 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:36.954744 762333 usertrap_amd64.go:106] [ 1015: 1015] Map a usertrap vma at 61000 D0713 00:00:36.955664 762333 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00298e150 1 D0713 00:00:36.955976 762333 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:36.958000 762333 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:36.958059 762333 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00298e150 2 D0713 00:00:36.958247 762333 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:36.960853 762333 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:36.960913 762333 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00298e150 3 D0713 00:00:36.961124 762333 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:36.982825 762333 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:36.982908 762333 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00298e150 4 D0713 00:00:36.983037 762333 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:36.985935 762333 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:36.986004 762333 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00298e150 5 D0713 00:00:36.986163 762333 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:36.986527 762333 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b214:sysno 13 D0713 00:00:36.986597 762333 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00298e150 6 D0713 00:00:36.986707 762333 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:37.004631 762333 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:37.004720 762333 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00298e150 7 D0713 00:00:37.004835 762333 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:37.006681 762333 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:37.006804 762333 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc00298e150 8 D0713 00:00:37.007047 762333 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:37.010370 762333 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46af76:sysno 35 D0713 00:00:37.010470 762333 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc00298e150 9 D0713 00:00:37.011394 762333 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:37.011953 762333 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:37.012045 762333 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00298e150 10 D0713 00:00:37.012313 762333 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:37.025217 762333 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b020:sysno 39 D0713 00:00:37.025307 762333 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc00298e150 11 D0713 00:00:37.025623 762333 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:37.026350 762333 usertrap_amd64.go:212] [ 1015: 1016] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:37.026425 762333 usertrap_amd64.go:122] [ 1015: 1016] Allocate a new trap: 0xc00298e150 12 D0713 00:00:37.027226 762333 usertrap_amd64.go:225] [ 1015: 1016] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:37.028998 762333 task_signals.go:470] [ 1015: 1015] Notified of signal 23 D0713 00:00:37.029896 762333 task_signals.go:220] [ 1015: 1015] Signal 23: delivering to handler D0713 00:00:37.036786 762333 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46af29:sysno 293 D0713 00:00:37.036852 762333 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00298e150 13 D0713 00:00:37.037059 762333 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:37.040661 762333 task_signals.go:470] [ 1015: 1015] Notified of signal 23 D0713 00:00:37.040888 762333 task_signals.go:179] [ 1015: 1015] Restarting syscall 202: interrupted by signal 23 D0713 00:00:37.040983 762333 task_signals.go:220] [ 1015: 1015] Signal 23: delivering to handler D0713 00:00:37.054931 762333 task_signals.go:470] [ 1015: 1015] Notified of signal 23 D0713 00:00:37.055281 762333 task_signals.go:220] [ 1015: 1015] Signal 23: delivering to handler D0713 00:00:37.061102 762333 usertrap_amd64.go:212] [ 1015: 1015] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:37.061202 762333 usertrap_amd64.go:122] [ 1015: 1015] Allocate a new trap: 0xc00298e150 14 D0713 00:00:37.061364 762333 usertrap_amd64.go:225] [ 1015: 1015] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:37.061948 762333 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.062383 762333 task_signals.go:204] [ 1015: 1016] Signal 1015, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.062509 762333 task_signals.go:204] [ 1015: 1020] Signal 1015, PID: 1020, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.062775 762333 task_signals.go:204] [ 1015: 1017] Signal 1015, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.062823 762333 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.062962 762333 task_signals.go:204] [ 1015: 1019] Signal 1015, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.063056 762333 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.063232 762333 task_signals.go:204] [ 1015: 1018] Signal 1015, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.063383 762333 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.063761 762333 task_exit.go:204] [ 1015: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.064229 762333 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.064862 762333 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.065025 762333 task_exit.go:204] [ 1015: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.065431 762333 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.065543 762333 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.065631 762333 task_exit.go:204] [ 1015: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.065889 762333 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.065992 762333 task_exit.go:204] [ 1015: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.066400 762333 task_exit.go:204] [ 1015: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.066491 762333 task_exit.go:204] [ 1015: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.091433 762333 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.091615 762333 task_exit.go:204] [ 1015: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.092057 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:37.092479 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:37.092563 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:37.094544 762333 task_exit.go:204] [ 1015: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.101647 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.102390 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:37.123379 762333 syscalls.go:262] [ 1021: 1021] Allocating stack with size of 8388608 bytes D0713 00:00:37.126935 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.127544 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:37.131986 762333 usertrap_amd64.go:212] [ 1021: 1021] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:37.132127 762333 usertrap_amd64.go:106] [ 1021: 1021] Map a usertrap vma at 65000 D0713 00:00:37.132857 762333 usertrap_amd64.go:122] [ 1021: 1021] Allocate a new trap: 0xc001dd8270 1 D0713 00:00:37.133233 762333 usertrap_amd64.go:225] [ 1021: 1021] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:37.134983 762333 usertrap_amd64.go:212] [ 1021: 1021] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:37.135052 762333 usertrap_amd64.go:122] [ 1021: 1021] Allocate a new trap: 0xc001dd8270 2 D0713 00:00:37.135195 762333 usertrap_amd64.go:225] [ 1021: 1021] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:37.138329 762333 usertrap_amd64.go:212] [ 1021: 1021] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:37.138398 762333 usertrap_amd64.go:122] [ 1021: 1021] Allocate a new trap: 0xc001dd8270 3 D0713 00:00:37.138539 762333 usertrap_amd64.go:225] [ 1021: 1021] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:37.162404 762333 usertrap_amd64.go:212] [ 1021: 1021] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:37.162484 762333 usertrap_amd64.go:122] [ 1021: 1021] Allocate a new trap: 0xc001dd8270 4 D0713 00:00:37.162683 762333 usertrap_amd64.go:225] [ 1021: 1021] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:37.166745 762333 usertrap_amd64.go:212] [ 1021: 1021] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:37.166806 762333 usertrap_amd64.go:122] [ 1021: 1021] Allocate a new trap: 0xc001dd8270 5 D0713 00:00:37.166923 762333 usertrap_amd64.go:225] [ 1021: 1021] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:37.167320 762333 usertrap_amd64.go:212] [ 1021: 1021] Found the pattern at ip 46b214:sysno 13 D0713 00:00:37.167378 762333 usertrap_amd64.go:122] [ 1021: 1021] Allocate a new trap: 0xc001dd8270 6 D0713 00:00:37.167527 762333 usertrap_amd64.go:225] [ 1021: 1021] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:37.185299 762333 usertrap_amd64.go:212] [ 1021: 1021] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:37.185382 762333 usertrap_amd64.go:122] [ 1021: 1021] Allocate a new trap: 0xc001dd8270 7 D0713 00:00:37.185495 762333 usertrap_amd64.go:225] [ 1021: 1021] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:37.187184 762333 usertrap_amd64.go:212] [ 1021: 1022] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:37.187258 762333 usertrap_amd64.go:122] [ 1021: 1022] Allocate a new trap: 0xc001dd8270 8 D0713 00:00:37.187486 762333 usertrap_amd64.go:225] [ 1021: 1022] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:37.190130 762333 usertrap_amd64.go:212] [ 1021: 1021] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:37.190231 762333 usertrap_amd64.go:122] [ 1021: 1021] Allocate a new trap: 0xc001dd8270 9 D0713 00:00:37.190840 762333 usertrap_amd64.go:225] [ 1021: 1021] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:37.191259 762333 usertrap_amd64.go:212] [ 1021: 1022] Found the pattern at ip 46af76:sysno 35 D0713 00:00:37.191332 762333 usertrap_amd64.go:122] [ 1021: 1022] Allocate a new trap: 0xc001dd8270 10 D0713 00:00:37.191600 762333 usertrap_amd64.go:225] [ 1021: 1022] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:37.203445 762333 usertrap_amd64.go:212] [ 1021: 1022] Found the pattern at ip 46b020:sysno 39 D0713 00:00:37.203532 762333 usertrap_amd64.go:122] [ 1021: 1022] Allocate a new trap: 0xc001dd8270 11 D0713 00:00:37.203694 762333 usertrap_amd64.go:225] [ 1021: 1022] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:37.204178 762333 usertrap_amd64.go:212] [ 1021: 1022] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:37.204252 762333 usertrap_amd64.go:122] [ 1021: 1022] Allocate a new trap: 0xc001dd8270 12 D0713 00:00:37.204479 762333 usertrap_amd64.go:225] [ 1021: 1022] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:37.204927 762333 task_signals.go:470] [ 1021: 1021] Notified of signal 23 D0713 00:00:37.205769 762333 task_signals.go:220] [ 1021: 1021] Signal 23: delivering to handler D0713 00:00:37.211009 762333 usertrap_amd64.go:212] [ 1021: 1021] Found the pattern at ip 46af29:sysno 293 D0713 00:00:37.211075 762333 usertrap_amd64.go:122] [ 1021: 1021] Allocate a new trap: 0xc001dd8270 13 D0713 00:00:37.211237 762333 usertrap_amd64.go:225] [ 1021: 1021] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:37.218071 762333 task_signals.go:470] [ 1021: 1021] Notified of signal 23 D0713 00:00:37.219007 762333 task_signals.go:220] [ 1021: 1021] Signal 23: delivering to handler D0713 00:00:37.234053 762333 task_signals.go:470] [ 1021: 1021] Notified of signal 23 D0713 00:00:37.234549 762333 task_signals.go:220] [ 1021: 1021] Signal 23: delivering to handler D0713 00:00:37.236122 762333 usertrap_amd64.go:212] [ 1021: 1021] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:37.236180 762333 usertrap_amd64.go:122] [ 1021: 1021] Allocate a new trap: 0xc001dd8270 14 D0713 00:00:37.236331 762333 usertrap_amd64.go:225] [ 1021: 1021] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:37.236721 762333 task_exit.go:204] [ 1021: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.237094 762333 task_signals.go:204] [ 1021: 1025] Signal 1021, PID: 1025, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.237191 762333 task_signals.go:204] [ 1021: 1023] Signal 1021, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.237416 762333 task_signals.go:204] [ 1021: 1022] Signal 1021, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.237526 762333 task_exit.go:204] [ 1021: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.237783 762333 task_signals.go:204] [ 1021: 1024] Signal 1021, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.237936 762333 task_exit.go:204] [ 1021: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.238222 762333 task_exit.go:204] [ 1021: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.238396 762333 task_exit.go:204] [ 1021: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.238863 762333 task_exit.go:204] [ 1021: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.239521 762333 task_exit.go:204] [ 1021: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.239591 762333 task_exit.go:204] [ 1021: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.239842 762333 task_exit.go:204] [ 1021: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.239930 762333 task_exit.go:204] [ 1021: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.240313 762333 task_exit.go:204] [ 1021: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.240387 762333 task_exit.go:204] [ 1021: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.260358 762333 task_exit.go:204] [ 1021: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.260447 762333 task_exit.go:204] [ 1021: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.260623 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:37.260845 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:37.260902 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:37.262725 762333 task_exit.go:204] [ 1021: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead I0713 00:00:37.263835 762333 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0713 00:00:37.271528 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.271675 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:37.296834 762333 syscalls.go:262] [ 1026: 1026] Allocating stack with size of 8388608 bytes D0713 00:00:37.299799 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.300604 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:37.304516 762333 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:37.304749 762333 usertrap_amd64.go:106] [ 1026: 1026] Map a usertrap vma at 65000 D0713 00:00:37.305729 762333 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc00298e600 1 D0713 00:00:37.306045 762333 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:37.307788 762333 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:37.307839 762333 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc00298e600 2 D0713 00:00:37.307946 762333 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:37.310616 762333 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:37.310699 762333 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc00298e600 3 D0713 00:00:37.310846 762333 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:37.333030 762333 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:37.333150 762333 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc00298e600 4 D0713 00:00:37.333352 762333 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:37.336427 762333 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:37.336490 762333 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc00298e600 5 D0713 00:00:37.336600 762333 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:37.337049 762333 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b214:sysno 13 D0713 00:00:37.337123 762333 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc00298e600 6 D0713 00:00:37.337246 762333 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:37.357304 762333 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:37.357426 762333 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc00298e600 7 D0713 00:00:37.357619 762333 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:37.359158 762333 usertrap_amd64.go:212] [ 1026: 1027] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:37.359278 762333 usertrap_amd64.go:122] [ 1026: 1027] Allocate a new trap: 0xc00298e600 8 D0713 00:00:37.359429 762333 usertrap_amd64.go:225] [ 1026: 1027] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:37.360410 762333 usertrap_amd64.go:212] [ 1026: 1027] Found the pattern at ip 46af76:sysno 35 D0713 00:00:37.360498 762333 usertrap_amd64.go:122] [ 1026: 1027] Allocate a new trap: 0xc00298e600 9 D0713 00:00:37.360678 762333 usertrap_amd64.go:225] [ 1026: 1027] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:37.362274 762333 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:37.362348 762333 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc00298e600 10 D0713 00:00:37.362514 762333 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:37.364870 762333 usertrap_amd64.go:212] [ 1026: 1027] Found the pattern at ip 46b020:sysno 39 D0713 00:00:37.365052 762333 usertrap_amd64.go:122] [ 1026: 1027] Allocate a new trap: 0xc00298e600 11 D0713 00:00:37.365283 762333 usertrap_amd64.go:225] [ 1026: 1027] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:37.365823 762333 usertrap_amd64.go:212] [ 1026: 1027] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:37.365895 762333 usertrap_amd64.go:122] [ 1026: 1027] Allocate a new trap: 0xc00298e600 12 D0713 00:00:37.366122 762333 usertrap_amd64.go:225] [ 1026: 1027] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:37.367024 762333 task_signals.go:470] [ 1026: 1029] Notified of signal 23 D0713 00:00:37.367351 762333 task_signals.go:179] [ 1026: 1029] Restarting syscall 202: interrupted by signal 23 D0713 00:00:37.367436 762333 task_signals.go:220] [ 1026: 1029] Signal 23: delivering to handler D0713 00:00:37.379036 762333 task_signals.go:470] [ 1026: 1026] Notified of signal 23 D0713 00:00:37.379448 762333 task_signals.go:220] [ 1026: 1026] Signal 23: delivering to handler D0713 00:00:37.380685 762333 task_signals.go:470] [ 1026: 1026] Notified of signal 23 D0713 00:00:37.381028 762333 task_signals.go:220] [ 1026: 1026] Signal 23: delivering to handler D0713 00:00:37.388705 762333 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46af29:sysno 293 D0713 00:00:37.388810 762333 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc00298e600 13 D0713 00:00:37.389068 762333 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:37.396029 762333 task_signals.go:470] [ 1026: 1026] Notified of signal 23 D0713 00:00:37.397237 762333 task_signals.go:220] [ 1026: 1026] Signal 23: delivering to handler I0713 00:00:37.414082 762333 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0713 00:00:37.414350 762333 usertrap_amd64.go:212] [ 1026: 1026] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:37.414407 762333 usertrap_amd64.go:122] [ 1026: 1026] Allocate a new trap: 0xc00298e600 14 D0713 00:00:37.414533 762333 usertrap_amd64.go:225] [ 1026: 1026] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:37.414921 762333 task_exit.go:204] [ 1026: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.415367 762333 task_signals.go:204] [ 1026: 1027] Signal 1026, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.415428 762333 task_signals.go:204] [ 1026: 1029] Signal 1026, PID: 1029, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.415699 762333 task_signals.go:204] [ 1026: 1030] Signal 1026, PID: 1030, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.415749 762333 task_signals.go:204] [ 1026: 1028] Signal 1026, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.415762 762333 task_exit.go:204] [ 1026: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.416099 762333 task_exit.go:204] [ 1026: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.416730 762333 task_exit.go:204] [ 1026: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.417046 762333 task_exit.go:204] [ 1026: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.417278 762333 task_exit.go:204] [ 1026: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.417570 762333 task_exit.go:204] [ 1026: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.417691 762333 task_exit.go:204] [ 1026: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.418142 762333 task_exit.go:204] [ 1026: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.418205 762333 task_exit.go:204] [ 1026: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.418649 762333 task_exit.go:204] [ 1026: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.418717 762333 task_exit.go:204] [ 1026: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.443670 762333 task_exit.go:204] [ 1026: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.443779 762333 task_exit.go:204] [ 1026: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.444003 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:37.444282 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:37.444358 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:37.445953 762333 task_exit.go:204] [ 1026: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.454672 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.455034 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:37.477300 762333 syscalls.go:262] [ 1031: 1031] Allocating stack with size of 8388608 bytes D0713 00:00:37.480674 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.481771 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:37.485071 762333 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:37.485287 762333 usertrap_amd64.go:106] [ 1031: 1031] Map a usertrap vma at 62000 D0713 00:00:37.486432 762333 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc001e2a7e0 1 D0713 00:00:37.486982 762333 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:37.489779 762333 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:37.489890 762333 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc001e2a7e0 2 D0713 00:00:37.490068 762333 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:37.493646 762333 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:37.493821 762333 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc001e2a7e0 3 D0713 00:00:37.494039 762333 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:37.518802 762333 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:37.518876 762333 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc001e2a7e0 4 D0713 00:00:37.519066 762333 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:37.521890 762333 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:37.521959 762333 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc001e2a7e0 5 D0713 00:00:37.522132 762333 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:37.522490 762333 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b214:sysno 13 D0713 00:00:37.522543 762333 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc001e2a7e0 6 D0713 00:00:37.522677 762333 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:37.543441 762333 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:37.543527 762333 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc001e2a7e0 7 D0713 00:00:37.543673 762333 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:37.545454 762333 usertrap_amd64.go:212] [ 1031: 1032] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:37.545552 762333 usertrap_amd64.go:122] [ 1031: 1032] Allocate a new trap: 0xc001e2a7e0 8 D0713 00:00:37.545756 762333 usertrap_amd64.go:225] [ 1031: 1032] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:37.547964 762333 usertrap_amd64.go:212] [ 1031: 1032] Found the pattern at ip 46af76:sysno 35 D0713 00:00:37.548178 762333 usertrap_amd64.go:122] [ 1031: 1032] Allocate a new trap: 0xc001e2a7e0 9 D0713 00:00:37.548495 762333 usertrap_amd64.go:225] [ 1031: 1032] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:37.549849 762333 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:37.549999 762333 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc001e2a7e0 10 D0713 00:00:37.550321 762333 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:37.563428 762333 usertrap_amd64.go:212] [ 1031: 1032] Found the pattern at ip 46b020:sysno 39 D0713 00:00:37.563518 762333 usertrap_amd64.go:122] [ 1031: 1032] Allocate a new trap: 0xc001e2a7e0 11 D0713 00:00:37.563723 762333 usertrap_amd64.go:225] [ 1031: 1032] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:37.564063 762333 usertrap_amd64.go:212] [ 1031: 1032] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:37.564110 762333 usertrap_amd64.go:122] [ 1031: 1032] Allocate a new trap: 0xc001e2a7e0 12 D0713 00:00:37.564258 762333 usertrap_amd64.go:225] [ 1031: 1032] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:37.564760 762333 task_signals.go:470] [ 1031: 1031] Notified of signal 23 D0713 00:00:37.565341 762333 task_signals.go:220] [ 1031: 1031] Signal 23: delivering to handler D0713 00:00:37.580003 762333 task_signals.go:470] [ 1031: 1031] Notified of signal 23 D0713 00:00:37.580071 762333 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46af29:sysno 293 D0713 00:00:37.580253 762333 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc001e2a7e0 13 D0713 00:00:37.580513 762333 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:37.581056 762333 task_signals.go:220] [ 1031: 1031] Signal 23: delivering to handler D0713 00:00:37.582705 762333 task_signals.go:470] [ 1031: 1031] Notified of signal 23 D0713 00:00:37.583419 762333 task_signals.go:220] [ 1031: 1031] Signal 23: delivering to handler D0713 00:00:37.584716 762333 task_signals.go:470] [ 1031: 1031] Notified of signal 23 D0713 00:00:37.584925 762333 task_signals.go:220] [ 1031: 1031] Signal 23: delivering to handler D0713 00:00:37.586128 762333 task_signals.go:470] [ 1031: 1031] Notified of signal 23 D0713 00:00:37.586340 762333 task_signals.go:220] [ 1031: 1031] Signal 23: delivering to handler D0713 00:00:37.598660 762333 task_signals.go:470] [ 1031: 1031] Notified of signal 23 D0713 00:00:37.602274 762333 task_signals.go:220] [ 1031: 1031] Signal 23: delivering to handler I0713 00:00:37.612101 762333 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0713 00:00:37.612403 762333 usertrap_amd64.go:212] [ 1031: 1031] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:37.612494 762333 usertrap_amd64.go:122] [ 1031: 1031] Allocate a new trap: 0xc001e2a7e0 14 D0713 00:00:37.612684 762333 usertrap_amd64.go:225] [ 1031: 1031] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:37.613122 762333 task_exit.go:204] [ 1031: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.613532 762333 task_signals.go:204] [ 1031: 1034] Signal 1031, PID: 1034, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.613586 762333 task_signals.go:204] [ 1031: 1033] Signal 1031, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.613818 762333 task_signals.go:204] [ 1031: 1032] Signal 1031, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.613859 762333 task_signals.go:204] [ 1031: 1035] Signal 1031, PID: 1035, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.613906 762333 task_exit.go:204] [ 1031: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.614242 762333 task_exit.go:204] [ 1031: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.614468 762333 task_exit.go:204] [ 1031: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.615134 762333 task_exit.go:204] [ 1031: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.615199 762333 task_exit.go:204] [ 1031: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.615418 762333 task_exit.go:204] [ 1031: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.615661 762333 task_exit.go:204] [ 1031: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.615889 762333 task_exit.go:204] [ 1031: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.615948 762333 task_exit.go:204] [ 1031: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.616198 762333 task_exit.go:204] [ 1031: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.616279 762333 task_exit.go:204] [ 1031: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.638474 762333 task_exit.go:204] [ 1031: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.638567 762333 task_exit.go:204] [ 1031: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.638932 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:37.639523 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:37.639674 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:37.641734 762333 task_exit.go:204] [ 1031: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.649601 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:37.650753 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.679534 762333 syscalls.go:262] [ 1036: 1036] Allocating stack with size of 8388608 bytes D0713 00:00:37.683189 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.683953 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:37.688635 762333 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:37.688841 762333 usertrap_amd64.go:106] [ 1036: 1036] Map a usertrap vma at 61000 D0713 00:00:37.689984 762333 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc00298eb40 1 D0713 00:00:37.690347 762333 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:37.692680 762333 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:37.692757 762333 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc00298eb40 2 D0713 00:00:37.692918 762333 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:37.696765 762333 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:37.696834 762333 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc00298eb40 3 D0713 00:00:37.697031 762333 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:37.727208 762333 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:37.727322 762333 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc00298eb40 4 D0713 00:00:37.727488 762333 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:37.730673 762333 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:37.730776 762333 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc00298eb40 5 D0713 00:00:37.730994 762333 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:37.731437 762333 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46b214:sysno 13 D0713 00:00:37.731501 762333 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc00298eb40 6 D0713 00:00:37.731631 762333 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:37.749190 762333 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:37.749257 762333 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc00298eb40 7 D0713 00:00:37.749364 762333 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:37.750971 762333 usertrap_amd64.go:212] [ 1036: 1037] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:37.751070 762333 usertrap_amd64.go:122] [ 1036: 1037] Allocate a new trap: 0xc00298eb40 8 D0713 00:00:37.751378 762333 usertrap_amd64.go:225] [ 1036: 1037] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:37.753309 762333 usertrap_amd64.go:212] [ 1036: 1037] Found the pattern at ip 46af76:sysno 35 D0713 00:00:37.753375 762333 usertrap_amd64.go:122] [ 1036: 1037] Allocate a new trap: 0xc00298eb40 9 D0713 00:00:37.753538 762333 usertrap_amd64.go:225] [ 1036: 1037] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:37.754287 762333 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:37.754367 762333 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc00298eb40 10 D0713 00:00:37.754546 762333 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:37.767483 762333 usertrap_amd64.go:212] [ 1036: 1037] Found the pattern at ip 46b020:sysno 39 D0713 00:00:37.767609 762333 usertrap_amd64.go:122] [ 1036: 1037] Allocate a new trap: 0xc00298eb40 11 D0713 00:00:37.767830 762333 usertrap_amd64.go:225] [ 1036: 1037] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:37.769191 762333 usertrap_amd64.go:212] [ 1036: 1037] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:37.769289 762333 usertrap_amd64.go:122] [ 1036: 1037] Allocate a new trap: 0xc00298eb40 12 D0713 00:00:37.769525 762333 usertrap_amd64.go:225] [ 1036: 1037] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:37.770139 762333 task_signals.go:470] [ 1036: 1036] Notified of signal 23 D0713 00:00:37.771014 762333 task_signals.go:220] [ 1036: 1036] Signal 23: delivering to handler D0713 00:00:37.779338 762333 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46af29:sysno 293 D0713 00:00:37.779408 762333 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc00298eb40 13 D0713 00:00:37.779554 762333 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:37.785644 762333 task_signals.go:470] [ 1036: 1036] Notified of signal 23 D0713 00:00:37.788850 762333 task_signals.go:220] [ 1036: 1036] Signal 23: delivering to handler D0713 00:00:37.790584 762333 task_signals.go:470] [ 1036: 1036] Notified of signal 23 D0713 00:00:37.790820 762333 task_signals.go:220] [ 1036: 1036] Signal 23: delivering to handler D0713 00:00:37.805493 762333 task_signals.go:470] [ 1036: 1036] Notified of signal 23 D0713 00:00:37.806225 762333 task_signals.go:220] [ 1036: 1036] Signal 23: delivering to handler D0713 00:00:37.808365 762333 usertrap_amd64.go:212] [ 1036: 1036] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:37.808452 762333 usertrap_amd64.go:122] [ 1036: 1036] Allocate a new trap: 0xc00298eb40 14 D0713 00:00:37.808606 762333 usertrap_amd64.go:225] [ 1036: 1036] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:37.809085 762333 task_exit.go:204] [ 1036: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.809537 762333 task_signals.go:204] [ 1036: 1040] Signal 1036, PID: 1040, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.809573 762333 task_signals.go:204] [ 1036: 1037] Signal 1036, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.809776 762333 task_exit.go:204] [ 1036: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.809943 762333 task_signals.go:204] [ 1036: 1039] Signal 1036, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.809984 762333 task_signals.go:204] [ 1036: 1038] Signal 1036, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.810198 762333 task_exit.go:204] [ 1036: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.810378 762333 task_exit.go:204] [ 1036: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.810766 762333 task_exit.go:204] [ 1036: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.810827 762333 task_exit.go:204] [ 1036: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.811001 762333 task_exit.go:204] [ 1036: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.811346 762333 task_exit.go:204] [ 1036: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.811396 762333 task_exit.go:204] [ 1036: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.811550 762333 task_exit.go:204] [ 1036: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.812044 762333 task_exit.go:204] [ 1036: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.812098 762333 task_exit.go:204] [ 1036: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.836751 762333 task_exit.go:204] [ 1036: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.836840 762333 task_exit.go:204] [ 1036: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.837078 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:37.837401 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:37.837528 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:37.839332 762333 task_exit.go:204] [ 1036: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.847588 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.848016 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:37.875514 762333 syscalls.go:262] [ 1041: 1041] Allocating stack with size of 8388608 bytes D0713 00:00:37.878671 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.879179 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:37.886014 762333 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:37.886192 762333 usertrap_amd64.go:106] [ 1041: 1041] Map a usertrap vma at 62000 D0713 00:00:37.887146 762333 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0009aeba0 1 D0713 00:00:37.887517 762333 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:37.890319 762333 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:37.890385 762333 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0009aeba0 2 D0713 00:00:37.890529 762333 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:37.894180 762333 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:37.894258 762333 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0009aeba0 3 D0713 00:00:37.894424 762333 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:37.918732 762333 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:37.918831 762333 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0009aeba0 4 D0713 00:00:37.918982 762333 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:37.921981 762333 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:37.922056 762333 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0009aeba0 5 D0713 00:00:37.922226 762333 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:37.922825 762333 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b214:sysno 13 D0713 00:00:37.922915 762333 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0009aeba0 6 D0713 00:00:37.923089 762333 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:37.941921 762333 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:37.942057 762333 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0009aeba0 7 D0713 00:00:37.942236 762333 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:37.944010 762333 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:37.944104 762333 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0009aeba0 8 D0713 00:00:37.944362 762333 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:37.946078 762333 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46af76:sysno 35 D0713 00:00:37.946156 762333 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0009aeba0 9 D0713 00:00:37.946332 762333 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:37.949116 762333 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:37.949198 762333 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0009aeba0 10 D0713 00:00:37.949407 762333 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:37.960890 762333 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46b020:sysno 39 D0713 00:00:37.961021 762333 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0009aeba0 11 D0713 00:00:37.961187 762333 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:37.963338 762333 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:37.963407 762333 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0009aeba0 12 D0713 00:00:37.964174 762333 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:37.964687 762333 task_signals.go:470] [ 1041: 1041] Notified of signal 23 D0713 00:00:37.965593 762333 task_signals.go:220] [ 1041: 1041] Signal 23: delivering to handler D0713 00:00:37.966606 762333 task_signals.go:470] [ 1041: 1041] Notified of signal 23 D0713 00:00:37.966888 762333 task_signals.go:179] [ 1041: 1041] Restarting syscall 202: interrupted by signal 23 D0713 00:00:37.966964 762333 task_signals.go:220] [ 1041: 1041] Signal 23: delivering to handler D0713 00:00:37.974179 762333 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46af29:sysno 293 D0713 00:00:37.974265 762333 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0009aeba0 13 D0713 00:00:37.974422 762333 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:37.980459 762333 task_signals.go:470] [ 1041: 1041] Notified of signal 23 D0713 00:00:37.980773 762333 task_signals.go:220] [ 1041: 1041] Signal 23: delivering to handler D0713 00:00:38.002529 762333 task_signals.go:470] [ 1041: 1041] Notified of signal 23 D0713 00:00:38.003019 762333 task_signals.go:220] [ 1041: 1041] Signal 23: delivering to handler D0713 00:00:38.004646 762333 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:38.004710 762333 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0009aeba0 14 D0713 00:00:38.004867 762333 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:38.005324 762333 task_exit.go:204] [ 1041: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.005844 762333 task_signals.go:204] [ 1041: 1042] Signal 1041, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.005992 762333 task_signals.go:204] [ 1041: 1045] Signal 1041, PID: 1045, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.005892 762333 task_signals.go:204] [ 1041: 1044] Signal 1041, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.006223 762333 task_exit.go:204] [ 1041: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.006367 762333 task_signals.go:204] [ 1041: 1043] Signal 1041, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.006436 762333 task_exit.go:204] [ 1041: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.006626 762333 task_exit.go:204] [ 1041: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.006904 762333 task_exit.go:204] [ 1041: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.006971 762333 task_exit.go:204] [ 1041: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.007177 762333 task_exit.go:204] [ 1041: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.007530 762333 task_exit.go:204] [ 1041: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.007584 762333 task_exit.go:204] [ 1041: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.007785 762333 task_exit.go:204] [ 1041: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.008194 762333 task_exit.go:204] [ 1041: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.008269 762333 task_exit.go:204] [ 1041: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.034011 762333 task_exit.go:204] [ 1041: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.034119 762333 task_exit.go:204] [ 1041: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.034351 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:38.034686 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:38.034767 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:38.036602 762333 task_exit.go:204] [ 1041: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.045311 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.045675 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:38.070909 762333 syscalls.go:262] [ 1046: 1046] Allocating stack with size of 8388608 bytes D0713 00:00:38.074344 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.075322 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:38.081332 762333 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:38.081554 762333 usertrap_amd64.go:106] [ 1046: 1046] Map a usertrap vma at 65000 D0713 00:00:38.082798 762333 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc0009aecf0 1 D0713 00:00:38.083209 762333 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:38.088406 762333 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:38.088517 762333 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc0009aecf0 2 D0713 00:00:38.088644 762333 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:38.092713 762333 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:38.092821 762333 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc0009aecf0 3 D0713 00:00:38.093087 762333 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:38.123907 762333 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:38.124017 762333 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc0009aecf0 4 D0713 00:00:38.124205 762333 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:38.127986 762333 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:38.128050 762333 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc0009aecf0 5 D0713 00:00:38.128211 762333 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:38.128616 762333 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b214:sysno 13 D0713 00:00:38.128683 762333 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc0009aecf0 6 D0713 00:00:38.128794 762333 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:38.154634 762333 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:38.154738 762333 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc0009aecf0 7 D0713 00:00:38.154846 762333 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:38.156628 762333 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:38.156727 762333 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc0009aecf0 8 D0713 00:00:38.156919 762333 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:38.159336 762333 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46af76:sysno 35 D0713 00:00:38.159427 762333 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc0009aecf0 9 D0713 00:00:38.159646 762333 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:38.161122 762333 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:38.161210 762333 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc0009aecf0 10 D0713 00:00:38.161440 762333 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:38.174446 762333 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b020:sysno 39 D0713 00:00:38.174551 762333 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc0009aecf0 11 D0713 00:00:38.174807 762333 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:38.176349 762333 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:38.176427 762333 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc0009aecf0 12 D0713 00:00:38.177264 762333 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:38.178759 762333 task_signals.go:470] [ 1046: 1046] Notified of signal 23 D0713 00:00:38.179701 762333 task_signals.go:220] [ 1046: 1046] Signal 23: delivering to handler executing program D0713 00:00:38.188483 762333 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46af29:sysno 293 D0713 00:00:38.188590 762333 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc0009aecf0 13 D0713 00:00:38.188860 762333 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:38.190596 762333 task_signals.go:470] [ 1046: 1046] Notified of signal 23 D0713 00:00:38.190840 762333 task_signals.go:220] [ 1046: 1046] Signal 23: delivering to handler D0713 00:00:38.204168 762333 task_signals.go:470] [ 1046: 1046] Notified of signal 23 D0713 00:00:38.204745 762333 task_signals.go:220] [ 1046: 1046] Signal 23: delivering to handler D0713 00:00:38.215228 762333 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:38.215382 762333 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc0009aecf0 14 D0713 00:00:38.215509 762333 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:38.215880 762333 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.216231 762333 task_signals.go:204] [ 1046: 1050] Signal 1046, PID: 1050, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.216761 762333 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.217050 762333 task_signals.go:204] [ 1046: 1047] Signal 1046, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.217328 762333 task_signals.go:204] [ 1046: 1049] Signal 1046, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.217764 762333 task_signals.go:204] [ 1046: 1048] Signal 1046, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.217973 762333 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.218439 762333 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.218529 762333 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.218754 762333 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.218965 762333 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.219018 762333 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.219175 762333 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.219536 762333 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.219576 762333 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.219745 762333 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.246025 762333 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.246128 762333 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.246517 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:38.247051 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:38.247139 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:38.248643 762333 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.256444 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.256872 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:38.279467 762333 syscalls.go:262] [ 1051: 1051] Allocating stack with size of 8388608 bytes D0713 00:00:38.283584 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.284179 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:38.292648 762333 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:38.292911 762333 usertrap_amd64.go:106] [ 1051: 1051] Map a usertrap vma at 60000 D0713 00:00:38.294253 762333 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc001dd9110 1 D0713 00:00:38.294700 762333 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:38.297986 762333 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:38.298081 762333 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc001dd9110 2 D0713 00:00:38.298249 762333 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:38.302404 762333 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:38.302497 762333 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc001dd9110 3 D0713 00:00:38.302641 762333 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:38.331735 762333 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:38.331840 762333 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc001dd9110 4 D0713 00:00:38.332022 762333 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:38.335421 762333 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:38.335515 762333 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc001dd9110 5 D0713 00:00:38.335712 762333 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:38.336183 762333 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b214:sysno 13 D0713 00:00:38.336246 762333 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc001dd9110 6 D0713 00:00:38.336430 762333 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:38.358272 762333 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:38.358350 762333 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc001dd9110 7 D0713 00:00:38.358532 762333 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:38.360402 762333 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:38.360491 762333 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc001dd9110 8 D0713 00:00:38.360668 762333 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:38.363607 762333 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46af76:sysno 35 D0713 00:00:38.363719 762333 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc001dd9110 9 D0713 00:00:38.364996 762333 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:38.365540 762333 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:38.365639 762333 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc001dd9110 10 D0713 00:00:38.365858 762333 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:38.380007 762333 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b020:sysno 39 D0713 00:00:38.380168 762333 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc001dd9110 11 D0713 00:00:38.380354 762333 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:38.380849 762333 usertrap_amd64.go:212] [ 1051: 1052] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:38.380926 762333 usertrap_amd64.go:122] [ 1051: 1052] Allocate a new trap: 0xc001dd9110 12 D0713 00:00:38.381136 762333 usertrap_amd64.go:225] [ 1051: 1052] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:38.381585 762333 task_signals.go:470] [ 1051: 1051] Notified of signal 23 D0713 00:00:38.382254 762333 task_signals.go:220] [ 1051: 1051] Signal 23: delivering to handler D0713 00:00:38.392582 762333 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46af29:sysno 293 D0713 00:00:38.392667 762333 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc001dd9110 13 D0713 00:00:38.392825 762333 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:38.393549 762333 task_signals.go:470] [ 1051: 1051] Notified of signal 23 D0713 00:00:38.393971 762333 task_signals.go:220] [ 1051: 1051] Signal 23: delivering to handler D0713 00:00:38.409197 762333 task_signals.go:470] [ 1051: 1051] Notified of signal 23 D0713 00:00:38.411560 762333 task_signals.go:220] [ 1051: 1051] Signal 23: delivering to handler D0713 00:00:38.420784 762333 usertrap_amd64.go:212] [ 1051: 1051] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:38.420885 762333 usertrap_amd64.go:122] [ 1051: 1051] Allocate a new trap: 0xc001dd9110 14 D0713 00:00:38.421193 762333 usertrap_amd64.go:225] [ 1051: 1051] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:38.421750 762333 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.422234 762333 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.422856 762333 task_signals.go:204] [ 1051: 1053] Signal 1051, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.422896 762333 task_signals.go:204] [ 1051: 1052] Signal 1051, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.423181 762333 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.423632 762333 task_signals.go:204] [ 1051: 1056] Signal 1051, PID: 1056, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.423751 762333 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.424161 762333 task_signals.go:204] [ 1051: 1055] Signal 1051, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.424511 762333 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.424582 762333 task_exit.go:204] [ 1051: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.424822 762333 task_exit.go:204] [ 1051: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.425194 762333 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.425429 762333 task_signals.go:204] [ 1051: 1054] Signal 1051, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.425519 762333 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.425590 762333 task_exit.go:204] [ 1051: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.425967 762333 task_exit.go:204] [ 1051: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.426046 762333 task_exit.go:204] [ 1051: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.426256 762333 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.426807 762333 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.426867 762333 task_exit.go:204] [ 1051: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.455980 762333 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.456075 762333 task_exit.go:204] [ 1051: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.456338 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:38.456680 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:38.456737 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:38.458845 762333 task_exit.go:204] [ 1051: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.469629 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.471234 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:38.498464 762333 syscalls.go:262] [ 1057: 1057] Allocating stack with size of 8388608 bytes D0713 00:00:38.502703 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.503763 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:38.508226 762333 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:38.508449 762333 usertrap_amd64.go:106] [ 1057: 1057] Map a usertrap vma at 6a000 D0713 00:00:38.509760 762333 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0025c4ba0 1 D0713 00:00:38.510160 762333 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:38.512757 762333 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:38.512832 762333 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0025c4ba0 2 D0713 00:00:38.513047 762333 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:38.516712 762333 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:38.516794 762333 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0025c4ba0 3 D0713 00:00:38.517056 762333 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:38.544175 762333 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:38.544328 762333 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0025c4ba0 4 D0713 00:00:38.544538 762333 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:38.547935 762333 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:38.548035 762333 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0025c4ba0 5 D0713 00:00:38.548208 762333 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:38.548899 762333 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b214:sysno 13 D0713 00:00:38.549099 762333 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0025c4ba0 6 D0713 00:00:38.549403 762333 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:38.576621 762333 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:38.576730 762333 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0025c4ba0 7 D0713 00:00:38.576983 762333 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:38.579073 762333 usertrap_amd64.go:212] [ 1057: 1058] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:38.579164 762333 usertrap_amd64.go:122] [ 1057: 1058] Allocate a new trap: 0xc0025c4ba0 8 D0713 00:00:38.579547 762333 usertrap_amd64.go:225] [ 1057: 1058] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:38.581560 762333 usertrap_amd64.go:212] [ 1057: 1058] Found the pattern at ip 46af76:sysno 35 D0713 00:00:38.581621 762333 usertrap_amd64.go:122] [ 1057: 1058] Allocate a new trap: 0xc0025c4ba0 9 D0713 00:00:38.581878 762333 usertrap_amd64.go:225] [ 1057: 1058] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:38.583443 762333 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:38.583514 762333 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0025c4ba0 10 D0713 00:00:38.583789 762333 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:38.599293 762333 usertrap_amd64.go:212] [ 1057: 1058] Found the pattern at ip 46b020:sysno 39 D0713 00:00:38.599393 762333 usertrap_amd64.go:122] [ 1057: 1058] Allocate a new trap: 0xc0025c4ba0 11 D0713 00:00:38.599644 762333 usertrap_amd64.go:225] [ 1057: 1058] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:38.600117 762333 usertrap_amd64.go:212] [ 1057: 1058] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:38.600199 762333 usertrap_amd64.go:122] [ 1057: 1058] Allocate a new trap: 0xc0025c4ba0 12 D0713 00:00:38.600404 762333 usertrap_amd64.go:225] [ 1057: 1058] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:38.601004 762333 task_signals.go:470] [ 1057: 1057] Notified of signal 23 D0713 00:00:38.601300 762333 task_signals.go:220] [ 1057: 1057] Signal 23: delivering to handler D0713 00:00:38.612793 762333 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46af29:sysno 293 D0713 00:00:38.612893 762333 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0025c4ba0 13 D0713 00:00:38.613191 762333 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:38.613324 762333 task_signals.go:470] [ 1057: 1057] Notified of signal 23 D0713 00:00:38.613584 762333 task_signals.go:220] [ 1057: 1057] Signal 23: delivering to handler D0713 00:00:38.615589 762333 task_signals.go:470] [ 1057: 1057] Notified of signal 23 D0713 00:00:38.615894 762333 task_signals.go:220] [ 1057: 1057] Signal 23: delivering to handler D0713 00:00:38.630828 762333 task_signals.go:470] [ 1057: 1057] Notified of signal 23 D0713 00:00:38.631616 762333 task_signals.go:220] [ 1057: 1057] Signal 23: delivering to handler D0713 00:00:38.638876 762333 usertrap_amd64.go:212] [ 1057: 1057] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:38.638983 762333 usertrap_amd64.go:122] [ 1057: 1057] Allocate a new trap: 0xc0025c4ba0 14 D0713 00:00:38.639183 762333 usertrap_amd64.go:225] [ 1057: 1057] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:38.639945 762333 task_exit.go:204] [ 1057: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.642415 762333 task_signals.go:204] [ 1057: 1058] Signal 1057, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.642504 762333 task_signals.go:204] [ 1057: 1062] Signal 1057, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.643393 762333 task_signals.go:204] [ 1057: 1060] Signal 1057, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.644319 762333 task_exit.go:204] [ 1057: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.644680 762333 task_signals.go:204] [ 1057: 1061] Signal 1057, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.644725 762333 task_signals.go:204] [ 1057: 1059] Signal 1057, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.644800 762333 task_exit.go:204] [ 1057: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.645758 762333 task_exit.go:204] [ 1057: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.647391 762333 task_exit.go:204] [ 1057: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.650817 762333 task_exit.go:204] [ 1057: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.651648 762333 task_exit.go:204] [ 1057: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.651809 762333 task_exit.go:204] [ 1057: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.652201 762333 task_exit.go:204] [ 1057: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.652298 762333 task_exit.go:204] [ 1057: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.652567 762333 task_exit.go:204] [ 1057: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.653017 762333 task_exit.go:204] [ 1057: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.653135 762333 task_exit.go:204] [ 1057: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.653601 762333 task_exit.go:204] [ 1057: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.653727 762333 task_exit.go:204] [ 1057: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.677661 762333 task_exit.go:204] [ 1057: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.677749 762333 task_exit.go:204] [ 1057: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.678176 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:38.678677 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:38.681273 762333 task_exit.go:204] [ 1057: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.688532 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:38.690106 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.712491 762333 syscalls.go:262] [ 1063: 1063] Allocating stack with size of 8388608 bytes D0713 00:00:38.715604 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.716520 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:38.721142 762333 usertrap_amd64.go:212] [ 1063: 1063] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:38.721515 762333 usertrap_amd64.go:106] [ 1063: 1063] Map a usertrap vma at 67000 D0713 00:00:38.722614 762333 usertrap_amd64.go:122] [ 1063: 1063] Allocate a new trap: 0xc001e2b890 1 D0713 00:00:38.723055 762333 usertrap_amd64.go:225] [ 1063: 1063] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:38.725573 762333 usertrap_amd64.go:212] [ 1063: 1063] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:38.725660 762333 usertrap_amd64.go:122] [ 1063: 1063] Allocate a new trap: 0xc001e2b890 2 D0713 00:00:38.725827 762333 usertrap_amd64.go:225] [ 1063: 1063] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:38.731040 762333 usertrap_amd64.go:212] [ 1063: 1063] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:38.731131 762333 usertrap_amd64.go:122] [ 1063: 1063] Allocate a new trap: 0xc001e2b890 3 D0713 00:00:38.731341 762333 usertrap_amd64.go:225] [ 1063: 1063] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:38.757059 762333 usertrap_amd64.go:212] [ 1063: 1063] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:38.757164 762333 usertrap_amd64.go:122] [ 1063: 1063] Allocate a new trap: 0xc001e2b890 4 D0713 00:00:38.757362 762333 usertrap_amd64.go:225] [ 1063: 1063] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:38.760410 762333 usertrap_amd64.go:212] [ 1063: 1063] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:38.760464 762333 usertrap_amd64.go:122] [ 1063: 1063] Allocate a new trap: 0xc001e2b890 5 D0713 00:00:38.760568 762333 usertrap_amd64.go:225] [ 1063: 1063] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:38.760978 762333 usertrap_amd64.go:212] [ 1063: 1063] Found the pattern at ip 46b214:sysno 13 D0713 00:00:38.761035 762333 usertrap_amd64.go:122] [ 1063: 1063] Allocate a new trap: 0xc001e2b890 6 D0713 00:00:38.761146 762333 usertrap_amd64.go:225] [ 1063: 1063] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:38.787082 762333 usertrap_amd64.go:212] [ 1063: 1063] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:38.787184 762333 usertrap_amd64.go:122] [ 1063: 1063] Allocate a new trap: 0xc001e2b890 7 D0713 00:00:38.787369 762333 usertrap_amd64.go:225] [ 1063: 1063] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:38.789251 762333 usertrap_amd64.go:212] [ 1063: 1064] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:38.789344 762333 usertrap_amd64.go:122] [ 1063: 1064] Allocate a new trap: 0xc001e2b890 8 D0713 00:00:38.789508 762333 usertrap_amd64.go:225] [ 1063: 1064] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:38.791407 762333 usertrap_amd64.go:212] [ 1063: 1064] Found the pattern at ip 46af76:sysno 35 D0713 00:00:38.791572 762333 usertrap_amd64.go:122] [ 1063: 1064] Allocate a new trap: 0xc001e2b890 9 D0713 00:00:38.791857 762333 usertrap_amd64.go:225] [ 1063: 1064] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:38.794249 762333 usertrap_amd64.go:212] [ 1063: 1063] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:38.794354 762333 usertrap_amd64.go:122] [ 1063: 1063] Allocate a new trap: 0xc001e2b890 10 D0713 00:00:38.794606 762333 usertrap_amd64.go:225] [ 1063: 1063] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:38.809455 762333 usertrap_amd64.go:212] [ 1063: 1064] Found the pattern at ip 46b020:sysno 39 D0713 00:00:38.809553 762333 usertrap_amd64.go:122] [ 1063: 1064] Allocate a new trap: 0xc001e2b890 11 D0713 00:00:38.809714 762333 usertrap_amd64.go:225] [ 1063: 1064] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:38.810093 762333 usertrap_amd64.go:212] [ 1063: 1064] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:38.810161 762333 usertrap_amd64.go:122] [ 1063: 1064] Allocate a new trap: 0xc001e2b890 12 D0713 00:00:38.810293 762333 usertrap_amd64.go:225] [ 1063: 1064] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:38.810856 762333 task_signals.go:470] [ 1063: 1063] Notified of signal 23 D0713 00:00:38.811207 762333 task_signals.go:179] [ 1063: 1063] Restarting syscall 202: interrupted by signal 23 D0713 00:00:38.811309 762333 task_signals.go:220] [ 1063: 1063] Signal 23: delivering to handler D0713 00:00:38.826664 762333 usertrap_amd64.go:212] [ 1063: 1063] Found the pattern at ip 46af29:sysno 293 D0713 00:00:38.826848 762333 usertrap_amd64.go:122] [ 1063: 1063] Allocate a new trap: 0xc001e2b890 13 D0713 00:00:38.826709 762333 task_signals.go:470] [ 1063: 1063] Notified of signal 23 D0713 00:00:38.827068 762333 usertrap_amd64.go:225] [ 1063: 1063] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:38.827395 762333 task_signals.go:220] [ 1063: 1063] Signal 23: delivering to handler D0713 00:00:38.830592 762333 task_signals.go:470] [ 1063: 1063] Notified of signal 23 D0713 00:00:38.830837 762333 task_signals.go:220] [ 1063: 1063] Signal 23: delivering to handler D0713 00:00:38.845233 762333 task_signals.go:470] [ 1063: 1063] Notified of signal 23 D0713 00:00:38.846855 762333 task_signals.go:220] [ 1063: 1063] Signal 23: delivering to handler D0713 00:00:38.858064 762333 usertrap_amd64.go:212] [ 1063: 1063] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:38.858179 762333 usertrap_amd64.go:122] [ 1063: 1063] Allocate a new trap: 0xc001e2b890 14 D0713 00:00:38.858364 762333 usertrap_amd64.go:225] [ 1063: 1063] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:38.859270 762333 task_exit.go:204] [ 1063: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.859580 762333 task_signals.go:204] [ 1063: 1067] Signal 1063, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.860015 762333 task_exit.go:204] [ 1063: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.860194 762333 task_signals.go:204] [ 1063: 1064] Signal 1063, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.860509 762333 task_signals.go:204] [ 1063: 1065] Signal 1063, PID: 1065, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.860805 762333 task_signals.go:204] [ 1063: 1066] Signal 1063, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.861017 762333 task_exit.go:204] [ 1063: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.861348 762333 task_exit.go:204] [ 1063: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.861604 762333 task_exit.go:204] [ 1063: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.861893 762333 task_exit.go:204] [ 1063: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.861988 762333 task_exit.go:204] [ 1063: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.862636 762333 task_exit.go:204] [ 1063: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.862693 762333 task_exit.go:204] [ 1063: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.863059 762333 task_exit.go:204] [ 1063: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.863144 762333 task_exit.go:204] [ 1063: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.863407 762333 task_exit.go:204] [ 1063: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.887310 762333 task_exit.go:204] [ 1063: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.887408 762333 task_exit.go:204] [ 1063: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.887682 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:38.888040 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:38.888105 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:38.889197 762333 task_exit.go:204] [ 1063: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.897859 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.899861 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:38.924028 762333 syscalls.go:262] [ 1068: 1068] Allocating stack with size of 8388608 bytes D0713 00:00:38.927822 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.928515 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:38.939814 762333 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:38.939985 762333 usertrap_amd64.go:106] [ 1068: 1068] Map a usertrap vma at 69000 D0713 00:00:38.941082 762333 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000bea420 1 D0713 00:00:38.941542 762333 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:38.944179 762333 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:38.944247 762333 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000bea420 2 D0713 00:00:38.944416 762333 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:38.947502 762333 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:38.947565 762333 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000bea420 3 D0713 00:00:38.947777 762333 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:38.973770 762333 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:38.973836 762333 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000bea420 4 D0713 00:00:38.973987 762333 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:38.977185 762333 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:38.977255 762333 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000bea420 5 D0713 00:00:38.977399 762333 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:38.977831 762333 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b214:sysno 13 D0713 00:00:38.977889 762333 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000bea420 6 D0713 00:00:38.978073 762333 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:39.003837 762333 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:39.003936 762333 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000bea420 7 D0713 00:00:39.004083 762333 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:39.006125 762333 usertrap_amd64.go:212] [ 1068: 1069] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:39.006212 762333 usertrap_amd64.go:122] [ 1068: 1069] Allocate a new trap: 0xc000bea420 8 D0713 00:00:39.006431 762333 usertrap_amd64.go:225] [ 1068: 1069] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:39.008452 762333 usertrap_amd64.go:212] [ 1068: 1069] Found the pattern at ip 46af76:sysno 35 D0713 00:00:39.008519 762333 usertrap_amd64.go:122] [ 1068: 1069] Allocate a new trap: 0xc000bea420 9 D0713 00:00:39.008740 762333 usertrap_amd64.go:225] [ 1068: 1069] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:39.010079 762333 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:39.010186 762333 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000bea420 10 D0713 00:00:39.010359 762333 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:39.025727 762333 usertrap_amd64.go:212] [ 1068: 1069] Found the pattern at ip 46b020:sysno 39 D0713 00:00:39.026482 762333 usertrap_amd64.go:122] [ 1068: 1069] Allocate a new trap: 0xc000bea420 11 D0713 00:00:39.027256 762333 usertrap_amd64.go:225] [ 1068: 1069] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:39.028241 762333 usertrap_amd64.go:212] [ 1068: 1069] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:39.028298 762333 usertrap_amd64.go:122] [ 1068: 1069] Allocate a new trap: 0xc000bea420 12 D0713 00:00:39.028468 762333 usertrap_amd64.go:225] [ 1068: 1069] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:39.029071 762333 task_signals.go:470] [ 1068: 1068] Notified of signal 23 D0713 00:00:39.029400 762333 task_signals.go:220] [ 1068: 1068] Signal 23: delivering to handler D0713 00:00:39.037404 762333 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46af29:sysno 293 D0713 00:00:39.037491 762333 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000bea420 13 D0713 00:00:39.037609 762333 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:39.042152 762333 task_signals.go:470] [ 1068: 1068] Notified of signal 23 D0713 00:00:39.042435 762333 task_signals.go:220] [ 1068: 1068] Signal 23: delivering to handler D0713 00:00:39.055472 762333 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:39.055585 762333 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000bea420 14 D0713 00:00:39.055797 762333 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46b6e0 trap addr 69460 ([184 24 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:39.060059 762333 task_signals.go:470] [ 1068: 1068] Notified of signal 23 D0713 00:00:39.063741 762333 task_signals.go:220] [ 1068: 1068] Signal 23: delivering to handler D0713 00:00:39.066041 762333 usertrap_amd64.go:212] [ 1068: 1068] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:39.066121 762333 usertrap_amd64.go:122] [ 1068: 1068] Allocate a new trap: 0xc000bea420 15 D0713 00:00:39.066253 762333 usertrap_amd64.go:225] [ 1068: 1068] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 00:00:39.066678 762333 task_exit.go:204] [ 1068: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.067072 762333 task_exit.go:204] [ 1068: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.067468 762333 task_signals.go:204] [ 1068: 1072] Signal 1068, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.067477 762333 task_signals.go:204] [ 1068: 1073] Signal 1068, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.067702 762333 task_exit.go:204] [ 1068: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.067682 762333 task_signals.go:204] [ 1068: 1071] Signal 1068, PID: 1071, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.068213 762333 task_exit.go:204] [ 1068: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.068455 762333 task_signals.go:204] [ 1068: 1069] Signal 1068, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.068673 762333 task_exit.go:204] [ 1068: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.068755 762333 task_exit.go:204] [ 1068: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.068681 762333 task_signals.go:204] [ 1068: 1070] Signal 1068, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.069161 762333 task_exit.go:204] [ 1068: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.069730 762333 task_exit.go:204] [ 1068: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.070047 762333 task_exit.go:204] [ 1068: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.070349 762333 task_exit.go:204] [ 1068: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.070497 762333 task_exit.go:204] [ 1068: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.071050 762333 task_exit.go:204] [ 1068: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.071120 762333 task_exit.go:204] [ 1068: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.071381 762333 task_exit.go:204] [ 1068: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.071487 762333 task_exit.go:204] [ 1068: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.093167 762333 task_exit.go:204] [ 1068: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.093293 762333 task_exit.go:204] [ 1068: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.093552 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:39.094078 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:39.094152 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:39.094446 762333 task_exit.go:204] [ 1068: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.103312 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.104127 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:39.126264 762333 syscalls.go:262] [ 1074: 1074] Allocating stack with size of 8388608 bytes D0713 00:00:39.129400 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.130092 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:39.133552 762333 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:39.133895 762333 usertrap_amd64.go:106] [ 1074: 1074] Map a usertrap vma at 65000 D0713 00:00:39.134970 762333 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc000bea870 1 D0713 00:00:39.135368 762333 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:39.137995 762333 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:39.138109 762333 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc000bea870 2 D0713 00:00:39.138281 762333 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:39.143222 762333 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:39.143290 762333 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc000bea870 3 D0713 00:00:39.143464 762333 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:39.171984 762333 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:39.172076 762333 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc000bea870 4 D0713 00:00:39.172299 762333 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:39.175568 762333 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:39.175654 762333 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc000bea870 5 D0713 00:00:39.175833 762333 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:39.176399 762333 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b214:sysno 13 D0713 00:00:39.176471 762333 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc000bea870 6 D0713 00:00:39.176657 762333 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:39.205248 762333 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:39.205357 762333 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc000bea870 7 D0713 00:00:39.205534 762333 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:39.207316 762333 usertrap_amd64.go:212] [ 1074: 1075] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:39.207379 762333 usertrap_amd64.go:122] [ 1074: 1075] Allocate a new trap: 0xc000bea870 8 D0713 00:00:39.207548 762333 usertrap_amd64.go:225] [ 1074: 1075] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:39.209411 762333 usertrap_amd64.go:212] [ 1074: 1075] Found the pattern at ip 46af76:sysno 35 D0713 00:00:39.209491 762333 usertrap_amd64.go:122] [ 1074: 1075] Allocate a new trap: 0xc000bea870 9 D0713 00:00:39.209736 762333 usertrap_amd64.go:225] [ 1074: 1075] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:39.211098 762333 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:39.211172 762333 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc000bea870 10 D0713 00:00:39.211348 762333 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:39.224172 762333 usertrap_amd64.go:212] [ 1074: 1075] Found the pattern at ip 46b020:sysno 39 D0713 00:00:39.224249 762333 usertrap_amd64.go:122] [ 1074: 1075] Allocate a new trap: 0xc000bea870 11 D0713 00:00:39.224388 762333 usertrap_amd64.go:225] [ 1074: 1075] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:39.224859 762333 usertrap_amd64.go:212] [ 1074: 1075] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:39.224913 762333 usertrap_amd64.go:122] [ 1074: 1075] Allocate a new trap: 0xc000bea870 12 D0713 00:00:39.225113 762333 usertrap_amd64.go:225] [ 1074: 1075] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:39.225594 762333 task_signals.go:470] [ 1074: 1074] Notified of signal 23 D0713 00:00:39.226172 762333 task_signals.go:220] [ 1074: 1074] Signal 23: delivering to handler D0713 00:00:39.235119 762333 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46af29:sysno 293 D0713 00:00:39.235189 762333 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc000bea870 13 D0713 00:00:39.235356 762333 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:39.241874 762333 task_signals.go:470] [ 1074: 1074] Notified of signal 23 D0713 00:00:39.244234 762333 task_signals.go:220] [ 1074: 1074] Signal 23: delivering to handler I0713 00:00:39.257904 762333 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0713 00:00:39.258154 762333 usertrap_amd64.go:212] [ 1074: 1074] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:39.258267 762333 usertrap_amd64.go:122] [ 1074: 1074] Allocate a new trap: 0xc000bea870 14 D0713 00:00:39.258476 762333 usertrap_amd64.go:225] [ 1074: 1074] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:39.259043 762333 task_exit.go:204] [ 1074: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.259449 762333 task_signals.go:204] [ 1074: 1075] Signal 1074, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.259547 762333 task_signals.go:204] [ 1074: 1078] Signal 1074, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.259776 762333 task_signals.go:204] [ 1074: 1076] Signal 1074, PID: 1076, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.259852 762333 task_signals.go:204] [ 1074: 1077] Signal 1074, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.260069 762333 task_exit.go:204] [ 1074: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.260622 762333 task_exit.go:204] [ 1074: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.260912 762333 task_exit.go:204] [ 1074: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.261130 762333 task_exit.go:204] [ 1074: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.261233 762333 task_exit.go:204] [ 1074: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.261441 762333 task_exit.go:204] [ 1074: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.261540 762333 task_exit.go:204] [ 1074: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.262536 762333 task_exit.go:204] [ 1074: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.262626 762333 task_exit.go:204] [ 1074: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.262851 762333 task_exit.go:204] [ 1074: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.262937 762333 task_exit.go:204] [ 1074: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.291144 762333 task_exit.go:204] [ 1074: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.291251 762333 task_exit.go:204] [ 1074: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.291520 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:39.291891 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:39.292007 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:39.292055 762333 task_exit.go:204] [ 1074: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.298476 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.302212 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:39.318266 762333 syscalls.go:262] [ 1079: 1079] Allocating stack with size of 8388608 bytes D0713 00:00:39.321521 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.323867 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:39.327939 762333 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:39.328111 762333 usertrap_amd64.go:106] [ 1079: 1079] Map a usertrap vma at 63000 D0713 00:00:39.329443 762333 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc00111c300 1 D0713 00:00:39.329828 762333 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:39.332181 762333 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:39.332323 762333 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc00111c300 2 D0713 00:00:39.332506 762333 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:39.335172 762333 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:39.335255 762333 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc00111c300 3 D0713 00:00:39.335412 762333 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:39.357727 762333 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:39.357797 762333 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc00111c300 4 D0713 00:00:39.358014 762333 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:39.362207 762333 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:39.362283 762333 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc00111c300 5 D0713 00:00:39.362416 762333 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:39.362864 762333 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b214:sysno 13 D0713 00:00:39.362929 762333 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc00111c300 6 D0713 00:00:39.363058 762333 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:39.388319 762333 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:39.388381 762333 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc00111c300 7 D0713 00:00:39.388518 762333 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:39.389874 762333 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:39.389961 762333 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc00111c300 8 D0713 00:00:39.390132 762333 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:39.391698 762333 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46af76:sysno 35 D0713 00:00:39.391785 762333 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc00111c300 9 D0713 00:00:39.391959 762333 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:39.393084 762333 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:39.393189 762333 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc00111c300 10 D0713 00:00:39.394224 762333 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:39.397601 762333 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46b020:sysno 39 D0713 00:00:39.397676 762333 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc00111c300 11 D0713 00:00:39.398286 762333 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:39.398619 762333 usertrap_amd64.go:212] [ 1079: 1080] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:39.398749 762333 usertrap_amd64.go:122] [ 1079: 1080] Allocate a new trap: 0xc00111c300 12 D0713 00:00:39.398964 762333 usertrap_amd64.go:225] [ 1079: 1080] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:39.400121 762333 task_signals.go:470] [ 1079: 1079] Notified of signal 23 D0713 00:00:39.400380 762333 task_signals.go:220] [ 1079: 1079] Signal 23: delivering to handler D0713 00:00:39.411713 762333 task_signals.go:470] [ 1079: 1079] Notified of signal 23 D0713 00:00:39.412282 762333 task_signals.go:220] [ 1079: 1079] Signal 23: delivering to handler D0713 00:00:39.413719 762333 task_signals.go:470] [ 1079: 1079] Notified of signal 23 D0713 00:00:39.414027 762333 task_signals.go:220] [ 1079: 1079] Signal 23: delivering to handler D0713 00:00:39.424593 762333 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46af29:sysno 293 D0713 00:00:39.424703 762333 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc00111c300 13 D0713 00:00:39.424895 762333 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:39.426232 762333 task_signals.go:470] [ 1079: 1079] Notified of signal 23 D0713 00:00:39.426396 762333 task_signals.go:220] [ 1079: 1079] Signal 23: delivering to handler D0713 00:00:39.439705 762333 task_signals.go:470] [ 1079: 1079] Notified of signal 23 D0713 00:00:39.442797 762333 task_signals.go:220] [ 1079: 1079] Signal 23: delivering to handler I0713 00:00:39.452176 762333 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0713 00:00:39.452508 762333 usertrap_amd64.go:212] [ 1079: 1079] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:39.452574 762333 usertrap_amd64.go:122] [ 1079: 1079] Allocate a new trap: 0xc00111c300 14 D0713 00:00:39.452751 762333 usertrap_amd64.go:225] [ 1079: 1079] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:39.453313 762333 task_exit.go:204] [ 1079: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.453752 762333 task_signals.go:204] [ 1079: 1083] Signal 1079, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.453800 762333 task_signals.go:204] [ 1079: 1081] Signal 1079, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.454083 762333 task_signals.go:204] [ 1079: 1082] Signal 1079, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.454241 762333 task_signals.go:204] [ 1079: 1080] Signal 1079, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.454225 762333 task_signals.go:204] [ 1079: 1084] Signal 1079, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.454458 762333 task_exit.go:204] [ 1079: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.454859 762333 task_exit.go:204] [ 1079: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.454983 762333 task_exit.go:204] [ 1079: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.455065 762333 task_exit.go:204] [ 1079: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.455343 762333 task_exit.go:204] [ 1079: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.455527 762333 task_exit.go:204] [ 1079: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.455705 762333 task_exit.go:204] [ 1079: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.455916 762333 task_exit.go:204] [ 1079: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.456711 762333 task_exit.go:204] [ 1079: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.456809 762333 task_exit.go:204] [ 1079: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.457189 762333 task_exit.go:204] [ 1079: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.457324 762333 task_exit.go:204] [ 1079: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.457994 762333 task_exit.go:204] [ 1079: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.458096 762333 task_exit.go:204] [ 1079: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.482665 762333 task_exit.go:204] [ 1079: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.482751 762333 task_exit.go:204] [ 1079: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.483029 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:39.483442 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:39.483530 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:39.483678 762333 task_exit.go:204] [ 1079: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.491682 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.493749 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:39.512444 762333 syscalls.go:262] [ 1085: 1085] Allocating stack with size of 8388608 bytes D0713 00:00:39.515477 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.516051 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:39.519730 762333 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:39.519925 762333 usertrap_amd64.go:106] [ 1085: 1085] Map a usertrap vma at 69000 D0713 00:00:39.521139 762333 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00111c960 1 D0713 00:00:39.521523 762333 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:39.524020 762333 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:39.524089 762333 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00111c960 2 D0713 00:00:39.524229 762333 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:39.527112 762333 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:39.527189 762333 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00111c960 3 D0713 00:00:39.527338 762333 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:39.552174 762333 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:39.552294 762333 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00111c960 4 D0713 00:00:39.552501 762333 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:39.555806 762333 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:39.555922 762333 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00111c960 5 D0713 00:00:39.556103 762333 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:39.556546 762333 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b214:sysno 13 D0713 00:00:39.556635 762333 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00111c960 6 D0713 00:00:39.556766 762333 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:39.580082 762333 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:39.580179 762333 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00111c960 7 D0713 00:00:39.580385 762333 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:39.582577 762333 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:39.582752 762333 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc00111c960 8 D0713 00:00:39.583053 762333 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:39.585337 762333 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46af76:sysno 35 D0713 00:00:39.585476 762333 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc00111c960 9 D0713 00:00:39.585791 762333 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:39.586581 762333 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:39.586677 762333 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00111c960 10 D0713 00:00:39.586953 762333 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:39.600194 762333 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b020:sysno 39 D0713 00:00:39.600333 762333 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc00111c960 11 D0713 00:00:39.600705 762333 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:39.601353 762333 usertrap_amd64.go:212] [ 1085: 1086] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:39.601430 762333 usertrap_amd64.go:122] [ 1085: 1086] Allocate a new trap: 0xc00111c960 12 D0713 00:00:39.601635 762333 usertrap_amd64.go:225] [ 1085: 1086] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:39.602274 762333 task_signals.go:470] [ 1085: 1085] Notified of signal 23 D0713 00:00:39.603341 762333 task_signals.go:220] [ 1085: 1085] Signal 23: delivering to handler D0713 00:00:39.614494 762333 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46af29:sysno 293 D0713 00:00:39.614572 762333 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00111c960 13 D0713 00:00:39.614604 762333 task_signals.go:470] [ 1085: 1085] Notified of signal 23 D0713 00:00:39.614810 762333 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:39.615204 762333 task_signals.go:220] [ 1085: 1085] Signal 23: delivering to handler D0713 00:00:39.617568 762333 task_signals.go:470] [ 1085: 1085] Notified of signal 23 D0713 00:00:39.618343 762333 task_signals.go:179] [ 1085: 1085] Restarting syscall 202: interrupted by signal 23 D0713 00:00:39.618467 762333 task_signals.go:220] [ 1085: 1085] Signal 23: delivering to handler D0713 00:00:39.632091 762333 task_signals.go:470] [ 1085: 1085] Notified of signal 23 D0713 00:00:39.632377 762333 task_signals.go:179] [ 1085: 1085] Restarting syscall 202: interrupted by signal 23 D0713 00:00:39.632474 762333 task_signals.go:220] [ 1085: 1085] Signal 23: delivering to handler I0713 00:00:39.646152 762333 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0713 00:00:39.646424 762333 usertrap_amd64.go:212] [ 1085: 1085] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:39.646484 762333 usertrap_amd64.go:122] [ 1085: 1085] Allocate a new trap: 0xc00111c960 14 D0713 00:00:39.646625 762333 usertrap_amd64.go:225] [ 1085: 1085] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:39.647060 762333 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.648403 762333 task_signals.go:204] [ 1085: 1087] Signal 1085, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.649076 762333 task_signals.go:204] [ 1085: 1089] Signal 1085, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.649098 762333 task_signals.go:204] [ 1085: 1088] Signal 1085, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.649359 762333 task_signals.go:204] [ 1085: 1090] Signal 1085, PID: 1090, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.649413 762333 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.649595 762333 task_signals.go:204] [ 1085: 1086] Signal 1085, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.649813 762333 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.650581 762333 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.654361 762333 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.655411 762333 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.655519 762333 task_exit.go:204] [ 1085: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.655863 762333 task_exit.go:204] [ 1085: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.656303 762333 task_exit.go:204] [ 1085: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.656360 762333 task_exit.go:204] [ 1085: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.656541 762333 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.657372 762333 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.657509 762333 task_exit.go:204] [ 1085: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.657907 762333 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.657976 762333 task_exit.go:204] [ 1085: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.678645 762333 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.678768 762333 task_exit.go:204] [ 1085: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.679147 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:39.679749 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:39.679879 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:39.680548 762333 task_exit.go:204] [ 1085: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.690163 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.690356 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:39.711222 762333 syscalls.go:262] [ 1091: 1091] Allocating stack with size of 8388608 bytes D0713 00:00:39.714401 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.715204 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:39.717174 762333 task_signals.go:470] [ 6: 9] Notified of signal 23 D0713 00:00:39.717414 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:39.719156 762333 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:39.719335 762333 usertrap_amd64.go:106] [ 1091: 1091] Map a usertrap vma at 62000 D0713 00:00:39.720640 762333 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0009303f0 1 D0713 00:00:39.721136 762333 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:39.723150 762333 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:39.723225 762333 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0009303f0 2 D0713 00:00:39.723371 762333 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:39.725944 762333 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:39.726005 762333 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0009303f0 3 D0713 00:00:39.726157 762333 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:39.749634 762333 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:39.749725 762333 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0009303f0 4 D0713 00:00:39.749844 762333 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:39.753006 762333 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:39.753078 762333 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0009303f0 5 D0713 00:00:39.753253 762333 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:39.753673 762333 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b214:sysno 13 D0713 00:00:39.753748 762333 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0009303f0 6 D0713 00:00:39.753906 762333 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:39.774632 762333 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:39.774716 762333 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0009303f0 7 D0713 00:00:39.774819 762333 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:39.776595 762333 usertrap_amd64.go:212] [ 1091: 1092] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:39.776739 762333 usertrap_amd64.go:122] [ 1091: 1092] Allocate a new trap: 0xc0009303f0 8 D0713 00:00:39.777089 762333 usertrap_amd64.go:225] [ 1091: 1092] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:39.778943 762333 usertrap_amd64.go:212] [ 1091: 1092] Found the pattern at ip 46af76:sysno 35 D0713 00:00:39.779022 762333 usertrap_amd64.go:122] [ 1091: 1092] Allocate a new trap: 0xc0009303f0 9 D0713 00:00:39.779234 762333 usertrap_amd64.go:225] [ 1091: 1092] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:39.780551 762333 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:39.780653 762333 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0009303f0 10 D0713 00:00:39.780999 762333 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:39.794074 762333 usertrap_amd64.go:212] [ 1091: 1092] Found the pattern at ip 46b020:sysno 39 D0713 00:00:39.794193 762333 usertrap_amd64.go:122] [ 1091: 1092] Allocate a new trap: 0xc0009303f0 11 D0713 00:00:39.794438 762333 usertrap_amd64.go:225] [ 1091: 1092] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:39.794840 762333 usertrap_amd64.go:212] [ 1091: 1092] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:39.794923 762333 usertrap_amd64.go:122] [ 1091: 1092] Allocate a new trap: 0xc0009303f0 12 D0713 00:00:39.795034 762333 usertrap_amd64.go:225] [ 1091: 1092] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:39.795426 762333 task_signals.go:470] [ 1091: 1091] Notified of signal 23 D0713 00:00:39.795712 762333 task_signals.go:220] [ 1091: 1091] Signal 23: delivering to handler D0713 00:00:39.806306 762333 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46af29:sysno 293 D0713 00:00:39.806386 762333 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0009303f0 13 D0713 00:00:39.806566 762333 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:39.807488 762333 task_signals.go:470] [ 1091: 1091] Notified of signal 23 D0713 00:00:39.807771 762333 task_signals.go:220] [ 1091: 1091] Signal 23: delivering to handler D0713 00:00:39.825036 762333 task_signals.go:470] [ 1091: 1091] Notified of signal 23 D0713 00:00:39.826221 762333 task_signals.go:220] [ 1091: 1091] Signal 23: delivering to handler I0713 00:00:39.833201 762333 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0713 00:00:39.833535 762333 usertrap_amd64.go:212] [ 1091: 1091] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:39.833634 762333 usertrap_amd64.go:122] [ 1091: 1091] Allocate a new trap: 0xc0009303f0 14 D0713 00:00:39.833814 762333 usertrap_amd64.go:225] [ 1091: 1091] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:39.834324 762333 task_exit.go:204] [ 1091: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.834776 762333 task_signals.go:204] [ 1091: 1095] Signal 1091, PID: 1095, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.835177 762333 task_exit.go:204] [ 1091: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.835646 762333 task_signals.go:204] [ 1091: 1094] Signal 1091, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.835702 762333 task_signals.go:204] [ 1091: 1093] Signal 1091, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.835713 762333 task_signals.go:204] [ 1091: 1092] Signal 1091, PID: 1092, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.835961 762333 task_exit.go:204] [ 1091: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.836141 762333 task_exit.go:204] [ 1091: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.836409 762333 task_exit.go:204] [ 1091: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.836803 762333 task_exit.go:204] [ 1091: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.836886 762333 task_exit.go:204] [ 1091: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.837176 762333 task_exit.go:204] [ 1091: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.837747 762333 task_exit.go:204] [ 1091: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.837841 762333 task_exit.go:204] [ 1091: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.838192 762333 task_exit.go:204] [ 1091: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.838267 762333 task_exit.go:204] [ 1091: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.859548 762333 task_exit.go:204] [ 1091: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.859653 762333 task_exit.go:204] [ 1091: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.859929 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:39.860220 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:39.860290 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:39.860534 762333 task_exit.go:204] [ 1091: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.866357 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.870449 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:39.886581 762333 syscalls.go:262] [ 1096: 1096] Allocating stack with size of 8388608 bytes D0713 00:00:39.889662 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.890196 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:39.894738 762333 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:39.894946 762333 usertrap_amd64.go:106] [ 1096: 1096] Map a usertrap vma at 62000 D0713 00:00:39.895913 762333 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000beb290 1 D0713 00:00:39.896452 762333 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:39.898974 762333 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:39.899055 762333 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000beb290 2 D0713 00:00:39.899214 762333 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:39.902630 762333 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:39.902696 762333 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000beb290 3 D0713 00:00:39.902867 762333 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:39.929120 762333 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:39.929234 762333 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000beb290 4 D0713 00:00:39.929459 762333 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:39.933559 762333 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:39.933664 762333 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000beb290 5 D0713 00:00:39.933874 762333 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:39.934484 762333 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b214:sysno 13 D0713 00:00:39.934565 762333 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000beb290 6 D0713 00:00:39.934727 762333 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:39.960405 762333 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:39.960492 762333 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000beb290 7 D0713 00:00:39.960634 762333 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:39.962419 762333 usertrap_amd64.go:212] [ 1096: 1097] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:39.962495 762333 usertrap_amd64.go:122] [ 1096: 1097] Allocate a new trap: 0xc000beb290 8 D0713 00:00:39.962683 762333 usertrap_amd64.go:225] [ 1096: 1097] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:39.964803 762333 usertrap_amd64.go:212] [ 1096: 1097] Found the pattern at ip 46af76:sysno 35 D0713 00:00:39.964872 762333 usertrap_amd64.go:122] [ 1096: 1097] Allocate a new trap: 0xc000beb290 9 D0713 00:00:39.965930 762333 usertrap_amd64.go:225] [ 1096: 1097] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:39.966291 762333 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:39.966476 762333 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000beb290 10 D0713 00:00:39.966660 762333 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:39.980905 762333 usertrap_amd64.go:212] [ 1096: 1097] Found the pattern at ip 46b020:sysno 39 D0713 00:00:39.981063 762333 usertrap_amd64.go:122] [ 1096: 1097] Allocate a new trap: 0xc000beb290 11 D0713 00:00:39.981233 762333 usertrap_amd64.go:225] [ 1096: 1097] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:39.982121 762333 usertrap_amd64.go:212] [ 1096: 1097] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:39.982192 762333 usertrap_amd64.go:122] [ 1096: 1097] Allocate a new trap: 0xc000beb290 12 D0713 00:00:39.982856 762333 usertrap_amd64.go:225] [ 1096: 1097] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:39.983543 762333 task_signals.go:470] [ 1096: 1096] Notified of signal 23 D0713 00:00:39.984115 762333 task_signals.go:220] [ 1096: 1096] Signal 23: delivering to handler D0713 00:00:39.992241 762333 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46af29:sysno 293 D0713 00:00:39.992312 762333 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000beb290 13 D0713 00:00:39.992475 762333 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:39.999524 762333 task_signals.go:470] [ 1096: 1096] Notified of signal 23 D0713 00:00:40.002681 762333 task_signals.go:220] [ 1096: 1096] Signal 23: delivering to handler D0713 00:00:40.014160 762333 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:40.014266 762333 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000beb290 14 D0713 00:00:40.014496 762333 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46b6e0 trap addr 62460 ([184 24 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:40.018020 762333 task_signals.go:470] [ 1096: 1096] Notified of signal 23 D0713 00:00:40.018336 762333 task_signals.go:179] [ 1096: 1096] Restarting syscall 202: interrupted by signal 23 D0713 00:00:40.018420 762333 task_signals.go:220] [ 1096: 1096] Signal 23: delivering to handler D0713 00:00:40.024120 762333 usertrap_amd64.go:212] [ 1096: 1096] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.024199 762333 usertrap_amd64.go:122] [ 1096: 1096] Allocate a new trap: 0xc000beb290 15 D0713 00:00:40.024384 762333 usertrap_amd64.go:225] [ 1096: 1096] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 00:00:40.024903 762333 task_exit.go:204] [ 1096: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.025499 762333 task_signals.go:204] [ 1096: 1100] Signal 1096, PID: 1100, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.025545 762333 task_signals.go:204] [ 1096: 1099] Signal 1096, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.025919 762333 task_signals.go:204] [ 1096: 1098] Signal 1096, PID: 1098, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.026013 762333 task_signals.go:204] [ 1096: 1097] Signal 1096, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.026016 762333 task_signals.go:204] [ 1096: 1101] Signal 1096, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.026049 762333 task_exit.go:204] [ 1096: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.026382 762333 task_exit.go:204] [ 1096: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.026935 762333 task_exit.go:204] [ 1096: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.027458 762333 task_exit.go:204] [ 1096: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.027760 762333 task_exit.go:204] [ 1096: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.027877 762333 task_exit.go:204] [ 1096: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.027948 762333 task_exit.go:204] [ 1096: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.028306 762333 task_exit.go:204] [ 1096: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.028741 762333 task_exit.go:204] [ 1096: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.028814 762333 task_exit.go:204] [ 1096: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.029075 762333 task_exit.go:204] [ 1096: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.029146 762333 task_exit.go:204] [ 1096: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.029441 762333 task_exit.go:204] [ 1096: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.029496 762333 task_exit.go:204] [ 1096: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.053165 762333 task_exit.go:204] [ 1096: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.053273 762333 task_exit.go:204] [ 1096: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.053507 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:40.053988 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:40.054101 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:40.054315 762333 task_exit.go:204] [ 1096: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.063178 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.064386 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:40.082663 762333 syscalls.go:262] [ 1102: 1102] Allocating stack with size of 8388608 bytes D0713 00:00:40.085823 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.086282 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:40.090154 762333 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:40.090314 762333 usertrap_amd64.go:106] [ 1102: 1102] Map a usertrap vma at 61000 D0713 00:00:40.091282 762333 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc0009afd10 1 D0713 00:00:40.091615 762333 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:40.093548 762333 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:40.093603 762333 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc0009afd10 2 D0713 00:00:40.093715 762333 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:40.096074 762333 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:40.096125 762333 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc0009afd10 3 D0713 00:00:40.096232 762333 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:40.115702 762333 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:40.115791 762333 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc0009afd10 4 D0713 00:00:40.115928 762333 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:40.118583 762333 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:40.118642 762333 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc0009afd10 5 D0713 00:00:40.118822 762333 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:40.119207 762333 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b214:sysno 13 D0713 00:00:40.119311 762333 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc0009afd10 6 D0713 00:00:40.119476 762333 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:40.137877 762333 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:40.137941 762333 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc0009afd10 7 D0713 00:00:40.138069 762333 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:40.139749 762333 usertrap_amd64.go:212] [ 1102: 1103] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:40.139822 762333 usertrap_amd64.go:122] [ 1102: 1103] Allocate a new trap: 0xc0009afd10 8 D0713 00:00:40.140016 762333 usertrap_amd64.go:225] [ 1102: 1103] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:40.141573 762333 usertrap_amd64.go:212] [ 1102: 1103] Found the pattern at ip 46af76:sysno 35 D0713 00:00:40.141628 762333 usertrap_amd64.go:122] [ 1102: 1103] Allocate a new trap: 0xc0009afd10 9 D0713 00:00:40.141788 762333 usertrap_amd64.go:225] [ 1102: 1103] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:40.142626 762333 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:40.142713 762333 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc0009afd10 10 D0713 00:00:40.143522 762333 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:40.144521 762333 usertrap_amd64.go:212] [ 1102: 1103] Found the pattern at ip 46b020:sysno 39 D0713 00:00:40.144622 762333 usertrap_amd64.go:122] [ 1102: 1103] Allocate a new trap: 0xc0009afd10 11 D0713 00:00:40.144840 762333 usertrap_amd64.go:225] [ 1102: 1103] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:40.145507 762333 usertrap_amd64.go:212] [ 1102: 1103] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:40.145577 762333 usertrap_amd64.go:122] [ 1102: 1103] Allocate a new trap: 0xc0009afd10 12 D0713 00:00:40.145698 762333 usertrap_amd64.go:225] [ 1102: 1103] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:40.146957 762333 task_signals.go:470] [ 1102: 1105] Notified of signal 23 D0713 00:00:40.147272 762333 task_signals.go:179] [ 1102: 1105] Restarting syscall 202: interrupted by signal 23 D0713 00:00:40.147380 762333 task_signals.go:220] [ 1102: 1105] Signal 23: delivering to handler D0713 00:00:40.158294 762333 task_signals.go:470] [ 1102: 1102] Notified of signal 23 D0713 00:00:40.158620 762333 task_signals.go:220] [ 1102: 1102] Signal 23: delivering to handler D0713 00:00:40.166468 762333 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46af29:sysno 293 D0713 00:00:40.166538 762333 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc0009afd10 13 D0713 00:00:40.166677 762333 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:40.170809 762333 task_signals.go:470] [ 1102: 1102] Notified of signal 23 D0713 00:00:40.170979 762333 task_signals.go:220] [ 1102: 1102] Signal 23: delivering to handler D0713 00:00:40.183859 762333 task_signals.go:470] [ 1102: 1102] Notified of signal 23 D0713 00:00:40.185566 762333 task_signals.go:220] [ 1102: 1102] Signal 23: delivering to handler D0713 00:00:40.187166 762333 usertrap_amd64.go:212] [ 1102: 1102] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.187243 762333 usertrap_amd64.go:122] [ 1102: 1102] Allocate a new trap: 0xc0009afd10 14 D0713 00:00:40.187369 762333 usertrap_amd64.go:225] [ 1102: 1102] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:40.187946 762333 task_exit.go:204] [ 1102: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.188170 762333 task_signals.go:204] [ 1102: 1104] Signal 1102, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.188323 762333 task_signals.go:204] [ 1102: 1106] Signal 1102, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.188362 762333 task_signals.go:204] [ 1102: 1103] Signal 1102, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.188493 762333 task_signals.go:204] [ 1102: 1105] Signal 1102, PID: 1105, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.188537 762333 task_exit.go:204] [ 1102: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.188715 762333 task_exit.go:204] [ 1102: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.189099 762333 task_exit.go:204] [ 1102: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.189311 762333 task_exit.go:204] [ 1102: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.189728 762333 task_exit.go:204] [ 1102: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.189807 762333 task_exit.go:204] [ 1102: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.189953 762333 task_exit.go:204] [ 1102: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.190581 762333 task_exit.go:204] [ 1102: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.190657 762333 task_exit.go:204] [ 1102: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.190857 762333 task_exit.go:204] [ 1102: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.190901 762333 task_exit.go:204] [ 1102: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.209988 762333 task_exit.go:204] [ 1102: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.210089 762333 task_exit.go:204] [ 1102: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.210320 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:40.210558 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:40.210613 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:40.210979 762333 task_exit.go:204] [ 1102: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.217263 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.220902 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:40.234566 762333 syscalls.go:262] [ 1107: 1107] Allocating stack with size of 8388608 bytes D0713 00:00:40.237453 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.237995 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:40.241100 762333 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:40.241270 762333 usertrap_amd64.go:106] [ 1107: 1107] Map a usertrap vma at 69000 D0713 00:00:40.242023 762333 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc0025c57d0 1 D0713 00:00:40.242302 762333 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:40.243945 762333 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:40.243998 762333 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc0025c57d0 2 D0713 00:00:40.244125 762333 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:40.246620 762333 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:40.246675 762333 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc0025c57d0 3 D0713 00:00:40.246852 762333 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:40.265534 762333 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:40.265594 762333 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc0025c57d0 4 D0713 00:00:40.265708 762333 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:40.268234 762333 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:40.268289 762333 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc0025c57d0 5 D0713 00:00:40.268431 762333 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:40.268816 762333 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46b214:sysno 13 D0713 00:00:40.268890 762333 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc0025c57d0 6 D0713 00:00:40.269089 762333 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:40.288607 762333 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:40.288672 762333 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc0025c57d0 7 D0713 00:00:40.288861 762333 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:40.290532 762333 usertrap_amd64.go:212] [ 1107: 1108] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:40.290614 762333 usertrap_amd64.go:122] [ 1107: 1108] Allocate a new trap: 0xc0025c57d0 8 D0713 00:00:40.290736 762333 usertrap_amd64.go:225] [ 1107: 1108] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:40.291754 762333 usertrap_amd64.go:212] [ 1107: 1108] Found the pattern at ip 46af76:sysno 35 D0713 00:00:40.291806 762333 usertrap_amd64.go:122] [ 1107: 1108] Allocate a new trap: 0xc0025c57d0 9 D0713 00:00:40.291948 762333 usertrap_amd64.go:225] [ 1107: 1108] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:40.293873 762333 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:40.293957 762333 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc0025c57d0 10 D0713 00:00:40.294129 762333 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:40.306426 762333 usertrap_amd64.go:212] [ 1107: 1108] Found the pattern at ip 46b020:sysno 39 D0713 00:00:40.306505 762333 usertrap_amd64.go:122] [ 1107: 1108] Allocate a new trap: 0xc0025c57d0 11 D0713 00:00:40.306630 762333 usertrap_amd64.go:225] [ 1107: 1108] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:40.306998 762333 usertrap_amd64.go:212] [ 1107: 1108] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:40.307061 762333 usertrap_amd64.go:122] [ 1107: 1108] Allocate a new trap: 0xc0025c57d0 12 D0713 00:00:40.307193 762333 usertrap_amd64.go:225] [ 1107: 1108] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:40.307517 762333 task_signals.go:470] [ 1107: 1107] Notified of signal 23 D0713 00:00:40.307712 762333 task_signals.go:220] [ 1107: 1107] Signal 23: delivering to handler D0713 00:00:40.313966 762333 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46af29:sysno 293 D0713 00:00:40.314030 762333 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc0025c57d0 13 D0713 00:00:40.314151 762333 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:40.320060 762333 task_signals.go:470] [ 1107: 1107] Notified of signal 23 D0713 00:00:40.320728 762333 task_signals.go:220] [ 1107: 1107] Signal 23: delivering to handler D0713 00:00:40.332716 762333 usertrap_amd64.go:212] [ 1107: 1107] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.332821 762333 usertrap_amd64.go:122] [ 1107: 1107] Allocate a new trap: 0xc0025c57d0 14 D0713 00:00:40.333065 762333 usertrap_amd64.go:225] [ 1107: 1107] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:40.333550 762333 task_exit.go:204] [ 1107: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.334025 762333 task_signals.go:204] [ 1107: 1108] Signal 1107, PID: 1108, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.334092 762333 task_signals.go:204] [ 1107: 1109] Signal 1107, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.334019 762333 task_signals.go:204] [ 1107: 1111] Signal 1107, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.334179 762333 task_signals.go:204] [ 1107: 1110] Signal 1107, PID: 1110, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.334327 762333 task_exit.go:204] [ 1107: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.334451 762333 task_exit.go:204] [ 1107: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.334617 762333 task_exit.go:204] [ 1107: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.334839 762333 task_exit.go:204] [ 1107: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.335262 762333 task_exit.go:204] [ 1107: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.335313 762333 task_exit.go:204] [ 1107: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.335577 762333 task_exit.go:204] [ 1107: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.335638 762333 task_exit.go:204] [ 1107: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.335839 762333 task_exit.go:204] [ 1107: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.336253 762333 task_exit.go:204] [ 1107: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.336300 762333 task_exit.go:204] [ 1107: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.358979 762333 task_exit.go:204] [ 1107: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.359044 762333 task_exit.go:204] [ 1107: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.359233 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:40.359430 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:40.359486 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:40.360562 762333 task_exit.go:204] [ 1107: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.367884 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.369918 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:40.384829 762333 syscalls.go:262] [ 1112: 1112] Allocating stack with size of 8388608 bytes D0713 00:00:40.387558 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.388025 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:40.391197 762333 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:40.391386 762333 usertrap_amd64.go:106] [ 1112: 1112] Map a usertrap vma at 65000 D0713 00:00:40.392259 762333 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000b0d4a0 1 D0713 00:00:40.392481 762333 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:40.394090 762333 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:40.394145 762333 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000b0d4a0 2 D0713 00:00:40.394262 762333 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:40.396611 762333 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:40.396693 762333 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000b0d4a0 3 D0713 00:00:40.396904 762333 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:40.416400 762333 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:40.416477 762333 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000b0d4a0 4 D0713 00:00:40.416583 762333 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:40.419828 762333 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:40.419878 762333 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000b0d4a0 5 D0713 00:00:40.420021 762333 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:40.420427 762333 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46b214:sysno 13 D0713 00:00:40.420478 762333 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000b0d4a0 6 D0713 00:00:40.420633 762333 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:40.441735 762333 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:40.441796 762333 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000b0d4a0 7 D0713 00:00:40.441942 762333 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:40.443449 762333 usertrap_amd64.go:212] [ 1112: 1113] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:40.443509 762333 usertrap_amd64.go:122] [ 1112: 1113] Allocate a new trap: 0xc000b0d4a0 8 D0713 00:00:40.443673 762333 usertrap_amd64.go:225] [ 1112: 1113] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:40.445829 762333 usertrap_amd64.go:212] [ 1112: 1113] Found the pattern at ip 46af76:sysno 35 D0713 00:00:40.445898 762333 usertrap_amd64.go:122] [ 1112: 1113] Allocate a new trap: 0xc000b0d4a0 9 D0713 00:00:40.446090 762333 usertrap_amd64.go:225] [ 1112: 1113] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:40.447473 762333 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:40.447579 762333 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000b0d4a0 10 D0713 00:00:40.448772 762333 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:40.455235 762333 usertrap_amd64.go:212] [ 1112: 1113] Found the pattern at ip 46b020:sysno 39 D0713 00:00:40.455352 762333 usertrap_amd64.go:122] [ 1112: 1113] Allocate a new trap: 0xc000b0d4a0 11 D0713 00:00:40.455498 762333 usertrap_amd64.go:225] [ 1112: 1113] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:40.455863 762333 usertrap_amd64.go:212] [ 1112: 1113] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:40.455912 762333 usertrap_amd64.go:122] [ 1112: 1113] Allocate a new trap: 0xc000b0d4a0 12 D0713 00:00:40.456040 762333 usertrap_amd64.go:225] [ 1112: 1113] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:40.456629 762333 task_signals.go:470] [ 1112: 1112] Notified of signal 23 D0713 00:00:40.458452 762333 task_signals.go:220] [ 1112: 1112] Signal 23: delivering to handler D0713 00:00:40.460901 762333 task_signals.go:470] [ 1112: 1112] Notified of signal 23 D0713 00:00:40.463884 762333 task_signals.go:220] [ 1112: 1112] Signal 23: delivering to handler D0713 00:00:40.475183 762333 task_signals.go:470] [ 1112: 1112] Notified of signal 23 D0713 00:00:40.475791 762333 task_signals.go:220] [ 1112: 1112] Signal 23: delivering to handler D0713 00:00:40.476925 762333 task_signals.go:470] [ 1112: 1112] Notified of signal 23 D0713 00:00:40.477095 762333 task_signals.go:220] [ 1112: 1112] Signal 23: delivering to handler D0713 00:00:40.487079 762333 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46af29:sysno 293 D0713 00:00:40.487160 762333 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000b0d4a0 13 D0713 00:00:40.487353 762333 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:40.491976 762333 task_signals.go:470] [ 1112: 1112] Notified of signal 23 D0713 00:00:40.492208 762333 task_signals.go:220] [ 1112: 1112] Signal 23: delivering to handler D0713 00:00:40.504547 762333 task_signals.go:470] [ 1112: 1112] Notified of signal 23 D0713 00:00:40.504684 762333 task_signals.go:220] [ 1112: 1112] Signal 23: delivering to handler D0713 00:00:40.511101 762333 usertrap_amd64.go:212] [ 1112: 1112] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.511188 762333 usertrap_amd64.go:122] [ 1112: 1112] Allocate a new trap: 0xc000b0d4a0 14 D0713 00:00:40.511364 762333 usertrap_amd64.go:225] [ 1112: 1112] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:40.511870 762333 task_exit.go:204] [ 1112: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.512447 762333 task_signals.go:204] [ 1112: 1115] Signal 1112, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.512473 762333 task_signals.go:204] [ 1112: 1113] Signal 1112, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.512687 762333 task_signals.go:204] [ 1112: 1116] Signal 1112, PID: 1116, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.512782 762333 task_exit.go:204] [ 1112: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.513079 762333 task_exit.go:204] [ 1112: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.513336 762333 task_signals.go:204] [ 1112: 1114] Signal 1112, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.513609 762333 task_exit.go:204] [ 1112: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.514295 762333 task_exit.go:204] [ 1112: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.514414 762333 task_exit.go:204] [ 1112: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.514864 762333 task_exit.go:204] [ 1112: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.514941 762333 task_exit.go:204] [ 1112: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.515211 762333 task_exit.go:204] [ 1112: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.515276 762333 task_exit.go:204] [ 1112: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.515619 762333 task_exit.go:204] [ 1112: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.515691 762333 task_exit.go:204] [ 1112: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.538031 762333 task_exit.go:204] [ 1112: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.538146 762333 task_exit.go:204] [ 1112: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.538418 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:40.538728 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:40.538842 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:40.539132 762333 task_exit.go:204] [ 1112: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.547985 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.549012 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:40.572109 762333 syscalls.go:262] [ 1117: 1117] Allocating stack with size of 8388608 bytes D0713 00:00:40.574855 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.575549 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:40.578252 762333 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:40.578506 762333 usertrap_amd64.go:106] [ 1117: 1117] Map a usertrap vma at 63000 D0713 00:00:40.579425 762333 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc000bebd10 1 D0713 00:00:40.579716 762333 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:40.582005 762333 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:40.582092 762333 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc000bebd10 2 D0713 00:00:40.582229 762333 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:40.585302 762333 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:40.585370 762333 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc000bebd10 3 D0713 00:00:40.585479 762333 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:40.604823 762333 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:40.604895 762333 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc000bebd10 4 D0713 00:00:40.605088 762333 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:40.607577 762333 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:40.607628 762333 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc000bebd10 5 D0713 00:00:40.607782 762333 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:40.608145 762333 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46b214:sysno 13 D0713 00:00:40.608216 762333 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc000bebd10 6 D0713 00:00:40.608356 762333 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:40.625690 762333 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:40.625757 762333 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc000bebd10 7 D0713 00:00:40.625879 762333 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:40.627499 762333 usertrap_amd64.go:212] [ 1117: 1118] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:40.627598 762333 usertrap_amd64.go:122] [ 1117: 1118] Allocate a new trap: 0xc000bebd10 8 D0713 00:00:40.627764 762333 usertrap_amd64.go:225] [ 1117: 1118] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:40.629476 762333 usertrap_amd64.go:212] [ 1117: 1118] Found the pattern at ip 46af76:sysno 35 D0713 00:00:40.629638 762333 usertrap_amd64.go:122] [ 1117: 1118] Allocate a new trap: 0xc000bebd10 9 D0713 00:00:40.630676 762333 usertrap_amd64.go:225] [ 1117: 1118] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:40.631318 762333 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:40.631402 762333 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc000bebd10 10 D0713 00:00:40.631600 762333 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:40.645372 762333 usertrap_amd64.go:212] [ 1117: 1118] Found the pattern at ip 46b020:sysno 39 D0713 00:00:40.645432 762333 usertrap_amd64.go:122] [ 1117: 1118] Allocate a new trap: 0xc000bebd10 11 D0713 00:00:40.645582 762333 usertrap_amd64.go:225] [ 1117: 1118] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:40.646093 762333 usertrap_amd64.go:212] [ 1117: 1118] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:40.646178 762333 usertrap_amd64.go:122] [ 1117: 1118] Allocate a new trap: 0xc000bebd10 12 D0713 00:00:40.646337 762333 usertrap_amd64.go:225] [ 1117: 1118] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:40.647354 762333 task_signals.go:470] [ 1117: 1117] Notified of signal 23 D0713 00:00:40.650331 762333 task_signals.go:220] [ 1117: 1117] Signal 23: delivering to handler D0713 00:00:40.652594 762333 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46af29:sysno 293 D0713 00:00:40.652659 762333 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc000bebd10 13 D0713 00:00:40.652863 762333 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:40.658160 762333 task_signals.go:470] [ 1117: 1117] Notified of signal 23 D0713 00:00:40.659832 762333 task_signals.go:220] [ 1117: 1117] Signal 23: delivering to handler D0713 00:00:40.672716 762333 task_signals.go:470] [ 1117: 1117] Notified of signal 23 D0713 00:00:40.673255 762333 task_signals.go:220] [ 1117: 1117] Signal 23: delivering to handler D0713 00:00:40.675603 762333 usertrap_amd64.go:212] [ 1117: 1117] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.675665 762333 usertrap_amd64.go:122] [ 1117: 1117] Allocate a new trap: 0xc000bebd10 14 D0713 00:00:40.675851 762333 usertrap_amd64.go:225] [ 1117: 1117] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:40.676274 762333 task_exit.go:204] [ 1117: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.676540 762333 task_signals.go:204] [ 1117: 1122] Signal 1117, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.676649 762333 task_signals.go:204] [ 1117: 1120] Signal 1117, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.676791 762333 task_signals.go:204] [ 1117: 1118] Signal 1117, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.676917 762333 task_exit.go:204] [ 1117: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.677108 762333 task_signals.go:204] [ 1117: 1119] Signal 1117, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.677168 762333 task_exit.go:204] [ 1117: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.677311 762333 task_signals.go:204] [ 1117: 1121] Signal 1117, PID: 1121, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.677364 762333 task_exit.go:204] [ 1117: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.677569 762333 task_exit.go:204] [ 1117: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.678011 762333 task_exit.go:204] [ 1117: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.678074 762333 task_exit.go:204] [ 1117: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.678316 762333 task_exit.go:204] [ 1117: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.678554 762333 task_exit.go:204] [ 1117: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.678888 762333 task_exit.go:204] [ 1117: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.678958 762333 task_exit.go:204] [ 1117: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.679460 762333 task_exit.go:204] [ 1117: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.679526 762333 task_exit.go:204] [ 1117: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.679755 762333 task_exit.go:204] [ 1117: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.679812 762333 task_exit.go:204] [ 1117: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.699590 762333 task_exit.go:204] [ 1117: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.699669 762333 task_exit.go:204] [ 1117: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.699924 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:40.700251 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:40.700352 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:40.700481 762333 task_exit.go:204] [ 1117: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.707559 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.711043 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:40.725899 762333 syscalls.go:262] [ 1123: 1123] Allocating stack with size of 8388608 bytes D0713 00:00:40.728631 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.729534 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:40.733704 762333 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:40.733845 762333 usertrap_amd64.go:106] [ 1123: 1123] Map a usertrap vma at 67000 D0713 00:00:40.734662 762333 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000931740 1 D0713 00:00:40.734907 762333 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:40.736655 762333 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:40.736725 762333 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000931740 2 D0713 00:00:40.736877 762333 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:40.739586 762333 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:40.739653 762333 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000931740 3 D0713 00:00:40.739835 762333 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:40.759974 762333 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:40.760040 762333 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000931740 4 D0713 00:00:40.760167 762333 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:40.762561 762333 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:40.762616 762333 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000931740 5 D0713 00:00:40.762729 762333 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:40.763113 762333 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b214:sysno 13 D0713 00:00:40.763159 762333 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000931740 6 D0713 00:00:40.763286 762333 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:40.780042 762333 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:40.780100 762333 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000931740 7 D0713 00:00:40.780240 762333 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:40.781720 762333 usertrap_amd64.go:212] [ 1123: 1124] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:40.781785 762333 usertrap_amd64.go:122] [ 1123: 1124] Allocate a new trap: 0xc000931740 8 D0713 00:00:40.781990 762333 usertrap_amd64.go:225] [ 1123: 1124] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:40.783452 762333 usertrap_amd64.go:212] [ 1123: 1124] Found the pattern at ip 46af76:sysno 35 D0713 00:00:40.783515 762333 usertrap_amd64.go:122] [ 1123: 1124] Allocate a new trap: 0xc000931740 9 D0713 00:00:40.783619 762333 usertrap_amd64.go:225] [ 1123: 1124] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:40.784452 762333 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:40.784536 762333 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000931740 10 D0713 00:00:40.784693 762333 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:40.797229 762333 usertrap_amd64.go:212] [ 1123: 1124] Found the pattern at ip 46b020:sysno 39 D0713 00:00:40.797305 762333 usertrap_amd64.go:122] [ 1123: 1124] Allocate a new trap: 0xc000931740 11 D0713 00:00:40.797500 762333 usertrap_amd64.go:225] [ 1123: 1124] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:40.798008 762333 usertrap_amd64.go:212] [ 1123: 1124] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:40.798076 762333 usertrap_amd64.go:122] [ 1123: 1124] Allocate a new trap: 0xc000931740 12 D0713 00:00:40.798182 762333 usertrap_amd64.go:225] [ 1123: 1124] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:40.798533 762333 task_signals.go:470] [ 1123: 1123] Notified of signal 23 D0713 00:00:40.799232 762333 task_signals.go:220] [ 1123: 1123] Signal 23: delivering to handler D0713 00:00:40.804306 762333 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46af29:sysno 293 D0713 00:00:40.804385 762333 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000931740 13 D0713 00:00:40.804573 762333 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:40.811099 762333 task_signals.go:470] [ 1123: 1123] Notified of signal 23 D0713 00:00:40.813951 762333 task_signals.go:220] [ 1123: 1123] Signal 23: delivering to handler D0713 00:00:40.828076 762333 task_signals.go:470] [ 1123: 1123] Notified of signal 23 D0713 00:00:40.828933 762333 task_signals.go:220] [ 1123: 1123] Signal 23: delivering to handler I0713 00:00:40.831929 762333 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0713 00:00:40.832150 762333 usertrap_amd64.go:212] [ 1123: 1123] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.832208 762333 usertrap_amd64.go:122] [ 1123: 1123] Allocate a new trap: 0xc000931740 14 D0713 00:00:40.832314 762333 usertrap_amd64.go:225] [ 1123: 1123] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:40.832742 762333 task_exit.go:204] [ 1123: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.833082 762333 task_signals.go:204] [ 1123: 1126] Signal 1123, PID: 1126, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.833246 762333 task_signals.go:204] [ 1123: 1125] Signal 1123, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.833432 762333 task_signals.go:204] [ 1123: 1124] Signal 1123, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.833545 762333 task_exit.go:204] [ 1123: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.833568 762333 task_signals.go:204] [ 1123: 1127] Signal 1123, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.833688 762333 task_exit.go:204] [ 1123: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.833935 762333 task_exit.go:204] [ 1123: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.834194 762333 task_exit.go:204] [ 1123: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.834596 762333 task_exit.go:204] [ 1123: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.834661 762333 task_exit.go:204] [ 1123: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.834920 762333 task_exit.go:204] [ 1123: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.834983 762333 task_exit.go:204] [ 1123: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.835166 762333 task_exit.go:204] [ 1123: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.835612 762333 task_exit.go:204] [ 1123: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.835661 762333 task_exit.go:204] [ 1123: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.858133 762333 task_exit.go:204] [ 1123: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.858216 762333 task_exit.go:204] [ 1123: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.858409 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:40.858757 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:40.858832 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:40.859171 762333 task_exit.go:204] [ 1123: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.866504 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.869603 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:40.885555 762333 syscalls.go:262] [ 1128: 1128] Allocating stack with size of 8388608 bytes D0713 00:00:40.888334 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.888896 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:40.894651 762333 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:40.894783 762333 usertrap_amd64.go:106] [ 1128: 1128] Map a usertrap vma at 64000 D0713 00:00:40.895624 762333 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0025c5da0 1 D0713 00:00:40.895874 762333 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:40.897847 762333 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:40.897933 762333 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0025c5da0 2 D0713 00:00:40.898050 762333 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:40.900586 762333 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:40.900659 762333 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0025c5da0 3 D0713 00:00:40.900762 762333 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:40.922388 762333 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:40.922486 762333 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0025c5da0 4 D0713 00:00:40.922623 762333 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:40.925376 762333 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:40.925444 762333 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0025c5da0 5 D0713 00:00:40.925567 762333 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:40.925921 762333 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b214:sysno 13 D0713 00:00:40.925972 762333 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0025c5da0 6 D0713 00:00:40.926115 762333 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:40.944363 762333 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:40.944437 762333 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0025c5da0 7 D0713 00:00:40.944539 762333 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:40.946420 762333 usertrap_amd64.go:212] [ 1128: 1129] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:40.946525 762333 usertrap_amd64.go:122] [ 1128: 1129] Allocate a new trap: 0xc0025c5da0 8 D0713 00:00:40.946797 762333 usertrap_amd64.go:225] [ 1128: 1129] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:40.948682 762333 usertrap_amd64.go:212] [ 1128: 1129] Found the pattern at ip 46af76:sysno 35 D0713 00:00:40.948742 762333 usertrap_amd64.go:122] [ 1128: 1129] Allocate a new trap: 0xc0025c5da0 9 D0713 00:00:40.948926 762333 usertrap_amd64.go:225] [ 1128: 1129] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:40.949862 762333 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:40.949920 762333 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0025c5da0 10 D0713 00:00:40.950861 762333 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:40.962482 762333 usertrap_amd64.go:212] [ 1128: 1129] Found the pattern at ip 46b020:sysno 39 D0713 00:00:40.962576 762333 usertrap_amd64.go:122] [ 1128: 1129] Allocate a new trap: 0xc0025c5da0 11 D0713 00:00:40.963931 762333 usertrap_amd64.go:225] [ 1128: 1129] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:40.964655 762333 usertrap_amd64.go:212] [ 1128: 1129] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:40.964741 762333 usertrap_amd64.go:122] [ 1128: 1129] Allocate a new trap: 0xc0025c5da0 12 D0713 00:00:40.964973 762333 usertrap_amd64.go:225] [ 1128: 1129] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:40.965537 762333 task_signals.go:470] [ 1128: 1128] Notified of signal 23 D0713 00:00:40.965830 762333 task_signals.go:220] [ 1128: 1128] Signal 23: delivering to handler D0713 00:00:40.973327 762333 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46af29:sysno 293 D0713 00:00:40.973409 762333 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0025c5da0 13 D0713 00:00:40.973591 762333 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:40.978643 762333 task_signals.go:470] [ 1128: 1128] Notified of signal 23 D0713 00:00:40.979003 762333 task_signals.go:179] [ 1128: 1128] Restarting syscall 202: interrupted by signal 23 D0713 00:00:40.979075 762333 task_signals.go:220] [ 1128: 1128] Signal 23: delivering to handler D0713 00:00:40.993884 762333 task_signals.go:470] [ 1128: 1128] Notified of signal 23 D0713 00:00:40.995112 762333 task_signals.go:220] [ 1128: 1128] Signal 23: delivering to handler I0713 00:00:40.996780 762333 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0713 00:00:40.997032 762333 usertrap_amd64.go:212] [ 1128: 1128] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.997087 762333 usertrap_amd64.go:122] [ 1128: 1128] Allocate a new trap: 0xc0025c5da0 14 D0713 00:00:40.997255 762333 usertrap_amd64.go:225] [ 1128: 1128] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:40.997646 762333 task_exit.go:204] [ 1128: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.997972 762333 task_signals.go:204] [ 1128: 1129] Signal 1128, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.998007 762333 task_signals.go:204] [ 1128: 1130] Signal 1128, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.998364 762333 task_exit.go:204] [ 1128: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.998635 762333 task_signals.go:204] [ 1128: 1132] Signal 1128, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.998927 762333 task_signals.go:204] [ 1128: 1131] Signal 1128, PID: 1131, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.999084 762333 task_exit.go:204] [ 1128: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.999231 762333 task_exit.go:204] [ 1128: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.999466 762333 task_exit.go:204] [ 1128: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.999665 762333 task_exit.go:204] [ 1128: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.000205 762333 task_exit.go:204] [ 1128: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.000269 762333 task_exit.go:204] [ 1128: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.000465 762333 task_exit.go:204] [ 1128: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.000521 762333 task_exit.go:204] [ 1128: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.000714 762333 task_exit.go:204] [ 1128: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.000796 762333 task_exit.go:204] [ 1128: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.025541 762333 task_exit.go:204] [ 1128: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.025701 762333 task_exit.go:204] [ 1128: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.025999 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:41.026532 762333 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:41.026616 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:41.026652 762333 task_exit.go:204] [ 1128: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.035321 762333 task_stop.go:118] [ 6: 9] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.037366 762333 task_signals.go:481] [ 6: 9] No task notified of signal 23 D0713 00:00:41.064430 762333 syscalls.go:262] [ 1133: 1133] Allocating stack with size of 8388608 bytes D0713 00:00:41.068565 762333 task_stop.go:138] [ 6: 9] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.069898 762333 task_signals.go:220] [ 6: 9] Signal 23: delivering to handler D0713 00:00:41.073759 762333 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:41.073944 762333 usertrap_amd64.go:106] [ 1133: 1133] Map a usertrap vma at 68000 D0713 00:00:41.074954 762333 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0000490e0 1 D0713 00:00:41.075273 762333 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:41.077633 762333 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:41.077703 762333 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0000490e0 2 D0713 00:00:41.077862 762333 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:41.080474 762333 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:41.080528 762333 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0000490e0 3 D0713 00:00:41.080680 762333 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:41.105908 762333 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:41.105989 762333 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0000490e0 4 D0713 00:00:41.106169 762333 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:41.109822 762333 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:41.109905 762333 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0000490e0 5 D0713 00:00:41.110068 762333 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:41.110517 762333 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b214:sysno 13 D0713 00:00:41.110570 762333 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0000490e0 6 D0713 00:00:41.110731 762333 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:41.145183 762333 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:41.145306 762333 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0000490e0 7 D0713 00:00:41.145487 762333 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:41.147580 762333 usertrap_amd64.go:212] [ 1133: 1134] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:41.147691 762333 usertrap_amd64.go:122] [ 1133: 1134] Allocate a new trap: 0xc0000490e0 8 D0713 00:00:41.147993 762333 usertrap_amd64.go:225] [ 1133: 1134] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:41.148472 762333 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0713 00:00:41.151474 762333 usertrap_amd64.go:212] [ 1133: 1134] Found the pattern at ip 46af76:sysno 35 D0713 00:00:41.151570 762333 usertrap_amd64.go:122] [ 1133: 1134] Allocate a new trap: 0xc0000490e0 9 D0713 00:00:41.152530 762333 usertrap_amd64.go:225] [ 1133: 1134] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:41.153062 762333 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:41.153156 762333 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0000490e0 10 D0713 00:00:41.153373 762333 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:41.158768 762333 usertrap_amd64.go:212] [ 1133: 1134] Found the pattern at ip 46b020:sysno 39 D0713 00:00:41.158931 762333 usertrap_amd64.go:122] [ 1133: 1134] Allocate a new trap: 0xc0000490e0 11 D0713 00:00:41.159201 762333 usertrap_amd64.go:225] [ 1133: 1134] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:41.159665 762333 usertrap_amd64.go:212] [ 1133: 1134] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:41.159741 762333 usertrap_amd64.go:122] [ 1133: 1134] Allocate a new trap: 0xc0000490e0 12 D0713 00:00:41.159917 762333 usertrap_amd64.go:225] [ 1133: 1134] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:41.160390 762333 task_signals.go:470] [ 1133: 1133] Notified of signal 23 D0713 00:00:41.161387 762333 task_signals.go:220] [ 1133: 1133] Signal 23: delivering to handler D0713 00:00:41.162758 762333 task_signals.go:470] [ 1133: 1133] Notified of signal 23 D0713 00:00:41.163024 762333 task_signals.go:179] [ 1133: 1133] Restarting syscall 202: interrupted by signal 23 D0713 00:00:41.163123 762333 task_signals.go:220] [ 1133: 1133] Signal 23: delivering to handler D0713 00:00:41.175116 762333 task_signals.go:470] [ 1133: 1133] Notified of signal 23 D0713 00:00:41.175343 762333 task_signals.go:220] [ 1133: 1133] Signal 23: delivering to handler D0713 00:00:41.177075 762333 task_signals.go:470] [ 1133: 1133] Notified of signal 23 D0713 00:00:41.177580 762333 task_signals.go:220] [ 1133: 1133] Signal 23: delivering to handler D0713 00:00:41.179070 762333 task_signals.go:470] [ 1133: 1133] Notified of signal 23 D0713 00:00:41.179611 762333 task_signals.go:220] [ 1133: 1133] Signal 23: delivering to handler executing program D0713 00:00:41.187731 762333 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46af29:sysno 293 D0713 00:00:41.187812 762333 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0000490e0 13 D0713 00:00:41.187964 762333 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:41.196165 762333 task_signals.go:470] [ 1133: 1133] Notified of signal 23 D0713 00:00:41.197632 762333 task_signals.go:220] [ 1133: 1133] Signal 23: delivering to handler D0713 00:00:41.215412 762333 usertrap_amd64.go:212] [ 1133: 1133] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:41.215502 762333 usertrap_amd64.go:122] [ 1133: 1133] Allocate a new trap: 0xc0000490e0 14 D0713 00:00:41.215731 762333 usertrap_amd64.go:225] [ 1133: 1133] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:41.216257 762333 task_exit.go:204] [ 1133: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.216649 762333 task_signals.go:204] [ 1133: 1134] Signal 1133, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.216649 762333 task_signals.go:204] [ 1133: 1135] Signal 1133, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.217113 762333 task_exit.go:204] [ 1133: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.217452 762333 task_signals.go:204] [ 1133: 1138] Signal 1133, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.216994 762333 task_signals.go:204] [ 1133: 1137] Signal 1133, PID: 1137, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.217855 762333 task_exit.go:204] [ 1133: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.218067 762333 task_signals.go:204] [ 1133: 1136] Signal 1133, PID: 1136, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.218354 762333 task_exit.go:204] [ 1133: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.218561 762333 task_exit.go:204] [ 1133: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.218725 762333 task_exit.go:204] [ 1133: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.219174 762333 task_exit.go:204] [ 1133: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.219617 762333 task_exit.go:204] [ 1133: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.219711 762333 task_exit.go:204] [ 1133: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.220404 762333 task_exit.go:204] [ 1133: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.220506 762333 task_exit.go:204] [ 1133: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.221021 762333 task_exit.go:204] [ 1133: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.221116 762333 task_exit.go:204] [ 1133: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.221353 762333 task_exit.go:204] [ 1133: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.221445 762333 task_exit.go:204] [ 1133: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.244186 762333 task_exit.go:204] [ 1133: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.244268 762333 task_exit.go:204] [ 1133: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.244500 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:41.244864 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:41.245329 762333 task_exit.go:204] [ 1133: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.255605 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.256448 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:41.284067 762333 syscalls.go:262] [ 1139: 1139] Allocating stack with size of 8388608 bytes D0713 00:00:41.288189 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.289396 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:41.296832 762333 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:41.297061 762333 usertrap_amd64.go:106] [ 1139: 1139] Map a usertrap vma at 63000 D0713 00:00:41.298072 762333 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0004f5aa0 1 D0713 00:00:41.298412 762333 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:41.300651 762333 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:41.300801 762333 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0004f5aa0 2 D0713 00:00:41.301043 762333 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:41.304735 762333 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:41.304827 762333 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0004f5aa0 3 D0713 00:00:41.305143 762333 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:41.335482 762333 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:41.335557 762333 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0004f5aa0 4 D0713 00:00:41.335676 762333 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:41.338470 762333 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:41.338536 762333 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0004f5aa0 5 D0713 00:00:41.338643 762333 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:41.338977 762333 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46b214:sysno 13 D0713 00:00:41.339025 762333 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0004f5aa0 6 D0713 00:00:41.339169 762333 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:41.362042 762333 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:41.362147 762333 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0004f5aa0 7 D0713 00:00:41.362355 762333 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:41.364491 762333 usertrap_amd64.go:212] [ 1139: 1140] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:41.364665 762333 usertrap_amd64.go:122] [ 1139: 1140] Allocate a new trap: 0xc0004f5aa0 8 D0713 00:00:41.365073 762333 usertrap_amd64.go:225] [ 1139: 1140] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:41.367889 762333 usertrap_amd64.go:212] [ 1139: 1140] Found the pattern at ip 46af76:sysno 35 D0713 00:00:41.367957 762333 usertrap_amd64.go:122] [ 1139: 1140] Allocate a new trap: 0xc0004f5aa0 9 D0713 00:00:41.369184 762333 usertrap_amd64.go:225] [ 1139: 1140] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:41.369758 762333 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:41.369880 762333 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0004f5aa0 10 D0713 00:00:41.370162 762333 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:41.385107 762333 usertrap_amd64.go:212] [ 1139: 1140] Found the pattern at ip 46b020:sysno 39 D0713 00:00:41.385250 762333 usertrap_amd64.go:122] [ 1139: 1140] Allocate a new trap: 0xc0004f5aa0 11 D0713 00:00:41.385578 762333 usertrap_amd64.go:225] [ 1139: 1140] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:41.386210 762333 usertrap_amd64.go:212] [ 1139: 1140] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:41.386361 762333 usertrap_amd64.go:122] [ 1139: 1140] Allocate a new trap: 0xc0004f5aa0 12 D0713 00:00:41.386679 762333 usertrap_amd64.go:225] [ 1139: 1140] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:41.388913 762333 task_signals.go:470] [ 1139: 1139] Notified of signal 23 D0713 00:00:41.389644 762333 task_signals.go:220] [ 1139: 1139] Signal 23: delivering to handler D0713 00:00:41.398677 762333 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46af29:sysno 293 D0713 00:00:41.398816 762333 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0004f5aa0 13 D0713 00:00:41.399008 762333 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:41.400670 762333 task_signals.go:470] [ 1139: 1139] Notified of signal 23 D0713 00:00:41.401106 762333 task_signals.go:179] [ 1139: 1139] Restarting syscall 202: interrupted by signal 23 D0713 00:00:41.401191 762333 task_signals.go:220] [ 1139: 1139] Signal 23: delivering to handler D0713 00:00:41.419527 762333 task_signals.go:470] [ 1139: 1139] Notified of signal 23 D0713 00:00:41.419937 762333 task_signals.go:220] [ 1139: 1139] Signal 23: delivering to handler D0713 00:00:41.427688 762333 usertrap_amd64.go:212] [ 1139: 1139] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:41.427843 762333 usertrap_amd64.go:122] [ 1139: 1139] Allocate a new trap: 0xc0004f5aa0 14 D0713 00:00:41.428142 762333 usertrap_amd64.go:225] [ 1139: 1139] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:41.428578 762333 task_exit.go:204] [ 1139: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.429083 762333 task_signals.go:204] [ 1139: 1143] Signal 1139, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.429483 762333 task_exit.go:204] [ 1139: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.429539 762333 task_signals.go:204] [ 1139: 1140] Signal 1139, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.429438 762333 task_signals.go:204] [ 1139: 1142] Signal 1139, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.429735 762333 task_signals.go:204] [ 1139: 1144] Signal 1139, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.429760 762333 task_signals.go:204] [ 1139: 1141] Signal 1139, PID: 1141, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.429991 762333 task_exit.go:204] [ 1139: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.430280 762333 task_exit.go:204] [ 1139: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.430883 762333 task_exit.go:204] [ 1139: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.431121 762333 task_exit.go:204] [ 1139: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.431425 762333 task_exit.go:204] [ 1139: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.432361 762333 task_exit.go:204] [ 1139: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.432444 762333 task_exit.go:204] [ 1139: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.432876 762333 task_exit.go:204] [ 1139: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.433013 762333 task_exit.go:204] [ 1139: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.433259 762333 task_exit.go:204] [ 1139: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.433315 762333 task_exit.go:204] [ 1139: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.433529 762333 task_exit.go:204] [ 1139: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.433575 762333 task_exit.go:204] [ 1139: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.456635 762333 task_exit.go:204] [ 1139: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.456721 762333 task_exit.go:204] [ 1139: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.456901 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:41.457261 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:41.457352 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:41.459107 762333 task_exit.go:204] [ 1139: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.466306 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.467806 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:41.487736 762333 syscalls.go:262] [ 1145: 1145] Allocating stack with size of 8388608 bytes D0713 00:00:41.495779 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.496623 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:41.501444 762333 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:41.501785 762333 usertrap_amd64.go:106] [ 1145: 1145] Map a usertrap vma at 62000 D0713 00:00:41.503098 762333 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc000c852f0 1 D0713 00:00:41.503461 762333 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:41.505570 762333 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:41.505636 762333 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc000c852f0 2 D0713 00:00:41.505773 762333 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:41.508529 762333 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:41.508610 762333 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc000c852f0 3 D0713 00:00:41.508771 762333 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:41.534252 762333 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:41.534349 762333 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc000c852f0 4 D0713 00:00:41.534512 762333 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:41.537953 762333 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:41.538050 762333 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc000c852f0 5 D0713 00:00:41.538205 762333 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:41.538528 762333 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46b214:sysno 13 D0713 00:00:41.538572 762333 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc000c852f0 6 D0713 00:00:41.538678 762333 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:41.558424 762333 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:41.558499 762333 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc000c852f0 7 D0713 00:00:41.558647 762333 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:41.560345 762333 usertrap_amd64.go:212] [ 1145: 1146] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:41.560439 762333 usertrap_amd64.go:122] [ 1145: 1146] Allocate a new trap: 0xc000c852f0 8 D0713 00:00:41.560698 762333 usertrap_amd64.go:225] [ 1145: 1146] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:41.562444 762333 usertrap_amd64.go:212] [ 1145: 1146] Found the pattern at ip 46af76:sysno 35 D0713 00:00:41.562521 762333 usertrap_amd64.go:122] [ 1145: 1146] Allocate a new trap: 0xc000c852f0 9 D0713 00:00:41.562714 762333 usertrap_amd64.go:225] [ 1145: 1146] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:41.563382 762333 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:41.563459 762333 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc000c852f0 10 D0713 00:00:41.564185 762333 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:41.577980 762333 usertrap_amd64.go:212] [ 1145: 1146] Found the pattern at ip 46b020:sysno 39 D0713 00:00:41.578068 762333 usertrap_amd64.go:122] [ 1145: 1146] Allocate a new trap: 0xc000c852f0 11 D0713 00:00:41.578738 762333 usertrap_amd64.go:225] [ 1145: 1146] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:41.579723 762333 usertrap_amd64.go:212] [ 1145: 1146] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:41.579902 762333 usertrap_amd64.go:122] [ 1145: 1146] Allocate a new trap: 0xc000c852f0 12 D0713 00:00:41.581000 762333 usertrap_amd64.go:225] [ 1145: 1146] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:41.582885 762333 task_signals.go:470] [ 1145: 1145] Notified of signal 23 D0713 00:00:41.583768 762333 task_signals.go:220] [ 1145: 1145] Signal 23: delivering to handler D0713 00:00:41.592868 762333 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46af29:sysno 293 D0713 00:00:41.592926 762333 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc000c852f0 13 D0713 00:00:41.593109 762333 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:41.594442 762333 task_signals.go:470] [ 1145: 1145] Notified of signal 23 D0713 00:00:41.594807 762333 task_signals.go:179] [ 1145: 1145] Restarting syscall 202: interrupted by signal 23 D0713 00:00:41.594881 762333 task_signals.go:220] [ 1145: 1145] Signal 23: delivering to handler D0713 00:00:41.607505 762333 task_signals.go:470] [ 1145: 1145] Notified of signal 23 D0713 00:00:41.610065 762333 task_signals.go:220] [ 1145: 1145] Signal 23: delivering to handler D0713 00:00:41.617238 762333 usertrap_amd64.go:212] [ 1145: 1145] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:41.617300 762333 usertrap_amd64.go:122] [ 1145: 1145] Allocate a new trap: 0xc000c852f0 14 D0713 00:00:41.617449 762333 usertrap_amd64.go:225] [ 1145: 1145] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:41.617944 762333 task_exit.go:204] [ 1145: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.618327 762333 task_signals.go:204] [ 1145: 1146] Signal 1145, PID: 1146, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.618519 762333 task_signals.go:204] [ 1145: 1148] Signal 1145, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.618549 762333 task_signals.go:204] [ 1145: 1149] Signal 1145, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.618592 762333 task_signals.go:204] [ 1145: 1150] Signal 1145, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.618648 762333 task_exit.go:204] [ 1145: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.618954 762333 task_exit.go:204] [ 1145: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.619328 762333 task_exit.go:204] [ 1145: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.619485 762333 task_signals.go:204] [ 1145: 1147] Signal 1145, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.619789 762333 task_exit.go:204] [ 1145: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.619967 762333 task_exit.go:204] [ 1145: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.620087 762333 task_exit.go:204] [ 1145: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.620163 762333 task_exit.go:204] [ 1145: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.620341 762333 task_exit.go:204] [ 1145: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.621082 762333 task_exit.go:204] [ 1145: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.621140 762333 task_exit.go:204] [ 1145: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.621455 762333 task_exit.go:204] [ 1145: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.621531 762333 task_exit.go:204] [ 1145: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.621720 762333 task_exit.go:204] [ 1145: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.621771 762333 task_exit.go:204] [ 1145: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.641627 762333 task_exit.go:204] [ 1145: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.641697 762333 task_exit.go:204] [ 1145: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.641876 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:41.642098 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:41.642178 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:41.643642 762333 task_exit.go:204] [ 1145: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.650079 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.652061 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:41.670258 762333 syscalls.go:262] [ 1151: 1151] Allocating stack with size of 8388608 bytes D0713 00:00:41.673205 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.673729 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:41.677275 762333 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:41.677428 762333 usertrap_amd64.go:106] [ 1151: 1151] Map a usertrap vma at 62000 D0713 00:00:41.678106 762333 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc0000496e0 1 D0713 00:00:41.678474 762333 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:41.680264 762333 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:41.680316 762333 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc0000496e0 2 D0713 00:00:41.680423 762333 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:41.682869 762333 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:41.682930 762333 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc0000496e0 3 D0713 00:00:41.683040 762333 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:41.705811 762333 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:41.705921 762333 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc0000496e0 4 D0713 00:00:41.706069 762333 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:41.708567 762333 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:41.708629 762333 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc0000496e0 5 D0713 00:00:41.708832 762333 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:41.709316 762333 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b214:sysno 13 D0713 00:00:41.709383 762333 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc0000496e0 6 D0713 00:00:41.709523 762333 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:41.734346 762333 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:41.734436 762333 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc0000496e0 7 D0713 00:00:41.734589 762333 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:41.736421 762333 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:41.736557 762333 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc0000496e0 8 D0713 00:00:41.736762 762333 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:41.739513 762333 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46af76:sysno 35 D0713 00:00:41.739593 762333 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc0000496e0 9 D0713 00:00:41.740571 762333 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:41.741061 762333 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:41.741166 762333 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc0000496e0 10 D0713 00:00:41.741366 762333 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:41.754836 762333 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46b020:sysno 39 D0713 00:00:41.754908 762333 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc0000496e0 11 D0713 00:00:41.756394 762333 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:41.756800 762333 usertrap_amd64.go:212] [ 1151: 1152] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:41.756848 762333 usertrap_amd64.go:122] [ 1151: 1152] Allocate a new trap: 0xc0000496e0 12 D0713 00:00:41.757067 762333 usertrap_amd64.go:225] [ 1151: 1152] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:41.758207 762333 task_signals.go:470] [ 1151: 1151] Notified of signal 23 D0713 00:00:41.758424 762333 task_signals.go:220] [ 1151: 1151] Signal 23: delivering to handler D0713 00:00:41.765659 762333 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46af29:sysno 293 D0713 00:00:41.765734 762333 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc0000496e0 13 D0713 00:00:41.765887 762333 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:41.771867 762333 task_signals.go:470] [ 1151: 1151] Notified of signal 23 D0713 00:00:41.774317 762333 task_signals.go:220] [ 1151: 1151] Signal 23: delivering to handler D0713 00:00:41.793106 762333 usertrap_amd64.go:212] [ 1151: 1151] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:41.793198 762333 usertrap_amd64.go:122] [ 1151: 1151] Allocate a new trap: 0xc0000496e0 14 D0713 00:00:41.793331 762333 usertrap_amd64.go:225] [ 1151: 1151] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:41.793878 762333 task_exit.go:204] [ 1151: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.794242 762333 task_signals.go:204] [ 1151: 1156] Signal 1151, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.794380 762333 task_signals.go:204] [ 1151: 1155] Signal 1151, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.794784 762333 task_exit.go:204] [ 1151: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.794817 762333 task_signals.go:204] [ 1151: 1153] Signal 1151, PID: 1153, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.795141 762333 task_exit.go:204] [ 1151: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.795412 762333 task_signals.go:204] [ 1151: 1152] Signal 1151, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.795603 762333 task_exit.go:204] [ 1151: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.795926 762333 task_exit.go:204] [ 1151: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.795983 762333 task_signals.go:204] [ 1151: 1154] Signal 1151, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.796660 762333 task_exit.go:204] [ 1151: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.796936 762333 task_exit.go:204] [ 1151: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.797953 762333 task_exit.go:204] [ 1151: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.798066 762333 task_exit.go:204] [ 1151: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.798470 762333 task_exit.go:204] [ 1151: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.798569 762333 task_exit.go:204] [ 1151: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.798917 762333 task_exit.go:204] [ 1151: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.799010 762333 task_exit.go:204] [ 1151: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.799454 762333 task_exit.go:204] [ 1151: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.799546 762333 task_exit.go:204] [ 1151: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.827143 762333 task_exit.go:204] [ 1151: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.827247 762333 task_exit.go:204] [ 1151: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.827572 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:41.827972 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:41.828044 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:41.830030 762333 task_exit.go:204] [ 1151: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.837831 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.838026 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:41.859345 762333 syscalls.go:262] [ 1157: 1157] Allocating stack with size of 8388608 bytes D0713 00:00:41.862639 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.863263 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:41.867853 762333 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:41.868024 762333 usertrap_amd64.go:106] [ 1157: 1157] Map a usertrap vma at 64000 D0713 00:00:41.869109 762333 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000c856b0 1 D0713 00:00:41.869458 762333 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:41.871362 762333 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:41.871419 762333 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000c856b0 2 D0713 00:00:41.871568 762333 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:41.874296 762333 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:41.874362 762333 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000c856b0 3 D0713 00:00:41.874469 762333 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:41.900664 762333 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:41.900793 762333 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000c856b0 4 D0713 00:00:41.900993 762333 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:41.904194 762333 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:41.904256 762333 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000c856b0 5 D0713 00:00:41.904394 762333 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:41.904813 762333 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b214:sysno 13 D0713 00:00:41.904875 762333 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000c856b0 6 D0713 00:00:41.905084 762333 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:41.926414 762333 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:41.926511 762333 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000c856b0 7 D0713 00:00:41.926650 762333 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:41.928269 762333 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:41.928340 762333 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc000c856b0 8 D0713 00:00:41.928514 762333 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:41.931441 762333 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46af76:sysno 35 D0713 00:00:41.931503 762333 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc000c856b0 9 D0713 00:00:41.931718 762333 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:41.933036 762333 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:41.933091 762333 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000c856b0 10 D0713 00:00:41.933304 762333 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:41.947172 762333 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46b020:sysno 39 D0713 00:00:41.947249 762333 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc000c856b0 11 D0713 00:00:41.947425 762333 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:41.947867 762333 usertrap_amd64.go:212] [ 1157: 1158] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:41.947926 762333 usertrap_amd64.go:122] [ 1157: 1158] Allocate a new trap: 0xc000c856b0 12 D0713 00:00:41.948782 762333 usertrap_amd64.go:225] [ 1157: 1158] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:41.949360 762333 task_signals.go:470] [ 1157: 1157] Notified of signal 23 D0713 00:00:41.949982 762333 task_signals.go:220] [ 1157: 1157] Signal 23: delivering to handler D0713 00:00:41.962266 762333 task_signals.go:470] [ 1157: 1157] Notified of signal 23 D0713 00:00:41.962516 762333 task_signals.go:220] [ 1157: 1157] Signal 23: delivering to handler D0713 00:00:41.964820 762333 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46af29:sysno 293 D0713 00:00:41.964913 762333 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000c856b0 13 D0713 00:00:41.965238 762333 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:41.975450 762333 task_signals.go:470] [ 1157: 1157] Notified of signal 23 D0713 00:00:41.976209 762333 task_signals.go:220] [ 1157: 1157] Signal 23: delivering to handler D0713 00:00:41.994301 762333 usertrap_amd64.go:212] [ 1157: 1157] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:41.994395 762333 usertrap_amd64.go:122] [ 1157: 1157] Allocate a new trap: 0xc000c856b0 14 D0713 00:00:41.994638 762333 usertrap_amd64.go:225] [ 1157: 1157] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:41.995207 762333 task_exit.go:204] [ 1157: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.995776 762333 task_signals.go:204] [ 1157: 1159] Signal 1157, PID: 1159, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.996007 762333 task_signals.go:204] [ 1157: 1161] Signal 1157, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.996067 762333 task_signals.go:204] [ 1157: 1162] Signal 1157, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.996084 762333 task_signals.go:204] [ 1157: 1160] Signal 1157, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.996092 762333 task_exit.go:204] [ 1157: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.996555 762333 task_exit.go:204] [ 1157: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.996783 762333 task_signals.go:204] [ 1157: 1158] Signal 1157, PID: 1158, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.996830 762333 task_exit.go:204] [ 1157: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.997131 762333 task_exit.go:204] [ 1157: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.997739 762333 task_exit.go:204] [ 1157: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.998288 762333 task_exit.go:204] [ 1157: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.998382 762333 task_exit.go:204] [ 1157: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.998755 762333 task_exit.go:204] [ 1157: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.999308 762333 task_exit.go:204] [ 1157: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.999379 762333 task_exit.go:204] [ 1157: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.999614 762333 task_exit.go:204] [ 1157: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.999683 762333 task_exit.go:204] [ 1157: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.000136 762333 task_exit.go:204] [ 1157: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.000213 762333 task_exit.go:204] [ 1157: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.027188 762333 task_exit.go:204] [ 1157: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.027311 762333 task_exit.go:204] [ 1157: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.027532 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:42.027864 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:42.027951 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:42.030214 762333 task_exit.go:204] [ 1157: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.039054 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.040530 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:42.063303 762333 syscalls.go:262] [ 1163: 1163] Allocating stack with size of 8388608 bytes D0713 00:00:42.067206 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.067898 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:42.073605 762333 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:42.073764 762333 usertrap_amd64.go:106] [ 1163: 1163] Map a usertrap vma at 68000 D0713 00:00:42.074640 762333 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc00051ec30 1 D0713 00:00:42.074973 762333 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:42.077360 762333 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:42.077456 762333 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc00051ec30 2 D0713 00:00:42.077622 762333 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:42.080866 762333 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:42.080979 762333 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc00051ec30 3 D0713 00:00:42.081159 762333 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:42.110410 762333 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:42.110523 762333 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc00051ec30 4 D0713 00:00:42.110691 762333 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:42.118625 762333 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:42.118710 762333 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc00051ec30 5 D0713 00:00:42.118855 762333 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:42.119334 762333 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b214:sysno 13 D0713 00:00:42.119409 762333 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc00051ec30 6 D0713 00:00:42.119552 762333 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:42.143402 762333 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:42.143492 762333 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc00051ec30 7 D0713 00:00:42.143676 762333 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:42.145728 762333 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:42.145880 762333 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc00051ec30 8 D0713 00:00:42.146141 762333 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:42.147991 762333 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46af76:sysno 35 D0713 00:00:42.148060 762333 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc00051ec30 9 D0713 00:00:42.148351 762333 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:42.150187 762333 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:42.150302 762333 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc00051ec30 10 D0713 00:00:42.151266 762333 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:42.163128 762333 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46b020:sysno 39 D0713 00:00:42.163289 762333 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc00051ec30 11 D0713 00:00:42.163993 762333 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:42.164519 762333 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:42.164589 762333 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc00051ec30 12 D0713 00:00:42.164767 762333 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:42.165687 762333 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0713 00:00:42.166970 762333 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler D0713 00:00:42.178142 762333 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0713 00:00:42.178128 762333 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46af29:sysno 293 D0713 00:00:42.178410 762333 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc00051ec30 13 D0713 00:00:42.178675 762333 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:42.179026 762333 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler D0713 00:00:42.181875 762333 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0713 00:00:42.182132 762333 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler D0713 00:00:42.183964 762333 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0713 00:00:42.184383 762333 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler D0713 00:00:42.202349 762333 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0713 00:00:42.204931 762333 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler D0713 00:00:42.215215 762333 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:42.215337 762333 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc00051ec30 14 D0713 00:00:42.215519 762333 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:42.216009 762333 task_exit.go:204] [ 1163: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.216540 762333 task_signals.go:204] [ 1163: 1165] Signal 1163, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.216569 762333 task_exit.go:204] [ 1163: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.216773 762333 task_signals.go:204] [ 1163: 1166] Signal 1163, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.216855 762333 task_exit.go:204] [ 1163: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.217216 762333 task_signals.go:204] [ 1163: 1164] Signal 1163, PID: 1164, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.217360 762333 task_signals.go:204] [ 1163: 1167] Signal 1163, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.217437 762333 task_exit.go:204] [ 1163: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.217676 762333 task_exit.go:204] [ 1163: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.218040 762333 task_exit.go:204] [ 1163: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.218116 762333 task_exit.go:204] [ 1163: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.218376 762333 task_exit.go:204] [ 1163: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.218819 762333 task_exit.go:204] [ 1163: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.218887 762333 task_exit.go:204] [ 1163: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.219115 762333 task_exit.go:204] [ 1163: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.219165 762333 task_exit.go:204] [ 1163: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.248226 762333 task_exit.go:204] [ 1163: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.248316 762333 task_exit.go:204] [ 1163: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.248553 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:42.248812 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:42.248863 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:42.250899 762333 task_exit.go:204] [ 1163: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.258416 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.261597 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:42.282857 762333 syscalls.go:262] [ 1168: 1168] Allocating stack with size of 8388608 bytes D0713 00:00:42.286823 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.289448 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:42.291199 762333 task_signals.go:470] [ 6: 6] Notified of signal 23 D0713 00:00:42.291423 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:42.292776 762333 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:42.293044 762333 usertrap_amd64.go:106] [ 1168: 1168] Map a usertrap vma at 63000 D0713 00:00:42.294310 762333 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc00051f4a0 1 D0713 00:00:42.294669 762333 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:42.298767 762333 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:42.298914 762333 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc00051f4a0 2 D0713 00:00:42.299119 762333 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:42.302685 762333 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:42.302787 762333 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc00051f4a0 3 D0713 00:00:42.302945 762333 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:42.327990 762333 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:42.328112 762333 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc00051f4a0 4 D0713 00:00:42.328338 762333 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:42.334399 762333 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:42.334507 762333 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc00051f4a0 5 D0713 00:00:42.334668 762333 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:42.335270 762333 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b214:sysno 13 D0713 00:00:42.335365 762333 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc00051f4a0 6 D0713 00:00:42.335540 762333 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:42.358010 762333 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:42.358081 762333 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc00051f4a0 7 D0713 00:00:42.358196 762333 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:42.359844 762333 usertrap_amd64.go:212] [ 1168: 1169] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:42.359955 762333 usertrap_amd64.go:122] [ 1168: 1169] Allocate a new trap: 0xc00051f4a0 8 D0713 00:00:42.360166 762333 usertrap_amd64.go:225] [ 1168: 1169] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:42.361999 762333 usertrap_amd64.go:212] [ 1168: 1169] Found the pattern at ip 46af76:sysno 35 D0713 00:00:42.362123 762333 usertrap_amd64.go:122] [ 1168: 1169] Allocate a new trap: 0xc00051f4a0 9 D0713 00:00:42.362430 762333 usertrap_amd64.go:225] [ 1168: 1169] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:42.363982 762333 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:42.364078 762333 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc00051f4a0 10 D0713 00:00:42.364259 762333 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:42.376745 762333 usertrap_amd64.go:212] [ 1168: 1169] Found the pattern at ip 46b020:sysno 39 D0713 00:00:42.376855 762333 usertrap_amd64.go:122] [ 1168: 1169] Allocate a new trap: 0xc00051f4a0 11 D0713 00:00:42.377081 762333 usertrap_amd64.go:225] [ 1168: 1169] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:42.377595 762333 usertrap_amd64.go:212] [ 1168: 1169] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:42.377663 762333 usertrap_amd64.go:122] [ 1168: 1169] Allocate a new trap: 0xc00051f4a0 12 D0713 00:00:42.377822 762333 usertrap_amd64.go:225] [ 1168: 1169] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:42.378336 762333 task_signals.go:470] [ 1168: 1168] Notified of signal 23 D0713 00:00:42.378602 762333 task_signals.go:220] [ 1168: 1168] Signal 23: delivering to handler D0713 00:00:42.392130 762333 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46af29:sysno 293 D0713 00:00:42.392261 762333 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc00051f4a0 13 D0713 00:00:42.392157 762333 task_signals.go:470] [ 1168: 1168] Notified of signal 23 D0713 00:00:42.392492 762333 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:42.392917 762333 task_signals.go:220] [ 1168: 1168] Signal 23: delivering to handler D0713 00:00:42.394381 762333 task_signals.go:470] [ 1168: 1168] Notified of signal 23 D0713 00:00:42.394940 762333 task_signals.go:220] [ 1168: 1168] Signal 23: delivering to handler D0713 00:00:42.396465 762333 task_signals.go:470] [ 1168: 1168] Notified of signal 23 D0713 00:00:42.396781 762333 task_signals.go:220] [ 1168: 1168] Signal 23: delivering to handler D0713 00:00:42.410751 762333 task_signals.go:470] [ 1168: 1168] Notified of signal 23 D0713 00:00:42.412026 762333 task_signals.go:220] [ 1168: 1168] Signal 23: delivering to handler D0713 00:00:42.419457 762333 usertrap_amd64.go:212] [ 1168: 1168] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:42.419542 762333 usertrap_amd64.go:122] [ 1168: 1168] Allocate a new trap: 0xc00051f4a0 14 D0713 00:00:42.419734 762333 usertrap_amd64.go:225] [ 1168: 1168] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:42.420179 762333 task_exit.go:204] [ 1168: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.420561 762333 task_signals.go:204] [ 1168: 1169] Signal 1168, PID: 1169, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.420601 762333 task_signals.go:204] [ 1168: 1172] Signal 1168, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.420650 762333 task_signals.go:204] [ 1168: 1171] Signal 1168, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.420877 762333 task_signals.go:204] [ 1168: 1170] Signal 1168, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.420914 762333 task_exit.go:204] [ 1168: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.421183 762333 task_exit.go:204] [ 1168: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.421428 762333 task_exit.go:204] [ 1168: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.422138 762333 task_exit.go:204] [ 1168: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.422880 762333 task_exit.go:204] [ 1168: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.422955 762333 task_exit.go:204] [ 1168: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.423254 762333 task_exit.go:204] [ 1168: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.423322 762333 task_exit.go:204] [ 1168: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.423790 762333 task_exit.go:204] [ 1168: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.423873 762333 task_exit.go:204] [ 1168: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.424132 762333 task_exit.go:204] [ 1168: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.444463 762333 task_exit.go:204] [ 1168: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.444600 762333 task_exit.go:204] [ 1168: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.444832 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:42.445190 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:42.445266 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:42.447069 762333 task_exit.go:204] [ 1168: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.454196 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.455185 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:42.474316 762333 syscalls.go:262] [ 1173: 1173] Allocating stack with size of 8388608 bytes D0713 00:00:42.477297 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.477816 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:42.481797 762333 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:42.481925 762333 usertrap_amd64.go:106] [ 1173: 1173] Map a usertrap vma at 61000 D0713 00:00:42.482821 762333 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc001b0ed80 1 D0713 00:00:42.483170 762333 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:42.486085 762333 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:42.486153 762333 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc001b0ed80 2 D0713 00:00:42.486420 762333 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:42.489826 762333 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:42.489905 762333 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc001b0ed80 3 D0713 00:00:42.490061 762333 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:42.515051 762333 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:42.515129 762333 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc001b0ed80 4 D0713 00:00:42.515273 762333 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:42.518278 762333 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:42.518345 762333 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc001b0ed80 5 D0713 00:00:42.518475 762333 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:42.518897 762333 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b214:sysno 13 D0713 00:00:42.518941 762333 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc001b0ed80 6 D0713 00:00:42.519053 762333 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:42.544775 762333 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:42.544885 762333 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc001b0ed80 7 D0713 00:00:42.545152 762333 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:42.547288 762333 usertrap_amd64.go:212] [ 1173: 1174] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:42.547444 762333 usertrap_amd64.go:122] [ 1173: 1174] Allocate a new trap: 0xc001b0ed80 8 D0713 00:00:42.547647 762333 usertrap_amd64.go:225] [ 1173: 1174] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:42.550413 762333 usertrap_amd64.go:212] [ 1173: 1174] Found the pattern at ip 46af76:sysno 35 D0713 00:00:42.550513 762333 usertrap_amd64.go:122] [ 1173: 1174] Allocate a new trap: 0xc001b0ed80 9 D0713 00:00:42.551446 762333 usertrap_amd64.go:225] [ 1173: 1174] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:42.551873 762333 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:42.551977 762333 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc001b0ed80 10 D0713 00:00:42.552741 762333 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:42.565396 762333 usertrap_amd64.go:212] [ 1173: 1174] Found the pattern at ip 46b020:sysno 39 D0713 00:00:42.565479 762333 usertrap_amd64.go:122] [ 1173: 1174] Allocate a new trap: 0xc001b0ed80 11 D0713 00:00:42.565648 762333 usertrap_amd64.go:225] [ 1173: 1174] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:42.565975 762333 usertrap_amd64.go:212] [ 1173: 1174] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:42.566030 762333 usertrap_amd64.go:122] [ 1173: 1174] Allocate a new trap: 0xc001b0ed80 12 D0713 00:00:42.566188 762333 usertrap_amd64.go:225] [ 1173: 1174] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:42.566716 762333 task_signals.go:470] [ 1173: 1173] Notified of signal 23 D0713 00:00:42.567970 762333 task_signals.go:220] [ 1173: 1173] Signal 23: delivering to handler D0713 00:00:42.580607 762333 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46af29:sysno 293 D0713 00:00:42.580812 762333 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc001b0ed80 13 D0713 00:00:42.580994 762333 task_signals.go:470] [ 1173: 1173] Notified of signal 23 D0713 00:00:42.581070 762333 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:42.581435 762333 task_signals.go:220] [ 1173: 1173] Signal 23: delivering to handler D0713 00:00:42.583420 762333 task_signals.go:470] [ 1173: 1173] Notified of signal 23 D0713 00:00:42.583781 762333 task_signals.go:220] [ 1173: 1173] Signal 23: delivering to handler D0713 00:00:42.598954 762333 task_signals.go:470] [ 1173: 1173] Notified of signal 23 D0713 00:00:42.599291 762333 task_signals.go:220] [ 1173: 1173] Signal 23: delivering to handler D0713 00:00:42.612384 762333 usertrap_amd64.go:212] [ 1173: 1173] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:42.612467 762333 usertrap_amd64.go:122] [ 1173: 1173] Allocate a new trap: 0xc001b0ed80 14 D0713 00:00:42.612591 762333 usertrap_amd64.go:225] [ 1173: 1173] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:42.613363 762333 task_exit.go:204] [ 1173: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.613785 762333 task_signals.go:204] [ 1173: 1174] Signal 1173, PID: 1174, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.613934 762333 task_signals.go:204] [ 1173: 1176] Signal 1173, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.613936 762333 task_signals.go:204] [ 1173: 1175] Signal 1173, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.614149 762333 task_signals.go:204] [ 1173: 1178] Signal 1173, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.614182 762333 task_signals.go:204] [ 1173: 1177] Signal 1173, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.614273 762333 task_exit.go:204] [ 1173: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.614763 762333 task_exit.go:204] [ 1173: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.615364 762333 task_exit.go:204] [ 1173: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.615797 762333 task_exit.go:204] [ 1173: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.616278 762333 task_exit.go:204] [ 1173: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.616635 762333 task_exit.go:204] [ 1173: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.616986 762333 task_exit.go:204] [ 1173: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.617106 762333 task_exit.go:204] [ 1173: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.617328 762333 task_exit.go:204] [ 1173: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.617402 762333 task_exit.go:204] [ 1173: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.617699 762333 task_exit.go:204] [ 1173: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.617776 762333 task_exit.go:204] [ 1173: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.618094 762333 task_exit.go:204] [ 1173: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.618152 762333 task_exit.go:204] [ 1173: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.648422 762333 task_exit.go:204] [ 1173: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.648634 762333 task_exit.go:204] [ 1173: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.649014 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:42.649472 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:42.649574 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:42.651387 762333 task_exit.go:204] [ 1173: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.659950 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.660422 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:42.683589 762333 syscalls.go:262] [ 1179: 1179] Allocating stack with size of 8388608 bytes D0713 00:00:42.687308 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.687971 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:42.692126 762333 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:42.692459 762333 usertrap_amd64.go:106] [ 1179: 1179] Map a usertrap vma at 63000 D0713 00:00:42.693608 762333 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc00051e150 1 D0713 00:00:42.693940 762333 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:42.696680 762333 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:42.696742 762333 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc00051e150 2 D0713 00:00:42.696874 762333 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:42.700834 762333 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:42.700923 762333 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc00051e150 3 D0713 00:00:42.701104 762333 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:42.727352 762333 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:42.727435 762333 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc00051e150 4 D0713 00:00:42.727621 762333 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:42.730657 762333 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:42.730732 762333 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc00051e150 5 D0713 00:00:42.730919 762333 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:42.731389 762333 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b214:sysno 13 D0713 00:00:42.731448 762333 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc00051e150 6 D0713 00:00:42.731604 762333 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:42.754653 762333 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:42.754728 762333 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc00051e150 7 D0713 00:00:42.754918 762333 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:42.756878 762333 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:42.757042 762333 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc00051e150 8 D0713 00:00:42.757321 762333 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:42.759881 762333 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46af76:sysno 35 D0713 00:00:42.759975 762333 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc00051e150 9 D0713 00:00:42.760192 762333 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:42.761305 762333 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:42.761387 762333 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc00051e150 10 D0713 00:00:42.761674 762333 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:42.762253 762333 usertrap_amd64.go:212] [ 1179: 1182] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:42.762377 762333 usertrap_amd64.go:122] [ 1179: 1182] Allocate a new trap: 0xc00051e150 11 D0713 00:00:42.762700 762333 usertrap_amd64.go:225] [ 1179: 1182] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:42.775448 762333 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b020:sysno 39 D0713 00:00:42.775553 762333 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc00051e150 12 D0713 00:00:42.775861 762333 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:42.776851 762333 usertrap_amd64.go:212] [ 1179: 1180] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:42.776971 762333 usertrap_amd64.go:122] [ 1179: 1180] Allocate a new trap: 0xc00051e150 13 D0713 00:00:42.777169 762333 usertrap_amd64.go:225] [ 1179: 1180] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:42.777692 762333 task_signals.go:470] [ 1179: 1179] Notified of signal 23 D0713 00:00:42.778136 762333 task_signals.go:220] [ 1179: 1179] Signal 23: delivering to handler D0713 00:00:42.790876 762333 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46af29:sysno 293 D0713 00:00:42.790950 762333 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc00051e150 14 D0713 00:00:42.791083 762333 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46af29 trap addr 63460 ([184 37 1 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:42.792220 762333 task_signals.go:470] [ 1179: 1179] Notified of signal 23 D0713 00:00:42.792527 762333 task_signals.go:179] [ 1179: 1179] Restarting syscall 202: interrupted by signal 23 D0713 00:00:42.792598 762333 task_signals.go:220] [ 1179: 1179] Signal 23: delivering to handler D0713 00:00:42.809362 762333 task_signals.go:470] [ 1179: 1179] Notified of signal 23 D0713 00:00:42.812378 762333 task_signals.go:220] [ 1179: 1179] Signal 23: delivering to handler I0713 00:00:42.814770 762333 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0713 00:00:42.815113 762333 usertrap_amd64.go:212] [ 1179: 1179] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:42.815190 762333 usertrap_amd64.go:122] [ 1179: 1179] Allocate a new trap: 0xc00051e150 15 D0713 00:00:42.815375 762333 usertrap_amd64.go:225] [ 1179: 1179] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 00:00:42.815833 762333 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.816315 762333 task_signals.go:204] [ 1179: 1183] Signal 1179, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.816407 762333 task_signals.go:204] [ 1179: 1182] Signal 1179, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.816419 762333 task_signals.go:204] [ 1179: 1181] Signal 1179, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.816604 762333 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.816530 762333 task_signals.go:204] [ 1179: 1180] Signal 1179, PID: 1180, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.816766 762333 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.817131 762333 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.817390 762333 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.817809 762333 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.817869 762333 task_exit.go:204] [ 1179: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.818126 762333 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.818181 762333 task_exit.go:204] [ 1179: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.818325 762333 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.818375 762333 task_exit.go:204] [ 1179: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.818496 762333 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.843577 762333 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.843674 762333 task_exit.go:204] [ 1179: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.843913 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:42.844264 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:42.844382 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:42.846517 762333 task_exit.go:204] [ 1179: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.854228 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.854598 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:42.874749 762333 syscalls.go:262] [ 1184: 1184] Allocating stack with size of 8388608 bytes D0713 00:00:42.877694 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.878352 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:42.882032 762333 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:42.882235 762333 usertrap_amd64.go:106] [ 1184: 1184] Map a usertrap vma at 69000 D0713 00:00:42.883299 762333 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000b0d3e0 1 D0713 00:00:42.883656 762333 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:42.885607 762333 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:42.885670 762333 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000b0d3e0 2 D0713 00:00:42.885840 762333 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:42.888407 762333 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:42.888476 762333 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000b0d3e0 3 D0713 00:00:42.888651 762333 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:42.913188 762333 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:42.913269 762333 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000b0d3e0 4 D0713 00:00:42.913423 762333 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:42.916558 762333 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:42.916636 762333 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000b0d3e0 5 D0713 00:00:42.916818 762333 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:42.917279 762333 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b214:sysno 13 D0713 00:00:42.917337 762333 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000b0d3e0 6 D0713 00:00:42.917449 762333 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:42.936049 762333 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:42.936118 762333 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000b0d3e0 7 D0713 00:00:42.936267 762333 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:42.938069 762333 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:42.938177 762333 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc000b0d3e0 8 D0713 00:00:42.938355 762333 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:42.939777 762333 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46af76:sysno 35 D0713 00:00:42.939828 762333 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc000b0d3e0 9 D0713 00:00:42.940045 762333 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:42.941076 762333 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:42.941197 762333 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000b0d3e0 10 D0713 00:00:42.942096 762333 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:42.954072 762333 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46b020:sysno 39 D0713 00:00:42.954152 762333 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc000b0d3e0 11 D0713 00:00:42.954322 762333 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:42.954679 762333 usertrap_amd64.go:212] [ 1184: 1185] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:42.954740 762333 usertrap_amd64.go:122] [ 1184: 1185] Allocate a new trap: 0xc000b0d3e0 12 D0713 00:00:42.954890 762333 usertrap_amd64.go:225] [ 1184: 1185] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:42.955361 762333 task_signals.go:470] [ 1184: 1184] Notified of signal 23 D0713 00:00:42.956516 762333 task_signals.go:220] [ 1184: 1184] Signal 23: delivering to handler D0713 00:00:42.967094 762333 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46af29:sysno 293 D0713 00:00:42.967136 762333 task_signals.go:470] [ 1184: 1184] Notified of signal 23 D0713 00:00:42.967184 762333 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000b0d3e0 13 D0713 00:00:42.967456 762333 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:42.967827 762333 task_signals.go:220] [ 1184: 1184] Signal 23: delivering to handler D0713 00:00:42.969604 762333 task_signals.go:470] [ 1184: 1184] Notified of signal 23 D0713 00:00:42.969828 762333 task_signals.go:220] [ 1184: 1184] Signal 23: delivering to handler D0713 00:00:42.985738 762333 task_signals.go:470] [ 1184: 1184] Notified of signal 23 D0713 00:00:42.988121 762333 task_signals.go:220] [ 1184: 1184] Signal 23: delivering to handler D0713 00:00:42.997835 762333 usertrap_amd64.go:212] [ 1184: 1184] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:42.997952 762333 usertrap_amd64.go:122] [ 1184: 1184] Allocate a new trap: 0xc000b0d3e0 14 D0713 00:00:42.998119 762333 usertrap_amd64.go:225] [ 1184: 1184] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:42.998662 762333 task_exit.go:204] [ 1184: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.998946 762333 task_signals.go:204] [ 1184: 1187] Signal 1184, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.999493 762333 task_signals.go:204] [ 1184: 1188] Signal 1184, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.999507 762333 task_signals.go:204] [ 1184: 1185] Signal 1184, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.999644 762333 task_signals.go:204] [ 1184: 1186] Signal 1184, PID: 1186, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.999759 762333 task_exit.go:204] [ 1184: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.000067 762333 task_exit.go:204] [ 1184: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.000318 762333 task_exit.go:204] [ 1184: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.000611 762333 task_exit.go:204] [ 1184: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.000869 762333 task_exit.go:204] [ 1184: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.002024 762333 task_exit.go:204] [ 1184: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.002145 762333 task_exit.go:204] [ 1184: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.002444 762333 task_exit.go:204] [ 1184: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.002529 762333 task_exit.go:204] [ 1184: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.002983 762333 task_exit.go:204] [ 1184: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.003057 762333 task_exit.go:204] [ 1184: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.029677 762333 task_exit.go:204] [ 1184: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.029783 762333 task_exit.go:204] [ 1184: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.030033 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:43.030430 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:43.030507 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:43.032010 762333 task_exit.go:204] [ 1184: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.040166 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.043311 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:43.059751 762333 syscalls.go:262] [ 1189: 1189] Allocating stack with size of 8388608 bytes D0713 00:00:43.062600 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.063170 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:43.068002 762333 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:43.068220 762333 usertrap_amd64.go:106] [ 1189: 1189] Map a usertrap vma at 62000 D0713 00:00:43.069247 762333 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc0021a0720 1 D0713 00:00:43.069614 762333 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:43.071649 762333 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:43.071707 762333 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc0021a0720 2 D0713 00:00:43.071828 762333 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:43.074522 762333 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:43.074589 762333 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc0021a0720 3 D0713 00:00:43.074729 762333 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:43.100491 762333 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:43.100562 762333 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc0021a0720 4 D0713 00:00:43.100690 762333 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:43.103486 762333 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:43.103550 762333 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc0021a0720 5 D0713 00:00:43.103669 762333 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:43.104036 762333 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b214:sysno 13 D0713 00:00:43.104121 762333 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc0021a0720 6 D0713 00:00:43.104231 762333 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:43.123609 762333 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:43.123681 762333 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc0021a0720 7 D0713 00:00:43.123811 762333 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:43.125537 762333 usertrap_amd64.go:212] [ 1189: 1190] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:43.125619 762333 usertrap_amd64.go:122] [ 1189: 1190] Allocate a new trap: 0xc0021a0720 8 D0713 00:00:43.125811 762333 usertrap_amd64.go:225] [ 1189: 1190] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:43.127431 762333 usertrap_amd64.go:212] [ 1189: 1190] Found the pattern at ip 46af76:sysno 35 D0713 00:00:43.127494 762333 usertrap_amd64.go:122] [ 1189: 1190] Allocate a new trap: 0xc0021a0720 9 D0713 00:00:43.127766 762333 usertrap_amd64.go:225] [ 1189: 1190] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:43.128377 762333 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:43.128450 762333 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc0021a0720 10 D0713 00:00:43.129707 762333 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:43.141566 762333 usertrap_amd64.go:212] [ 1189: 1190] Found the pattern at ip 46b020:sysno 39 D0713 00:00:43.141678 762333 usertrap_amd64.go:122] [ 1189: 1190] Allocate a new trap: 0xc0021a0720 11 D0713 00:00:43.141814 762333 usertrap_amd64.go:225] [ 1189: 1190] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:43.142292 762333 usertrap_amd64.go:212] [ 1189: 1190] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:43.142358 762333 usertrap_amd64.go:122] [ 1189: 1190] Allocate a new trap: 0xc0021a0720 12 D0713 00:00:43.143095 762333 usertrap_amd64.go:225] [ 1189: 1190] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:43.143593 762333 task_signals.go:470] [ 1189: 1189] Notified of signal 23 D0713 00:00:43.143820 762333 task_signals.go:220] [ 1189: 1189] Signal 23: delivering to handler D0713 00:00:43.150897 762333 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46af29:sysno 293 D0713 00:00:43.150977 762333 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc0021a0720 13 D0713 00:00:43.151167 762333 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:43.155887 762333 task_signals.go:470] [ 1189: 1189] Notified of signal 23 D0713 00:00:43.158302 762333 task_signals.go:220] [ 1189: 1189] Signal 23: delivering to handler D0713 00:00:43.175865 762333 task_signals.go:470] [ 1189: 1189] Notified of signal 23 D0713 00:00:43.178905 762333 task_signals.go:220] [ 1189: 1189] Signal 23: delivering to handler D0713 00:00:43.181256 762333 usertrap_amd64.go:212] [ 1189: 1189] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:43.181341 762333 usertrap_amd64.go:122] [ 1189: 1189] Allocate a new trap: 0xc0021a0720 14 D0713 00:00:43.181507 762333 usertrap_amd64.go:225] [ 1189: 1189] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:43.181951 762333 task_exit.go:204] [ 1189: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.182384 762333 task_signals.go:204] [ 1189: 1190] Signal 1189, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.182658 762333 task_signals.go:204] [ 1189: 1192] Signal 1189, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.182706 762333 task_signals.go:204] [ 1189: 1191] Signal 1189, PID: 1191, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.182925 762333 task_exit.go:204] [ 1189: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.183172 762333 task_signals.go:204] [ 1189: 1193] Signal 1189, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.183294 762333 task_exit.go:204] [ 1189: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.183551 762333 task_exit.go:204] [ 1189: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.183827 762333 task_exit.go:204] [ 1189: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.184478 762333 task_exit.go:204] [ 1189: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.184549 762333 task_exit.go:204] [ 1189: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.184803 762333 task_exit.go:204] [ 1189: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.185299 762333 task_exit.go:204] [ 1189: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.185360 762333 task_exit.go:204] [ 1189: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.185802 762333 task_exit.go:204] [ 1189: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.185881 762333 task_exit.go:204] [ 1189: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.208286 762333 task_exit.go:204] [ 1189: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.208406 762333 task_exit.go:204] [ 1189: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.209164 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:43.209608 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:43.209731 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:43.211470 762333 task_exit.go:204] [ 1189: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.219940 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.220903 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:43.244803 762333 syscalls.go:262] [ 1194: 1194] Allocating stack with size of 8388608 bytes D0713 00:00:43.248242 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.248841 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:43.253737 762333 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:43.253869 762333 usertrap_amd64.go:106] [ 1194: 1194] Map a usertrap vma at 60000 D0713 00:00:43.254665 762333 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000049470 1 D0713 00:00:43.254923 762333 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:43.256823 762333 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:43.256887 762333 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000049470 2 D0713 00:00:43.257056 762333 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:43.262372 762333 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:43.262446 762333 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000049470 3 D0713 00:00:43.262636 762333 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:43.305763 762333 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:43.305870 762333 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000049470 4 D0713 00:00:43.306064 762333 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:43.310769 762333 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:43.310832 762333 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000049470 5 D0713 00:00:43.310995 762333 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:43.311415 762333 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b214:sysno 13 D0713 00:00:43.311468 762333 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000049470 6 D0713 00:00:43.311596 762333 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:43.332310 762333 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:43.332380 762333 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000049470 7 D0713 00:00:43.332495 762333 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:43.334188 762333 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:43.334248 762333 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc000049470 8 D0713 00:00:43.334447 762333 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:43.335871 762333 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46af76:sysno 35 D0713 00:00:43.335944 762333 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc000049470 9 D0713 00:00:43.336102 762333 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:43.337783 762333 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:43.337869 762333 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000049470 10 D0713 00:00:43.338106 762333 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:43.351996 762333 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46b020:sysno 39 D0713 00:00:43.352086 762333 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc000049470 11 D0713 00:00:43.352937 762333 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:43.353735 762333 usertrap_amd64.go:212] [ 1194: 1195] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:43.353826 762333 usertrap_amd64.go:122] [ 1194: 1195] Allocate a new trap: 0xc000049470 12 D0713 00:00:43.353973 762333 usertrap_amd64.go:225] [ 1194: 1195] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:43.354528 762333 task_signals.go:470] [ 1194: 1194] Notified of signal 23 D0713 00:00:43.354744 762333 task_signals.go:220] [ 1194: 1194] Signal 23: delivering to handler D0713 00:00:43.365209 762333 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46af29:sysno 293 D0713 00:00:43.365274 762333 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000049470 13 D0713 00:00:43.365300 762333 task_signals.go:470] [ 1194: 1194] Notified of signal 23 D0713 00:00:43.365405 762333 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:43.365650 762333 task_signals.go:220] [ 1194: 1194] Signal 23: delivering to handler D0713 00:00:43.366689 762333 task_signals.go:481] [ 1194: 1194] No task notified of signal 23 D0713 00:00:43.367090 762333 task_signals.go:220] [ 1194: 1194] Signal 23: delivering to handler D0713 00:00:43.368161 762333 task_signals.go:470] [ 1194: 1194] Notified of signal 23 D0713 00:00:43.368883 762333 task_signals.go:220] [ 1194: 1194] Signal 23: delivering to handler I0713 00:00:43.368810 762333 watchdog.go:295] Watchdog starting loop, tasks: 24, discount: 0s D0713 00:00:43.371032 762333 task_signals.go:470] [ 1194: 1194] Notified of signal 23 D0713 00:00:43.371376 762333 task_signals.go:220] [ 1194: 1194] Signal 23: delivering to handler D0713 00:00:43.389863 762333 task_signals.go:470] [ 1194: 1194] Notified of signal 23 D0713 00:00:43.390231 762333 task_signals.go:220] [ 1194: 1194] Signal 23: delivering to handler D0713 00:00:43.395856 762333 usertrap_amd64.go:212] [ 1194: 1194] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:43.395967 762333 usertrap_amd64.go:122] [ 1194: 1194] Allocate a new trap: 0xc000049470 14 D0713 00:00:43.396156 762333 usertrap_amd64.go:225] [ 1194: 1194] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:43.396714 762333 task_exit.go:204] [ 1194: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.397265 762333 task_signals.go:204] [ 1194: 1196] Signal 1194, PID: 1196, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.397424 762333 task_signals.go:204] [ 1194: 1198] Signal 1194, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.397707 762333 task_signals.go:204] [ 1194: 1195] Signal 1194, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.397769 762333 task_signals.go:204] [ 1194: 1197] Signal 1194, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.397924 762333 task_exit.go:204] [ 1194: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.398377 762333 task_exit.go:204] [ 1194: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.398598 762333 task_exit.go:204] [ 1194: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.399092 762333 task_exit.go:204] [ 1194: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.400378 762333 task_exit.go:204] [ 1194: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.400988 762333 task_exit.go:204] [ 1194: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.401070 762333 task_exit.go:204] [ 1194: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.401351 762333 task_exit.go:204] [ 1194: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.401433 762333 task_exit.go:204] [ 1194: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.401613 762333 task_exit.go:204] [ 1194: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.401673 762333 task_exit.go:204] [ 1194: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.424377 762333 task_exit.go:204] [ 1194: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.424491 762333 task_exit.go:204] [ 1194: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.426528 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:43.426854 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:43.426937 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:43.428901 762333 task_exit.go:204] [ 1194: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.434939 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.435873 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:43.458102 762333 syscalls.go:262] [ 1199: 1199] Allocating stack with size of 8388608 bytes D0713 00:00:43.461068 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.462533 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:43.465232 762333 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:43.465494 762333 usertrap_amd64.go:106] [ 1199: 1199] Map a usertrap vma at 66000 D0713 00:00:43.466596 762333 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc0021a0d20 1 D0713 00:00:43.466975 762333 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:43.469533 762333 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:43.469600 762333 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc0021a0d20 2 D0713 00:00:43.469805 762333 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:43.473132 762333 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:43.473205 762333 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc0021a0d20 3 D0713 00:00:43.473377 762333 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:43.497099 762333 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:43.497164 762333 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc0021a0d20 4 D0713 00:00:43.497308 762333 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:43.500257 762333 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:43.500324 762333 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc0021a0d20 5 D0713 00:00:43.500515 762333 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:43.501107 762333 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b214:sysno 13 D0713 00:00:43.501163 762333 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc0021a0d20 6 D0713 00:00:43.501336 762333 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:43.534500 762333 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:43.534589 762333 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc0021a0d20 7 D0713 00:00:43.534744 762333 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:43.539349 762333 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:43.539542 762333 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc0021a0d20 8 D0713 00:00:43.539788 762333 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:43.542594 762333 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46af76:sysno 35 D0713 00:00:43.542749 762333 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc0021a0d20 9 D0713 00:00:43.542947 762333 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:43.544854 762333 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:43.545040 762333 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc0021a0d20 10 D0713 00:00:43.545336 762333 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:43.559115 762333 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46b020:sysno 39 D0713 00:00:43.559234 762333 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc0021a0d20 11 D0713 00:00:43.559920 762333 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:43.561261 762333 usertrap_amd64.go:212] [ 1199: 1200] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:43.561372 762333 usertrap_amd64.go:122] [ 1199: 1200] Allocate a new trap: 0xc0021a0d20 12 D0713 00:00:43.561559 762333 usertrap_amd64.go:225] [ 1199: 1200] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:43.562087 762333 task_signals.go:470] [ 1199: 1199] Notified of signal 23 D0713 00:00:43.563942 762333 task_signals.go:220] [ 1199: 1199] Signal 23: delivering to handler D0713 00:00:43.565794 762333 task_signals.go:470] [ 1199: 1199] Notified of signal 23 D0713 00:00:43.566221 762333 task_signals.go:220] [ 1199: 1199] Signal 23: delivering to handler D0713 00:00:43.572702 762333 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46af29:sysno 293 D0713 00:00:43.572771 762333 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc0021a0d20 13 D0713 00:00:43.572929 762333 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:43.579885 762333 task_signals.go:470] [ 1199: 1199] Notified of signal 23 D0713 00:00:43.581045 762333 task_signals.go:220] [ 1199: 1199] Signal 23: delivering to handler D0713 00:00:43.596424 762333 usertrap_amd64.go:212] [ 1199: 1199] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:43.596519 762333 usertrap_amd64.go:122] [ 1199: 1199] Allocate a new trap: 0xc0021a0d20 14 D0713 00:00:43.596649 762333 usertrap_amd64.go:225] [ 1199: 1199] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:43.597364 762333 task_exit.go:204] [ 1199: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.597552 762333 task_signals.go:204] [ 1199: 1201] Signal 1199, PID: 1201, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.597591 762333 task_signals.go:204] [ 1199: 1203] Signal 1199, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.597847 762333 task_exit.go:204] [ 1199: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.598068 762333 task_signals.go:204] [ 1199: 1202] Signal 1199, PID: 1202, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.598417 762333 task_signals.go:204] [ 1199: 1200] Signal 1199, PID: 1200, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.598653 762333 task_exit.go:204] [ 1199: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.598888 762333 task_signals.go:204] [ 1199: 1204] Signal 1199, PID: 1204, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.599158 762333 task_exit.go:204] [ 1199: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.599398 762333 task_exit.go:204] [ 1199: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.599718 762333 task_exit.go:204] [ 1199: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.599807 762333 task_exit.go:204] [ 1199: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.600282 762333 task_exit.go:204] [ 1199: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.601197 762333 task_exit.go:204] [ 1199: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.601271 762333 task_exit.go:204] [ 1199: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.601596 762333 task_exit.go:204] [ 1199: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.601650 762333 task_exit.go:204] [ 1199: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.601840 762333 task_exit.go:204] [ 1199: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.601895 762333 task_exit.go:204] [ 1199: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.602031 762333 task_exit.go:204] [ 1199: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.626575 762333 task_exit.go:204] [ 1199: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.626653 762333 task_exit.go:204] [ 1199: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.626992 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:43.627435 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:43.627527 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:43.629268 762333 task_exit.go:204] [ 1199: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.637695 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.638690 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:43.661851 762333 syscalls.go:262] [ 1205: 1205] Allocating stack with size of 8388608 bytes D0713 00:00:43.664900 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.665591 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:43.670175 762333 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:43.670314 762333 usertrap_amd64.go:106] [ 1205: 1205] Map a usertrap vma at 62000 D0713 00:00:43.671098 762333 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc001b0e600 1 D0713 00:00:43.671481 762333 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:43.673537 762333 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:43.673595 762333 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc001b0e600 2 D0713 00:00:43.673737 762333 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:43.676454 762333 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:43.676515 762333 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc001b0e600 3 D0713 00:00:43.676697 762333 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:43.699642 762333 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:43.699745 762333 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc001b0e600 4 D0713 00:00:43.699914 762333 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:43.703033 762333 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:43.703100 762333 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc001b0e600 5 D0713 00:00:43.703299 762333 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:43.703727 762333 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b214:sysno 13 D0713 00:00:43.703783 762333 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc001b0e600 6 D0713 00:00:43.703936 762333 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:43.726042 762333 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:43.726136 762333 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc001b0e600 7 D0713 00:00:43.726283 762333 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:43.727863 762333 usertrap_amd64.go:212] [ 1205: 1206] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:43.727926 762333 usertrap_amd64.go:122] [ 1205: 1206] Allocate a new trap: 0xc001b0e600 8 D0713 00:00:43.728106 762333 usertrap_amd64.go:225] [ 1205: 1206] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:43.730803 762333 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:43.730868 762333 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc001b0e600 9 D0713 00:00:43.731013 762333 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:43.731944 762333 usertrap_amd64.go:212] [ 1205: 1206] Found the pattern at ip 46af76:sysno 35 D0713 00:00:43.732031 762333 usertrap_amd64.go:122] [ 1205: 1206] Allocate a new trap: 0xc001b0e600 10 D0713 00:00:43.732247 762333 usertrap_amd64.go:225] [ 1205: 1206] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:43.743815 762333 usertrap_amd64.go:212] [ 1205: 1206] Found the pattern at ip 46b020:sysno 39 D0713 00:00:43.743924 762333 usertrap_amd64.go:122] [ 1205: 1206] Allocate a new trap: 0xc001b0e600 11 D0713 00:00:43.744081 762333 usertrap_amd64.go:225] [ 1205: 1206] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:43.744526 762333 usertrap_amd64.go:212] [ 1205: 1206] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:43.744605 762333 usertrap_amd64.go:122] [ 1205: 1206] Allocate a new trap: 0xc001b0e600 12 D0713 00:00:43.744818 762333 usertrap_amd64.go:225] [ 1205: 1206] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:43.745366 762333 task_signals.go:470] [ 1205: 1205] Notified of signal 23 D0713 00:00:43.746338 762333 task_signals.go:220] [ 1205: 1205] Signal 23: delivering to handler D0713 00:00:43.754803 762333 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46af29:sysno 293 D0713 00:00:43.754872 762333 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc001b0e600 13 D0713 00:00:43.755010 762333 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:43.760799 762333 task_signals.go:470] [ 1205: 1205] Notified of signal 23 D0713 00:00:43.763357 762333 task_signals.go:220] [ 1205: 1205] Signal 23: delivering to handler D0713 00:00:43.776343 762333 task_signals.go:470] [ 1205: 1205] Notified of signal 23 D0713 00:00:43.779272 762333 task_signals.go:220] [ 1205: 1205] Signal 23: delivering to handler D0713 00:00:43.783375 762333 usertrap_amd64.go:212] [ 1205: 1205] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:43.783502 762333 usertrap_amd64.go:122] [ 1205: 1205] Allocate a new trap: 0xc001b0e600 14 D0713 00:00:43.783711 762333 usertrap_amd64.go:225] [ 1205: 1205] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:43.784227 762333 task_exit.go:204] [ 1205: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.785180 762333 task_signals.go:204] [ 1205: 1209] Signal 1205, PID: 1209, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.785346 762333 task_signals.go:204] [ 1205: 1206] Signal 1205, PID: 1206, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.785442 762333 task_exit.go:204] [ 1205: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.785680 762333 task_signals.go:204] [ 1205: 1208] Signal 1205, PID: 1208, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.785709 762333 task_exit.go:204] [ 1205: 1209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.785924 762333 task_exit.go:204] [ 1205: 1206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.786236 762333 task_signals.go:204] [ 1205: 1207] Signal 1205, PID: 1207, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.786298 762333 task_exit.go:204] [ 1205: 1208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.786587 762333 task_exit.go:204] [ 1205: 1207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.787615 762333 task_exit.go:204] [ 1205: 1209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.787688 762333 task_exit.go:204] [ 1205: 1209] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.787902 762333 task_exit.go:204] [ 1205: 1206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.787973 762333 task_exit.go:204] [ 1205: 1206] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.788172 762333 task_exit.go:204] [ 1205: 1208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.788255 762333 task_exit.go:204] [ 1205: 1208] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.808524 762333 task_exit.go:204] [ 1205: 1207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.808678 762333 task_exit.go:204] [ 1205: 1207] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.808958 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:43.809346 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:43.809470 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:43.812024 762333 task_exit.go:204] [ 1205: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.820845 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:43.823340 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.857203 762333 syscalls.go:262] [ 1210: 1210] Allocating stack with size of 8388608 bytes D0713 00:00:43.860502 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.862261 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:43.866933 762333 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:43.867171 762333 usertrap_amd64.go:106] [ 1210: 1210] Map a usertrap vma at 6a000 D0713 00:00:43.869054 762333 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0021a14a0 1 D0713 00:00:43.869418 762333 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:43.872649 762333 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:43.872740 762333 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0021a14a0 2 D0713 00:00:43.872929 762333 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:43.876666 762333 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:43.876762 762333 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0021a14a0 3 D0713 00:00:43.877001 762333 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:43.904385 762333 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:43.904463 762333 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0021a14a0 4 D0713 00:00:43.904607 762333 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:43.907707 762333 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:43.907785 762333 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0021a14a0 5 D0713 00:00:43.907943 762333 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:43.908406 762333 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b214:sysno 13 D0713 00:00:43.908475 762333 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0021a14a0 6 D0713 00:00:43.908702 762333 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:43.931390 762333 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:43.931496 762333 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0021a14a0 7 D0713 00:00:43.931681 762333 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:43.933499 762333 usertrap_amd64.go:212] [ 1210: 1211] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:43.933591 762333 usertrap_amd64.go:122] [ 1210: 1211] Allocate a new trap: 0xc0021a14a0 8 D0713 00:00:43.933842 762333 usertrap_amd64.go:225] [ 1210: 1211] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:43.936866 762333 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:43.937010 762333 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0021a14a0 9 D0713 00:00:43.937329 762333 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:43.937833 762333 usertrap_amd64.go:212] [ 1210: 1211] Found the pattern at ip 46af76:sysno 35 D0713 00:00:43.937891 762333 usertrap_amd64.go:122] [ 1210: 1211] Allocate a new trap: 0xc0021a14a0 10 D0713 00:00:43.938092 762333 usertrap_amd64.go:225] [ 1210: 1211] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:43.952173 762333 usertrap_amd64.go:212] [ 1210: 1211] Found the pattern at ip 46b020:sysno 39 D0713 00:00:43.952286 762333 usertrap_amd64.go:122] [ 1210: 1211] Allocate a new trap: 0xc0021a14a0 11 D0713 00:00:43.953076 762333 usertrap_amd64.go:225] [ 1210: 1211] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:43.953969 762333 usertrap_amd64.go:212] [ 1210: 1211] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:43.954198 762333 usertrap_amd64.go:122] [ 1210: 1211] Allocate a new trap: 0xc0021a14a0 12 D0713 00:00:43.954406 762333 usertrap_amd64.go:225] [ 1210: 1211] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:43.954954 762333 task_signals.go:470] [ 1210: 1210] Notified of signal 23 D0713 00:00:43.955196 762333 task_signals.go:220] [ 1210: 1210] Signal 23: delivering to handler D0713 00:00:43.963904 762333 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46af29:sysno 293 D0713 00:00:43.963979 762333 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0021a14a0 13 D0713 00:00:43.964208 762333 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:43.965786 762333 task_signals.go:470] [ 1210: 1210] Notified of signal 23 D0713 00:00:43.966213 762333 task_signals.go:220] [ 1210: 1210] Signal 23: delivering to handler D0713 00:00:43.967593 762333 task_signals.go:481] [ 1210: 1210] No task notified of signal 23 D0713 00:00:43.967957 762333 task_signals.go:220] [ 1210: 1210] Signal 23: delivering to handler D0713 00:00:43.969457 762333 task_signals.go:470] [ 1210: 1210] Notified of signal 23 D0713 00:00:43.969758 762333 task_signals.go:220] [ 1210: 1210] Signal 23: delivering to handler D0713 00:00:43.982099 762333 task_signals.go:470] [ 1210: 1210] Notified of signal 23 D0713 00:00:43.982370 762333 task_signals.go:220] [ 1210: 1210] Signal 23: delivering to handler D0713 00:00:43.988063 762333 task_signals.go:470] [ 1210: 1210] Notified of signal 23 D0713 00:00:43.993222 762333 task_signals.go:220] [ 1210: 1210] Signal 23: delivering to handler D0713 00:00:44.001619 762333 sys_signal.go:495] [ 1210: 1210] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0713 00:00:44.001942 762333 usertrap_amd64.go:212] [ 1210: 1210] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:44.002006 762333 usertrap_amd64.go:122] [ 1210: 1210] Allocate a new trap: 0xc0021a14a0 14 D0713 00:00:44.002231 762333 usertrap_amd64.go:225] [ 1210: 1210] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:44.002873 762333 task_exit.go:204] [ 1210: 1210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.003273 762333 task_signals.go:204] [ 1210: 1211] Signal 1210, PID: 1211, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.003347 762333 task_signals.go:204] [ 1210: 1213] Signal 1210, PID: 1213, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.003573 762333 task_exit.go:204] [ 1210: 1211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.003577 762333 task_signals.go:204] [ 1210: 1212] Signal 1210, PID: 1212, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.003566 762333 task_signals.go:204] [ 1210: 1214] Signal 1210, PID: 1214, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.003919 762333 task_exit.go:204] [ 1210: 1214] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.004177 762333 task_exit.go:204] [ 1210: 1213] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.004556 762333 task_exit.go:204] [ 1210: 1212] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.005743 762333 task_exit.go:204] [ 1210: 1210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.005970 762333 task_exit.go:204] [ 1210: 1211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.006081 762333 task_exit.go:204] [ 1210: 1211] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.006389 762333 task_exit.go:204] [ 1210: 1213] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.006454 762333 task_exit.go:204] [ 1210: 1213] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.006726 762333 task_exit.go:204] [ 1210: 1212] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.006784 762333 task_exit.go:204] [ 1210: 1212] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.031603 762333 task_exit.go:204] [ 1210: 1214] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.031726 762333 task_exit.go:204] [ 1210: 1214] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.031982 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:44.032340 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:44.032418 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:44.034566 762333 task_exit.go:204] [ 1210: 1210] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.042937 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:44.043200 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:44.067245 762333 syscalls.go:262] [ 1215: 1215] Allocating stack with size of 8388608 bytes D0713 00:00:44.070501 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:44.071175 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:44.076345 762333 usertrap_amd64.go:212] [ 1215: 1215] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:44.076512 762333 usertrap_amd64.go:106] [ 1215: 1215] Map a usertrap vma at 6a000 D0713 00:00:44.077461 762333 usertrap_amd64.go:122] [ 1215: 1215] Allocate a new trap: 0xc00172af00 1 D0713 00:00:44.077769 762333 usertrap_amd64.go:225] [ 1215: 1215] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:44.079768 762333 usertrap_amd64.go:212] [ 1215: 1215] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:44.079838 762333 usertrap_amd64.go:122] [ 1215: 1215] Allocate a new trap: 0xc00172af00 2 D0713 00:00:44.079967 762333 usertrap_amd64.go:225] [ 1215: 1215] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:44.082913 762333 usertrap_amd64.go:212] [ 1215: 1215] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:44.083037 762333 usertrap_amd64.go:122] [ 1215: 1215] Allocate a new trap: 0xc00172af00 3 D0713 00:00:44.083314 762333 usertrap_amd64.go:225] [ 1215: 1215] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:44.109730 762333 usertrap_amd64.go:212] [ 1215: 1215] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:44.109847 762333 usertrap_amd64.go:122] [ 1215: 1215] Allocate a new trap: 0xc00172af00 4 D0713 00:00:44.110037 762333 usertrap_amd64.go:225] [ 1215: 1215] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:44.112836 762333 usertrap_amd64.go:212] [ 1215: 1215] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:44.112890 762333 usertrap_amd64.go:122] [ 1215: 1215] Allocate a new trap: 0xc00172af00 5 D0713 00:00:44.113051 762333 usertrap_amd64.go:225] [ 1215: 1215] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:44.113409 762333 usertrap_amd64.go:212] [ 1215: 1215] Found the pattern at ip 46b214:sysno 13 D0713 00:00:44.113459 762333 usertrap_amd64.go:122] [ 1215: 1215] Allocate a new trap: 0xc00172af00 6 D0713 00:00:44.113554 762333 usertrap_amd64.go:225] [ 1215: 1215] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:44.133600 762333 usertrap_amd64.go:212] [ 1215: 1215] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:44.133680 762333 usertrap_amd64.go:122] [ 1215: 1215] Allocate a new trap: 0xc00172af00 7 D0713 00:00:44.133794 762333 usertrap_amd64.go:225] [ 1215: 1215] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:44.135445 762333 usertrap_amd64.go:212] [ 1215: 1216] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:44.135547 762333 usertrap_amd64.go:122] [ 1215: 1216] Allocate a new trap: 0xc00172af00 8 D0713 00:00:44.135772 762333 usertrap_amd64.go:225] [ 1215: 1216] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:44.139492 762333 usertrap_amd64.go:212] [ 1215: 1216] Found the pattern at ip 46af76:sysno 35 D0713 00:00:44.139569 762333 usertrap_amd64.go:122] [ 1215: 1216] Allocate a new trap: 0xc00172af00 9 D0713 00:00:44.139783 762333 usertrap_amd64.go:225] [ 1215: 1216] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:44.140240 762333 usertrap_amd64.go:212] [ 1215: 1215] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:44.140353 762333 usertrap_amd64.go:122] [ 1215: 1215] Allocate a new trap: 0xc00172af00 10 D0713 00:00:44.140641 762333 usertrap_amd64.go:225] [ 1215: 1215] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:44.151945 762333 usertrap_amd64.go:212] [ 1215: 1216] Found the pattern at ip 46b020:sysno 39 D0713 00:00:44.152151 762333 usertrap_amd64.go:122] [ 1215: 1216] Allocate a new trap: 0xc00172af00 11 D0713 00:00:44.152356 762333 usertrap_amd64.go:225] [ 1215: 1216] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:44.152815 762333 usertrap_amd64.go:212] [ 1215: 1216] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:44.152871 762333 usertrap_amd64.go:122] [ 1215: 1216] Allocate a new trap: 0xc00172af00 12 D0713 00:00:44.153069 762333 usertrap_amd64.go:225] [ 1215: 1216] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:44.153522 762333 task_signals.go:470] [ 1215: 1215] Notified of signal 23 D0713 00:00:44.153820 762333 task_signals.go:220] [ 1215: 1215] Signal 23: delivering to handler D0713 00:00:44.167519 762333 usertrap_amd64.go:212] [ 1215: 1215] Found the pattern at ip 46af29:sysno 293 D0713 00:00:44.167619 762333 usertrap_amd64.go:122] [ 1215: 1215] Allocate a new trap: 0xc00172af00 13 D0713 00:00:44.167801 762333 usertrap_amd64.go:225] [ 1215: 1215] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:44.168468 762333 task_signals.go:470] [ 1215: 1215] Notified of signal 23 D0713 00:00:44.168740 762333 task_signals.go:220] [ 1215: 1215] Signal 23: delivering to handler executing program D0713 00:00:44.183999 762333 task_signals.go:470] [ 1215: 1215] Notified of signal 23 D0713 00:00:44.185677 762333 task_signals.go:220] [ 1215: 1215] Signal 23: delivering to handler D0713 00:00:44.194006 762333 usertrap_amd64.go:212] [ 1215: 1215] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:44.194077 762333 usertrap_amd64.go:122] [ 1215: 1215] Allocate a new trap: 0xc00172af00 14 D0713 00:00:44.194221 762333 usertrap_amd64.go:225] [ 1215: 1215] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:44.194651 762333 task_exit.go:204] [ 1215: 1215] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.195030 762333 task_signals.go:204] [ 1215: 1218] Signal 1215, PID: 1218, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.195097 762333 task_signals.go:204] [ 1215: 1219] Signal 1215, PID: 1219, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.195189 762333 task_exit.go:204] [ 1215: 1215] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.195391 762333 task_signals.go:204] [ 1215: 1216] Signal 1215, PID: 1216, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.195496 762333 task_exit.go:204] [ 1215: 1218] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.195696 762333 task_signals.go:204] [ 1215: 1217] Signal 1215, PID: 1217, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.195853 762333 task_exit.go:204] [ 1215: 1219] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.196419 762333 task_exit.go:204] [ 1215: 1217] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.196700 762333 task_exit.go:204] [ 1215: 1216] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.197472 762333 task_exit.go:204] [ 1215: 1219] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.197586 762333 task_exit.go:204] [ 1215: 1219] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.197870 762333 task_exit.go:204] [ 1215: 1217] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.197970 762333 task_exit.go:204] [ 1215: 1217] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.198248 762333 task_exit.go:204] [ 1215: 1218] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.198330 762333 task_exit.go:204] [ 1215: 1218] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.223264 762333 task_exit.go:204] [ 1215: 1216] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.223354 762333 task_exit.go:204] [ 1215: 1216] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.223570 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:44.224124 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:44.224299 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:44.226569 762333 task_exit.go:204] [ 1215: 1215] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.234534 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:44.234753 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:44.258560 762333 syscalls.go:262] [ 1220: 1220] Allocating stack with size of 8388608 bytes D0713 00:00:44.261625 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:44.262609 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:44.267203 762333 usertrap_amd64.go:212] [ 1220: 1220] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:44.267409 762333 usertrap_amd64.go:106] [ 1220: 1220] Map a usertrap vma at 67000 D0713 00:00:44.268329 762333 usertrap_amd64.go:122] [ 1220: 1220] Allocate a new trap: 0xc000049b30 1 D0713 00:00:44.268634 762333 usertrap_amd64.go:225] [ 1220: 1220] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:44.272767 762333 usertrap_amd64.go:212] [ 1220: 1220] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:44.272837 762333 usertrap_amd64.go:122] [ 1220: 1220] Allocate a new trap: 0xc000049b30 2 D0713 00:00:44.273052 762333 usertrap_amd64.go:225] [ 1220: 1220] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:44.280134 762333 usertrap_amd64.go:212] [ 1220: 1220] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:44.280250 762333 usertrap_amd64.go:122] [ 1220: 1220] Allocate a new trap: 0xc000049b30 3 D0713 00:00:44.280452 762333 usertrap_amd64.go:225] [ 1220: 1220] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:44.314397 762333 usertrap_amd64.go:212] [ 1220: 1220] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:44.314518 762333 usertrap_amd64.go:122] [ 1220: 1220] Allocate a new trap: 0xc000049b30 4 D0713 00:00:44.314701 762333 usertrap_amd64.go:225] [ 1220: 1220] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:44.319549 762333 usertrap_amd64.go:212] [ 1220: 1220] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:44.319644 762333 usertrap_amd64.go:122] [ 1220: 1220] Allocate a new trap: 0xc000049b30 5 D0713 00:00:44.319819 762333 usertrap_amd64.go:225] [ 1220: 1220] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:44.320296 762333 usertrap_amd64.go:212] [ 1220: 1220] Found the pattern at ip 46b214:sysno 13 D0713 00:00:44.320363 762333 usertrap_amd64.go:122] [ 1220: 1220] Allocate a new trap: 0xc000049b30 6 D0713 00:00:44.320539 762333 usertrap_amd64.go:225] [ 1220: 1220] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:44.339867 762333 usertrap_amd64.go:212] [ 1220: 1220] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:44.339961 762333 usertrap_amd64.go:122] [ 1220: 1220] Allocate a new trap: 0xc000049b30 7 D0713 00:00:44.340116 762333 usertrap_amd64.go:225] [ 1220: 1220] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:44.341765 762333 usertrap_amd64.go:212] [ 1220: 1221] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:44.341902 762333 usertrap_amd64.go:122] [ 1220: 1221] Allocate a new trap: 0xc000049b30 8 D0713 00:00:44.342153 762333 usertrap_amd64.go:225] [ 1220: 1221] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:44.344746 762333 usertrap_amd64.go:212] [ 1220: 1221] Found the pattern at ip 46af76:sysno 35 D0713 00:00:44.344821 762333 usertrap_amd64.go:122] [ 1220: 1221] Allocate a new trap: 0xc000049b30 9 D0713 00:00:44.345967 762333 usertrap_amd64.go:225] [ 1220: 1221] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:44.346476 762333 usertrap_amd64.go:212] [ 1220: 1220] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:44.346547 762333 usertrap_amd64.go:122] [ 1220: 1220] Allocate a new trap: 0xc000049b30 10 D0713 00:00:44.346815 762333 usertrap_amd64.go:225] [ 1220: 1220] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:44.360754 762333 usertrap_amd64.go:212] [ 1220: 1221] Found the pattern at ip 46b020:sysno 39 D0713 00:00:44.360870 762333 usertrap_amd64.go:122] [ 1220: 1221] Allocate a new trap: 0xc000049b30 11 D0713 00:00:44.361156 762333 usertrap_amd64.go:225] [ 1220: 1221] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:44.361708 762333 usertrap_amd64.go:212] [ 1220: 1221] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:44.361772 762333 usertrap_amd64.go:122] [ 1220: 1221] Allocate a new trap: 0xc000049b30 12 D0713 00:00:44.362011 762333 usertrap_amd64.go:225] [ 1220: 1221] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:44.363136 762333 task_signals.go:470] [ 1220: 1220] Notified of signal 23 D0713 00:00:44.363416 762333 task_signals.go:220] [ 1220: 1220] Signal 23: delivering to handler D0713 00:00:44.375274 762333 usertrap_amd64.go:212] [ 1220: 1220] Found the pattern at ip 46af29:sysno 293 D0713 00:00:44.375342 762333 usertrap_amd64.go:122] [ 1220: 1220] Allocate a new trap: 0xc000049b30 13 D0713 00:00:44.375486 762333 usertrap_amd64.go:225] [ 1220: 1220] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:44.376563 762333 task_signals.go:470] [ 1220: 1220] Notified of signal 23 D0713 00:00:44.376918 762333 task_signals.go:179] [ 1220: 1220] Restarting syscall 202: interrupted by signal 23 D0713 00:00:44.377021 762333 task_signals.go:220] [ 1220: 1220] Signal 23: delivering to handler D0713 00:00:44.395369 762333 task_signals.go:470] [ 1220: 1220] Notified of signal 23 D0713 00:00:44.396851 762333 task_signals.go:220] [ 1220: 1220] Signal 23: delivering to handler D0713 00:00:44.405104 762333 usertrap_amd64.go:212] [ 1220: 1220] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:44.405331 762333 usertrap_amd64.go:122] [ 1220: 1220] Allocate a new trap: 0xc000049b30 14 D0713 00:00:44.405569 762333 usertrap_amd64.go:225] [ 1220: 1220] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:44.406288 762333 task_exit.go:204] [ 1220: 1220] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.406495 762333 task_signals.go:204] [ 1220: 1224] Signal 1220, PID: 1224, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.406698 762333 task_signals.go:204] [ 1220: 1225] Signal 1220, PID: 1225, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.406994 762333 task_signals.go:204] [ 1220: 1223] Signal 1220, PID: 1223, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.407235 762333 task_signals.go:204] [ 1220: 1221] Signal 1220, PID: 1221, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.407483 762333 task_signals.go:204] [ 1220: 1222] Signal 1220, PID: 1222, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.407583 762333 task_exit.go:204] [ 1220: 1220] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.407708 762333 task_exit.go:204] [ 1220: 1224] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.408002 762333 task_exit.go:204] [ 1220: 1224] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.408058 762333 task_exit.go:204] [ 1220: 1224] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.408236 762333 task_exit.go:204] [ 1220: 1225] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.408536 762333 task_exit.go:204] [ 1220: 1225] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.408590 762333 task_exit.go:204] [ 1220: 1225] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.408711 762333 task_exit.go:204] [ 1220: 1223] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.409012 762333 task_exit.go:204] [ 1220: 1223] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.409082 762333 task_exit.go:204] [ 1220: 1223] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.409229 762333 task_exit.go:204] [ 1220: 1221] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.409498 762333 task_exit.go:204] [ 1220: 1221] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.409544 762333 task_exit.go:204] [ 1220: 1221] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.409692 762333 task_exit.go:204] [ 1220: 1222] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.433548 762333 task_exit.go:204] [ 1220: 1222] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.433644 762333 task_exit.go:204] [ 1220: 1222] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.433846 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:44.434095 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:44.434152 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:44.438046 762333 task_exit.go:204] [ 1220: 1220] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.446679 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:44.447476 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:44.468832 762333 syscalls.go:262] [ 1226: 1226] Allocating stack with size of 8388608 bytes D0713 00:00:44.471921 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:44.472563 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:44.476253 762333 usertrap_amd64.go:212] [ 1226: 1226] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:44.476490 762333 usertrap_amd64.go:106] [ 1226: 1226] Map a usertrap vma at 61000 D0713 00:00:44.477574 762333 usertrap_amd64.go:122] [ 1226: 1226] Allocate a new trap: 0xc00298e3c0 1 D0713 00:00:44.477914 762333 usertrap_amd64.go:225] [ 1226: 1226] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:44.480141 762333 usertrap_amd64.go:212] [ 1226: 1226] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:44.480230 762333 usertrap_amd64.go:122] [ 1226: 1226] Allocate a new trap: 0xc00298e3c0 2 D0713 00:00:44.480386 762333 usertrap_amd64.go:225] [ 1226: 1226] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:44.483130 762333 usertrap_amd64.go:212] [ 1226: 1226] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:44.483184 762333 usertrap_amd64.go:122] [ 1226: 1226] Allocate a new trap: 0xc00298e3c0 3 D0713 00:00:44.483302 762333 usertrap_amd64.go:225] [ 1226: 1226] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:44.516166 762333 usertrap_amd64.go:212] [ 1226: 1226] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:44.516259 762333 usertrap_amd64.go:122] [ 1226: 1226] Allocate a new trap: 0xc00298e3c0 4 D0713 00:00:44.516440 762333 usertrap_amd64.go:225] [ 1226: 1226] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:44.519501 762333 usertrap_amd64.go:212] [ 1226: 1226] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:44.519589 762333 usertrap_amd64.go:122] [ 1226: 1226] Allocate a new trap: 0xc00298e3c0 5 D0713 00:00:44.519699 762333 usertrap_amd64.go:225] [ 1226: 1226] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:44.520069 762333 usertrap_amd64.go:212] [ 1226: 1226] Found the pattern at ip 46b214:sysno 13 D0713 00:00:44.520106 762333 usertrap_amd64.go:122] [ 1226: 1226] Allocate a new trap: 0xc00298e3c0 6 D0713 00:00:44.520206 762333 usertrap_amd64.go:225] [ 1226: 1226] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:44.543870 762333 usertrap_amd64.go:212] [ 1226: 1226] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:44.543972 762333 usertrap_amd64.go:122] [ 1226: 1226] Allocate a new trap: 0xc00298e3c0 7 D0713 00:00:44.544132 762333 usertrap_amd64.go:225] [ 1226: 1226] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:44.545917 762333 usertrap_amd64.go:212] [ 1226: 1227] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:44.546022 762333 usertrap_amd64.go:122] [ 1226: 1227] Allocate a new trap: 0xc00298e3c0 8 D0713 00:00:44.546204 762333 usertrap_amd64.go:225] [ 1226: 1227] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:44.547980 762333 usertrap_amd64.go:212] [ 1226: 1227] Found the pattern at ip 46af76:sysno 35 D0713 00:00:44.548052 762333 usertrap_amd64.go:122] [ 1226: 1227] Allocate a new trap: 0xc00298e3c0 9 D0713 00:00:44.548214 762333 usertrap_amd64.go:225] [ 1226: 1227] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:44.551307 762333 usertrap_amd64.go:212] [ 1226: 1226] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:44.551387 762333 usertrap_amd64.go:122] [ 1226: 1226] Allocate a new trap: 0xc00298e3c0 10 D0713 00:00:44.551730 762333 usertrap_amd64.go:225] [ 1226: 1226] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:44.564050 762333 usertrap_amd64.go:212] [ 1226: 1227] Found the pattern at ip 46b020:sysno 39 D0713 00:00:44.564177 762333 usertrap_amd64.go:122] [ 1226: 1227] Allocate a new trap: 0xc00298e3c0 11 D0713 00:00:44.564401 762333 usertrap_amd64.go:225] [ 1226: 1227] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:44.565331 762333 usertrap_amd64.go:212] [ 1226: 1227] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:44.565447 762333 usertrap_amd64.go:122] [ 1226: 1227] Allocate a new trap: 0xc00298e3c0 12 D0713 00:00:44.565683 762333 usertrap_amd64.go:225] [ 1226: 1227] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:44.566325 762333 task_signals.go:470] [ 1226: 1226] Notified of signal 23 D0713 00:00:44.567641 762333 task_signals.go:220] [ 1226: 1226] Signal 23: delivering to handler D0713 00:00:44.581657 762333 usertrap_amd64.go:212] [ 1226: 1226] Found the pattern at ip 46af29:sysno 293 D0713 00:00:44.581778 762333 usertrap_amd64.go:122] [ 1226: 1226] Allocate a new trap: 0xc00298e3c0 13 D0713 00:00:44.581996 762333 usertrap_amd64.go:225] [ 1226: 1226] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:44.583175 762333 task_signals.go:470] [ 1226: 1226] Notified of signal 23 D0713 00:00:44.583409 762333 task_signals.go:220] [ 1226: 1226] Signal 23: delivering to handler D0713 00:00:44.600507 762333 task_signals.go:470] [ 1226: 1226] Notified of signal 23 D0713 00:00:44.602093 762333 task_signals.go:220] [ 1226: 1226] Signal 23: delivering to handler D0713 00:00:44.611948 762333 usertrap_amd64.go:212] [ 1226: 1226] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:44.612044 762333 usertrap_amd64.go:122] [ 1226: 1226] Allocate a new trap: 0xc00298e3c0 14 D0713 00:00:44.612249 762333 usertrap_amd64.go:225] [ 1226: 1226] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:44.617147 762333 task_exit.go:204] [ 1226: 1226] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.617943 762333 task_signals.go:204] [ 1226: 1229] Signal 1226, PID: 1229, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.618185 762333 task_signals.go:204] [ 1226: 1227] Signal 1226, PID: 1227, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.618312 762333 task_signals.go:204] [ 1226: 1228] Signal 1226, PID: 1228, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.618466 762333 task_signals.go:204] [ 1226: 1230] Signal 1226, PID: 1230, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.618492 762333 task_exit.go:204] [ 1226: 1226] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.618612 762333 task_exit.go:204] [ 1226: 1230] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.618740 762333 task_exit.go:204] [ 1226: 1227] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.619134 762333 task_exit.go:204] [ 1226: 1227] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.619198 762333 task_exit.go:204] [ 1226: 1227] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.619391 762333 task_exit.go:204] [ 1226: 1228] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.619850 762333 task_exit.go:204] [ 1226: 1228] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.619951 762333 task_exit.go:204] [ 1226: 1228] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.620180 762333 task_exit.go:204] [ 1226: 1229] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.620561 762333 task_exit.go:204] [ 1226: 1229] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.620618 762333 task_exit.go:204] [ 1226: 1229] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.645006 762333 task_exit.go:204] [ 1226: 1230] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.645164 762333 task_exit.go:204] [ 1226: 1230] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.645524 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:44.645979 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:44.646083 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:44.648060 762333 task_exit.go:204] [ 1226: 1226] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.656115 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:44.656894 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:44.678554 762333 syscalls.go:262] [ 1231: 1231] Allocating stack with size of 8388608 bytes D0713 00:00:44.681293 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:44.681870 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:44.688066 762333 usertrap_amd64.go:212] [ 1231: 1231] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:44.688203 762333 usertrap_amd64.go:106] [ 1231: 1231] Map a usertrap vma at 62000 D0713 00:00:44.688999 762333 usertrap_amd64.go:122] [ 1231: 1231] Allocate a new trap: 0xc00051f3e0 1 D0713 00:00:44.689338 762333 usertrap_amd64.go:225] [ 1231: 1231] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:44.691149 762333 usertrap_amd64.go:212] [ 1231: 1231] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:44.691202 762333 usertrap_amd64.go:122] [ 1231: 1231] Allocate a new trap: 0xc00051f3e0 2 D0713 00:00:44.691315 762333 usertrap_amd64.go:225] [ 1231: 1231] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:44.694186 762333 usertrap_amd64.go:212] [ 1231: 1231] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:44.694252 762333 usertrap_amd64.go:122] [ 1231: 1231] Allocate a new trap: 0xc00051f3e0 3 D0713 00:00:44.694411 762333 usertrap_amd64.go:225] [ 1231: 1231] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:44.716093 762333 usertrap_amd64.go:212] [ 1231: 1231] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:44.716272 762333 usertrap_amd64.go:122] [ 1231: 1231] Allocate a new trap: 0xc00051f3e0 4 D0713 00:00:44.716456 762333 usertrap_amd64.go:225] [ 1231: 1231] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:44.719810 762333 usertrap_amd64.go:212] [ 1231: 1231] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:44.719943 762333 usertrap_amd64.go:122] [ 1231: 1231] Allocate a new trap: 0xc00051f3e0 5 D0713 00:00:44.720132 762333 usertrap_amd64.go:225] [ 1231: 1231] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:44.720654 762333 usertrap_amd64.go:212] [ 1231: 1231] Found the pattern at ip 46b214:sysno 13 D0713 00:00:44.720722 762333 usertrap_amd64.go:122] [ 1231: 1231] Allocate a new trap: 0xc00051f3e0 6 D0713 00:00:44.720883 762333 usertrap_amd64.go:225] [ 1231: 1231] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:44.742266 762333 usertrap_amd64.go:212] [ 1231: 1231] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:44.742388 762333 usertrap_amd64.go:122] [ 1231: 1231] Allocate a new trap: 0xc00051f3e0 7 D0713 00:00:44.742547 762333 usertrap_amd64.go:225] [ 1231: 1231] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:44.744243 762333 usertrap_amd64.go:212] [ 1231: 1232] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:44.744344 762333 usertrap_amd64.go:122] [ 1231: 1232] Allocate a new trap: 0xc00051f3e0 8 D0713 00:00:44.744583 762333 usertrap_amd64.go:225] [ 1231: 1232] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:44.746730 762333 usertrap_amd64.go:212] [ 1231: 1232] Found the pattern at ip 46af76:sysno 35 D0713 00:00:44.746802 762333 usertrap_amd64.go:122] [ 1231: 1232] Allocate a new trap: 0xc00051f3e0 9 D0713 00:00:44.747049 762333 usertrap_amd64.go:225] [ 1231: 1232] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:44.747943 762333 usertrap_amd64.go:212] [ 1231: 1231] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:44.748034 762333 usertrap_amd64.go:122] [ 1231: 1231] Allocate a new trap: 0xc00051f3e0 10 D0713 00:00:44.748204 762333 usertrap_amd64.go:225] [ 1231: 1231] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:44.750107 762333 usertrap_amd64.go:212] [ 1231: 1234] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:44.750175 762333 usertrap_amd64.go:122] [ 1231: 1234] Allocate a new trap: 0xc00051f3e0 11 D0713 00:00:44.750342 762333 usertrap_amd64.go:225] [ 1231: 1234] Apply the binary patch addr 46b6e0 trap addr 62370 ([184 24 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:44.762217 762333 usertrap_amd64.go:212] [ 1231: 1232] Found the pattern at ip 46b020:sysno 39 D0713 00:00:44.762289 762333 usertrap_amd64.go:122] [ 1231: 1232] Allocate a new trap: 0xc00051f3e0 12 D0713 00:00:44.762442 762333 usertrap_amd64.go:225] [ 1231: 1232] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:44.762873 762333 usertrap_amd64.go:212] [ 1231: 1232] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:44.762926 762333 usertrap_amd64.go:122] [ 1231: 1232] Allocate a new trap: 0xc00051f3e0 13 D0713 00:00:44.763110 762333 usertrap_amd64.go:225] [ 1231: 1232] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:44.763512 762333 task_signals.go:470] [ 1231: 1231] Notified of signal 23 D0713 00:00:44.765332 762333 task_signals.go:220] [ 1231: 1231] Signal 23: delivering to handler D0713 00:00:44.766656 762333 task_signals.go:481] [ 1231: 1231] No task notified of signal 23 D0713 00:00:44.766924 762333 task_signals.go:220] [ 1231: 1231] Signal 23: delivering to handler D0713 00:00:44.768090 762333 task_signals.go:470] [ 1231: 1231] Notified of signal 23 D0713 00:00:44.768292 762333 task_signals.go:220] [ 1231: 1231] Signal 23: delivering to handler D0713 00:00:44.779228 762333 usertrap_amd64.go:212] [ 1231: 1231] Found the pattern at ip 46af29:sysno 293 D0713 00:00:44.779302 762333 usertrap_amd64.go:122] [ 1231: 1231] Allocate a new trap: 0xc00051f3e0 14 D0713 00:00:44.779454 762333 usertrap_amd64.go:225] [ 1231: 1231] Apply the binary patch addr 46af29 trap addr 62460 ([184 37 1 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:44.786231 762333 task_signals.go:470] [ 1231: 1231] Notified of signal 23 D0713 00:00:44.787829 762333 task_signals.go:220] [ 1231: 1231] Signal 23: delivering to handler D0713 00:00:44.803572 762333 usertrap_amd64.go:212] [ 1231: 1231] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:44.803674 762333 usertrap_amd64.go:122] [ 1231: 1231] Allocate a new trap: 0xc00051f3e0 15 D0713 00:00:44.803859 762333 usertrap_amd64.go:225] [ 1231: 1231] Apply the binary patch addr 46ae44 trap addr 624b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 36 6 0]) D0713 00:00:44.804374 762333 task_exit.go:204] [ 1231: 1231] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.804883 762333 task_signals.go:204] [ 1231: 1234] Signal 1231, PID: 1234, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.805097 762333 task_signals.go:204] [ 1231: 1233] Signal 1231, PID: 1233, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.805202 762333 task_exit.go:204] [ 1231: 1231] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.805341 762333 task_signals.go:204] [ 1231: 1232] Signal 1231, PID: 1232, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.805466 762333 task_exit.go:204] [ 1231: 1234] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.805828 762333 task_signals.go:204] [ 1231: 1236] Signal 1231, PID: 1236, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.805863 762333 task_exit.go:204] [ 1231: 1233] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.806056 762333 task_signals.go:204] [ 1231: 1235] Signal 1231, PID: 1235, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.806156 762333 task_exit.go:204] [ 1231: 1236] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.806376 762333 task_exit.go:204] [ 1231: 1235] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.806511 762333 task_exit.go:204] [ 1231: 1232] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.807321 762333 task_exit.go:204] [ 1231: 1236] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.807386 762333 task_exit.go:204] [ 1231: 1236] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.807669 762333 task_exit.go:204] [ 1231: 1232] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.807728 762333 task_exit.go:204] [ 1231: 1232] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.808030 762333 task_exit.go:204] [ 1231: 1234] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.808106 762333 task_exit.go:204] [ 1231: 1234] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.808292 762333 task_exit.go:204] [ 1231: 1233] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.808383 762333 task_exit.go:204] [ 1231: 1233] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.833079 762333 task_exit.go:204] [ 1231: 1235] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.833249 762333 task_exit.go:204] [ 1231: 1235] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.833508 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:44.833826 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:44.833945 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:44.835901 762333 task_exit.go:204] [ 1231: 1231] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.843362 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:44.843765 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:44.861595 762333 syscalls.go:262] [ 1237: 1237] Allocating stack with size of 8388608 bytes D0713 00:00:44.864637 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:44.865305 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:44.868487 762333 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:44.868666 762333 usertrap_amd64.go:106] [ 1237: 1237] Map a usertrap vma at 62000 D0713 00:00:44.869429 762333 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000a42b70 1 D0713 00:00:44.869701 762333 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:44.871327 762333 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:44.871443 762333 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000a42b70 2 D0713 00:00:44.871602 762333 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:44.874214 762333 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:44.874277 762333 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000a42b70 3 D0713 00:00:44.874435 762333 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:44.896773 762333 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:44.896876 762333 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000a42b70 4 D0713 00:00:44.897066 762333 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:44.899573 762333 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:44.899638 762333 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000a42b70 5 D0713 00:00:44.899847 762333 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:44.900283 762333 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46b214:sysno 13 D0713 00:00:44.900348 762333 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000a42b70 6 D0713 00:00:44.900499 762333 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:44.920666 762333 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:44.920760 762333 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000a42b70 7 D0713 00:00:44.920912 762333 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:44.922764 762333 usertrap_amd64.go:212] [ 1237: 1238] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:44.922855 762333 usertrap_amd64.go:122] [ 1237: 1238] Allocate a new trap: 0xc000a42b70 8 D0713 00:00:44.923068 762333 usertrap_amd64.go:225] [ 1237: 1238] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:44.924749 762333 usertrap_amd64.go:212] [ 1237: 1238] Found the pattern at ip 46af76:sysno 35 D0713 00:00:44.924827 762333 usertrap_amd64.go:122] [ 1237: 1238] Allocate a new trap: 0xc000a42b70 9 D0713 00:00:44.925066 762333 usertrap_amd64.go:225] [ 1237: 1238] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:44.925779 762333 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:44.925863 762333 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000a42b70 10 D0713 00:00:44.926609 762333 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:44.938822 762333 usertrap_amd64.go:212] [ 1237: 1238] Found the pattern at ip 46b020:sysno 39 D0713 00:00:44.938894 762333 usertrap_amd64.go:122] [ 1237: 1238] Allocate a new trap: 0xc000a42b70 11 D0713 00:00:44.939489 762333 usertrap_amd64.go:225] [ 1237: 1238] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:44.939886 762333 usertrap_amd64.go:212] [ 1237: 1238] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:44.939947 762333 usertrap_amd64.go:122] [ 1237: 1238] Allocate a new trap: 0xc000a42b70 12 D0713 00:00:44.940133 762333 usertrap_amd64.go:225] [ 1237: 1238] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:44.940662 762333 task_signals.go:470] [ 1237: 1237] Notified of signal 23 D0713 00:00:44.940931 762333 task_signals.go:220] [ 1237: 1237] Signal 23: delivering to handler D0713 00:00:44.947288 762333 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46af29:sysno 293 D0713 00:00:44.947375 762333 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000a42b70 13 D0713 00:00:44.947566 762333 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:44.952093 762333 task_signals.go:470] [ 1237: 1237] Notified of signal 23 D0713 00:00:44.952321 762333 task_signals.go:220] [ 1237: 1237] Signal 23: delivering to handler D0713 00:00:44.969460 762333 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:44.969542 762333 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000a42b70 14 D0713 00:00:44.969700 762333 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:44.970153 762333 task_exit.go:204] [ 1237: 1237] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.970406 762333 task_signals.go:204] [ 1237: 1238] Signal 1237, PID: 1238, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.970714 762333 task_signals.go:204] [ 1237: 1240] Signal 1237, PID: 1240, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.970746 762333 task_signals.go:204] [ 1237: 1241] Signal 1237, PID: 1241, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.970765 762333 task_signals.go:204] [ 1237: 1239] Signal 1237, PID: 1239, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:44.970950 762333 task_exit.go:204] [ 1237: 1238] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.971243 762333 task_exit.go:204] [ 1237: 1240] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.971898 762333 task_exit.go:204] [ 1237: 1240] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.971986 762333 task_exit.go:204] [ 1237: 1240] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.972246 762333 task_exit.go:204] [ 1237: 1239] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.972628 762333 task_exit.go:204] [ 1237: 1237] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.972762 762333 task_exit.go:204] [ 1237: 1241] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:44.972831 762333 task_exit.go:204] [ 1237: 1238] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.972881 762333 task_exit.go:204] [ 1237: 1238] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.973198 762333 task_exit.go:204] [ 1237: 1239] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.973298 762333 task_exit.go:204] [ 1237: 1239] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.994848 762333 task_exit.go:204] [ 1237: 1241] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:44.994941 762333 task_exit.go:204] [ 1237: 1241] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:44.995184 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:44.995481 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:44.995561 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:44.997008 762333 task_exit.go:204] [ 1237: 1237] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:45.003296 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:45.005578 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:45.023060 762333 syscalls.go:262] [ 1242: 1242] Allocating stack with size of 8388608 bytes D0713 00:00:45.025729 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:45.026261 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:45.030034 762333 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:45.030198 762333 usertrap_amd64.go:106] [ 1242: 1242] Map a usertrap vma at 69000 D0713 00:00:45.030844 762333 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc00298e780 1 D0713 00:00:45.031059 762333 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:45.034769 762333 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:45.034927 762333 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc00298e780 2 D0713 00:00:45.035189 762333 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:45.039041 762333 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:45.039236 762333 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc00298e780 3 D0713 00:00:45.039531 762333 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:45.091420 762333 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:45.091508 762333 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc00298e780 4 D0713 00:00:45.091691 762333 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:45.094753 762333 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:45.094827 762333 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc00298e780 5 D0713 00:00:45.094983 762333 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:45.095904 762333 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46b214:sysno 13 D0713 00:00:45.096052 762333 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc00298e780 6 D0713 00:00:45.096284 762333 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:45.119188 762333 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:45.119275 762333 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc00298e780 7 D0713 00:00:45.119407 762333 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:45.121306 762333 usertrap_amd64.go:212] [ 1242: 1243] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:45.121379 762333 usertrap_amd64.go:122] [ 1242: 1243] Allocate a new trap: 0xc00298e780 8 D0713 00:00:45.121619 762333 usertrap_amd64.go:225] [ 1242: 1243] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:45.124487 762333 usertrap_amd64.go:212] [ 1242: 1243] Found the pattern at ip 46af76:sysno 35 D0713 00:00:45.124564 762333 usertrap_amd64.go:122] [ 1242: 1243] Allocate a new trap: 0xc00298e780 9 D0713 00:00:45.125614 762333 usertrap_amd64.go:225] [ 1242: 1243] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:45.125938 762333 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:45.125992 762333 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc00298e780 10 D0713 00:00:45.126192 762333 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:45.139050 762333 usertrap_amd64.go:212] [ 1242: 1243] Found the pattern at ip 46b020:sysno 39 D0713 00:00:45.139140 762333 usertrap_amd64.go:122] [ 1242: 1243] Allocate a new trap: 0xc00298e780 11 D0713 00:00:45.139320 762333 usertrap_amd64.go:225] [ 1242: 1243] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:45.141362 762333 usertrap_amd64.go:212] [ 1242: 1243] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:45.141455 762333 usertrap_amd64.go:122] [ 1242: 1243] Allocate a new trap: 0xc00298e780 12 D0713 00:00:45.141656 762333 usertrap_amd64.go:225] [ 1242: 1243] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:45.142200 762333 task_signals.go:470] [ 1242: 1242] Notified of signal 23 D0713 00:00:45.142474 762333 task_signals.go:220] [ 1242: 1242] Signal 23: delivering to handler D0713 00:00:45.149111 762333 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46af29:sysno 293 D0713 00:00:45.149194 762333 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc00298e780 13 D0713 00:00:45.149360 762333 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:45.154066 762333 task_signals.go:470] [ 1242: 1242] Notified of signal 23 D0713 00:00:45.156753 762333 task_signals.go:220] [ 1242: 1242] Signal 23: delivering to handler D0713 00:00:45.171502 762333 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:45.171594 762333 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc00298e780 14 D0713 00:00:45.171786 762333 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:45.171929 762333 task_signals.go:470] [ 1242: 1242] Notified of signal 23 D0713 00:00:45.172111 762333 task_signals.go:220] [ 1242: 1242] Signal 23: delivering to handler D0713 00:00:45.175094 762333 task_exit.go:204] [ 1242: 1242] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:45.175571 762333 task_exit.go:204] [ 1242: 1242] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:45.175942 762333 task_signals.go:204] [ 1242: 1244] Signal 1242, PID: 1244, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:45.176017 762333 task_signals.go:204] [ 1242: 1246] Signal 1242, PID: 1246, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:45.176196 762333 task_exit.go:204] [ 1242: 1244] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:45.176648 762333 task_signals.go:204] [ 1242: 1243] Signal 1242, PID: 1243, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:45.176896 762333 task_exit.go:204] [ 1242: 1244] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:45.177103 762333 task_exit.go:204] [ 1242: 1244] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:45.177398 762333 task_exit.go:204] [ 1242: 1246] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:45.177574 762333 task_signals.go:204] [ 1242: 1245] Signal 1242, PID: 1245, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:45.177737 762333 task_exit.go:204] [ 1242: 1243] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:45.178153 762333 task_exit.go:204] [ 1242: 1243] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:45.178224 762333 task_exit.go:204] [ 1242: 1243] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:45.178716 762333 task_exit.go:204] [ 1242: 1246] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:45.178777 762333 task_exit.go:204] [ 1242: 1246] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:45.178920 762333 task_exit.go:204] [ 1242: 1245] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:45.202068 762333 task_exit.go:204] [ 1242: 1245] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:45.202210 762333 task_exit.go:204] [ 1242: 1245] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:45.202509 762333 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:45.202893 762333 task_signals.go:179] [ 6: 6] Restarting syscall 247: interrupted by signal 17 D0713 00:00:45.202982 762333 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:45.205500 762333 task_exit.go:204] [ 1242: 1242] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:45.213351 762333 task_stop.go:118] [ 6: 6] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:45.213518 762333 task_signals.go:481] [ 6: 6] No task notified of signal 23 D0713 00:00:45.232483 762333 syscalls.go:262] [ 1247: 1247] Allocating stack with size of 8388608 bytes D0713 00:00:45.235203 762333 task_stop.go:138] [ 6: 6] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:45.235806 762333 task_signals.go:220] [ 6: 6] Signal 23: delivering to handler D0713 00:00:45.240013 762333 usertrap_amd64.go:212] [ 1247: 1247] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:45.240209 762333 usertrap_amd64.go:106] [ 1247: 1247] Map a usertrap vma at 6a000 D0713 00:00:45.241244 762333 usertrap_amd64.go:122] [ 1247: 1247] Allocate a new trap: 0xc00298ec00 1 D0713 00:00:45.241585 762333 usertrap_amd64.go:225] [ 1247: 1247] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:45.243893 762333 usertrap_amd64.go:212] [ 1247: 1247] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:45.243964 762333 usertrap_amd64.go:122] [ 1247: 1247] Allocate a new trap: 0xc00298ec00 2 D0713 00:00:45.244133 762333 usertrap_amd64.go:225] [ 1247: 1247] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:45.247240 762333 usertrap_amd64.go:212] [ 1247: 1247] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:45.247310 762333 usertrap_amd64.go:122] [ 1247: 1247] Allocate a new trap: 0xc00298ec00 3 D0713 00:00:45.247480 762333 usertrap_amd64.go:225] [ 1247: 1247] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:45.269647 762333 usertrap_amd64.go:212] [ 1247: 1247] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:45.269767 762333 usertrap_amd64.go:122] [ 1247: 1247] Allocate a new trap: 0xc00298ec00 4 D0713 00:00:45.270004 762333 usertrap_amd64.go:225] [ 1247: 1247] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:45.273834 762333 usertrap_amd64.go:212] [ 1247: 1247] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:45.273904 762333 usertrap_amd64.go:122] [ 1247: 1247] Allocate a new trap: 0xc00298ec00 5 D0713 00:00:45.274085 762333 usertrap_amd64.go:225] [ 1247: 1247] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:45.274537 762333 usertrap_amd64.go:212] [ 1247: 1247] Found the pattern at ip 46b214:sysno 13 D0713 00:00:45.274609 762333 usertrap_amd64.go:122] [ 1247: 1247] Allocate a new trap: 0xc00298ec00 6 D0713 00:00:45.274761 762333 usertrap_amd64.go:225] [ 1247: 1247] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:45.299171 762333 usertrap_amd64.go:212] [ 1247: 1247] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:45.299244 762333 usertrap_amd64.go:122] [ 1247: 1247] Allocate a new trap: 0xc00298ec00 7 D0713 00:00:45.299383 762333 usertrap_amd64.go:225] [ 1247: 1247] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:45.301244 762333 usertrap_amd64.go:212] [ 1247: 1248] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:45.301316 762333 usertrap_amd64.go:122] [ 1247: 1248] Allocate a new trap: 0xc00298ec00 8 D0713 00:00:45.301527 762333 usertrap_amd64.go:225] [ 1247: 1248] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:45.303438 762333 usertrap_amd64.go:212] [ 1247: 1248] Found the pattern at ip 46af76:sysno 35 D0713 00:00:45.303507 762333 usertrap_amd64.go:122] [ 1247: 1248] Allocate a new trap: 0xc00298ec00 9 D0713 00:00:45.303689 762333 usertrap_amd64.go:225] [ 1247: 1248] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:45.305822 762333 usertrap_amd64.go:212] [ 1247: 1247] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:45.305940 762333 usertrap_amd64.go:122] [ 1247: 1247] Allocate a new trap: 0xc00298ec00 10 D0713 00:00:45.306163 762333 usertrap_amd64.go:225] [ 1247: 1247] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:45.308489 762333 usertrap_amd64.go:212] [ 1247: 1248] Found the pattern at ip 46b020:sysno 39 D0713 00:00:45.308573 762333 usertrap_amd64.go:122] [ 1247: 1248] Allocate a new trap: 0xc00298ec00 11 D0713 00:00:45.308972 762333 usertrap_amd64.go:225] [ 1247: 1248] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:45.309610 762333 usertrap_amd64.go:212] [ 1247: 1248] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:45.309707 762333 usertrap_amd64.go:122] [ 1247: 1248] Allocate a new trap: 0xc00298ec00 12 D0713 00:00:45.309886 762333 usertrap_amd64.go:225] [ 1247: 1248] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:45.311256 762333 task_signals.go:470] [ 1247: 1250] Notified of signal 23 D0713 00:00:45.311567 762333 task_signals.go:179] [ 1247: 1250] Restarting syscall 202: interrupted by signal 23 D0713 00:00:45.311636 762333 task_signals.go:220] [ 1247: 1250] Signal 23: delivering to handler D0713 00:00:45.322847 762333 task_signals.go:470] [ 1247: 1247] Notified of signal 23 D0713 00:00:45.323267 762333 task_signals.go:220] [ 1247: 1247] Signal 23: delivering to handler D0713 00:00:45.324460 762333 task_signals.go:470] [ 1247: 1247] Notified of signal 23 D0713 00:00:45.324677 762333 task_signals.go:220] [ 1247: 1247] Signal 23: delivering to handler D0713 00:00:45.331105 762333 usertrap_amd64.go:212] [ 1247: 1247] Found the pattern at ip 46af29:sysno 293 D0713 00:00:45.331193 762333 usertrap_amd64.go:122] [ 1247: 1247] Allocate a new trap: 0xc00298ec00 13 D0713 00:00:45.331385 762333 usertrap_amd64.go:225] [ 1247: 1247] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:45.337259 762333 task_signals.go:470] [ 1247: 1247] Notified of signal 23 D0713 00:00:45.339261 762333 task_signals.go:220] [ 1247: 1247] Signal 23: delivering to handler D0713 00:00:45.353668 762333 task_signals.go:470] [ 1247: 1247] Notified of signal 23 D0713 00:00:45.353848 762333 task_signals.go:220] [ 1247: 1247] Signal 23: delivering to handler D0713 00:00:45.355512 762333 task_signals.go:309] [ 1247: 1247] failed to restore from a signal frame: bad address D0713 00:00:45.355689 762333 task_signals.go:470] [ 1247: 1247] Notified of signal 11 D0713 00:00:45.355815 762333 task_signals.go:220] [ 1247: 1247] Signal 11: delivering to handler W0713 00:00:45.460562 762462 util.go:64] FATAL ERROR: waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-race-cover-test-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-race-cover-test-0": urpc method "containerManager.WaitPID" failed: EOF W0713 00:00:45.460913 762462 main.go:274] Failure to execute command, err: 1 D0713 00:00:45.476984 1 connection.go:127] sock read failed, closing connection: EOF W0713 00:00:45.477023 762305 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-race-cover-test-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. I0713 00:00:45.477353 1 gofer.go:319] All lisafs servers exited. I0713 00:00:45.477432 1 main.go:265] Exiting with status: 0 D0713 00:00:45.478208 762305 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-race-cover-test-0 D0713 00:00:45.478371 762305 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-race-cover-test-0 D0713 00:00:45.478412 762305 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-race-cover-test-0 D0713 00:00:45.478473 762305 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.478581 762305 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-race-cover-test-0, PID: 762331 D0713 00:00:45.488120 762305 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.488288 762305 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.488444 762305 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.488529 762305 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.488747 762305 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.488869 762305 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.489134 762305 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.489277 762305 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.489425 762305 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.489526 762305 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.489648 762305 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.489743 762305 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.489840 762305 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-race-cover-test-0" D0713 00:00:45.489898 762305 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-race-cover-test-0" I0713 00:00:45.490512 762305 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0713 00:00:45.653728 764245 main.go:230] *************************** I0713 00:00:45.653809 764245 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-cover-test-0] I0713 00:00:45.653861 764245 main.go:232] Version 0.0.0 I0713 00:00:45.653899 764245 main.go:233] GOOS: linux I0713 00:00:45.653962 764245 main.go:234] GOARCH: amd64 I0713 00:00:45.654025 764245 main.go:235] PID: 764245 I0713 00:00:45.654071 764245 main.go:236] UID: 0, GID: 0 I0713 00:00:45.654118 764245 main.go:237] Configuration: I0713 00:00:45.654173 764245 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root I0713 00:00:45.654212 764245 main.go:239] Platform: systrap I0713 00:00:45.654289 764245 main.go:240] FileAccess: shared I0713 00:00:45.654383 764245 main.go:241] Directfs: true I0713 00:00:45.654434 764245 main.go:242] Overlay: none I0713 00:00:45.654507 764245 main.go:243] Network: sandbox, logging: false I0713 00:00:45.654575 764245 main.go:244] Strace: false, max size: 1024, syscalls: I0713 00:00:45.654628 764245 main.go:245] IOURING: false I0713 00:00:45.654685 764245 main.go:246] Debug: true I0713 00:00:45.654734 764245 main.go:247] Systemd: false I0713 00:00:45.654781 764245 main.go:248] *************************** W0713 00:00:45.654857 764245 main.go:253] Block the TERM signal. This is only safe in tests! D0713 00:00:45.655003 764245 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-cover-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 00:00:45.655340 764245 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-cover-test-0": file does not exist loading container "ci-gvisor-systrap-1-race-cover-test-0": file does not exist W0713 00:00:45.655767 764245 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-cover-test-0"]: exit status 128 I0713 00:00:45.653728 764245 main.go:230] *************************** I0713 00:00:45.653809 764245 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-cover-test-0] I0713 00:00:45.653861 764245 main.go:232] Version 0.0.0 I0713 00:00:45.653899 764245 main.go:233] GOOS: linux I0713 00:00:45.653962 764245 main.go:234] GOARCH: amd64 I0713 00:00:45.654025 764245 main.go:235] PID: 764245 I0713 00:00:45.654071 764245 main.go:236] UID: 0, GID: 0 I0713 00:00:45.654118 764245 main.go:237] Configuration: I0713 00:00:45.654173 764245 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root I0713 00:00:45.654212 764245 main.go:239] Platform: systrap I0713 00:00:45.654289 764245 main.go:240] FileAccess: shared I0713 00:00:45.654383 764245 main.go:241] Directfs: true I0713 00:00:45.654434 764245 main.go:242] Overlay: none I0713 00:00:45.654507 764245 main.go:243] Network: sandbox, logging: false I0713 00:00:45.654575 764245 main.go:244] Strace: false, max size: 1024, syscalls: I0713 00:00:45.654628 764245 main.go:245] IOURING: false I0713 00:00:45.654685 764245 main.go:246] Debug: true I0713 00:00:45.654734 764245 main.go:247] Systemd: false I0713 00:00:45.654781 764245 main.go:248] *************************** W0713 00:00:45.654857 764245 main.go:253] Block the TERM signal. This is only safe in tests! D0713 00:00:45.655003 764245 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-cover-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 00:00:45.655340 764245 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-cover-test-0": file does not exist loading container "ci-gvisor-systrap-1-race-cover-test-0": file does not exist W0713 00:00:45.655767 764245 main.go:274] Failure to execute command, err: 1 [11530660.299243] exe[360483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.334869] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.427124] exe[342702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.530670] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.552515] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530664.410846] warn_bad_vsyscall: 191 callbacks suppressed [11530664.410850] exe[347076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.517388] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.614182] exe[343158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.693391] exe[346626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.880133] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530665.104198] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.164041] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.189874] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.263975] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.325499] exe[343333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11531647.091724] warn_bad_vsyscall: 119 callbacks suppressed [11531647.091728] exe[342711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.193212] exe[342712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.268456] exe[342979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.288424] exe[342975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.308161] exe[342944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.334261] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.355824] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.376295] exe[342993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.396210] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.417266] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11532345.155341] warn_bad_vsyscall: 25 callbacks suppressed [11532345.155345] exe[382188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.269530] exe[382766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.386757] exe[382474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532767.935456] exe[384598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.011945] exe[342758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.091418] exe[363806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11534667.144948] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.236329] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.267961] exe[403010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.372458] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.408027] exe[400419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534894.914638] exe[383063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beadbee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.957554] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.977138] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.997745] exe[383054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.019118] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.038723] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.059007] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.079097] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.098979] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.118890] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11535893.406581] warn_bad_vsyscall: 25 callbacks suppressed [11535893.406585] exe[518174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.458729] exe[498396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.521164] exe[517163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.575499] exe[517648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11536070.313225] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.380260] exe[515339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.442300] exe[515436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.505325] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536370.456183] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.586537] exe[514004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53fbc858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.694198] exe[527281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.737448] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11537650.136338] exe[430654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537650.412774] exe[548543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537651.379743] exe[544871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11539350.089743] exe[592292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fee1a62839 cs:33 sp:7f3bb8f66858 ax:0 si:55fee1abb062 di:ffffffffff600000 [11539649.231607] exe[597310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.290920] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.347494] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539977.040247] exe[600851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622cbba1839 cs:33 sp:7ef62f826858 ax:0 si:5622cbbfa070 di:ffffffffff600000 [11540511.026519] exe[600753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605abe9b839 cs:33 sp:7ea0b2c49858 ax:0 si:5605abef4062 di:ffffffffff600000 [11540577.627218] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.675057] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.720870] exe[580996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb450858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11541137.236749] exe[631001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8df4a8839 cs:33 sp:7ec367e7b858 ax:0 si:55d8df501070 di:ffffffffff600000 [11541804.084586] exe[636938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.009172] exe[573192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.193016] exe[624964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11542822.267208] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.447533] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.599315] exe[608247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.654857] exe[608085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff2b858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542974.046947] exe[681952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11542975.617308] exe[681959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdb6b73839 cs:33 sp:7ea1e721f858 ax:0 si:55bdb6bcc070 di:ffffffffff600000 [11543003.003275] exe[680745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f039ea839 cs:33 sp:7f52e9f8c858 ax:0 si:560f03a43070 di:ffffffffff600000 [11543004.857028] exe[674098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11543241.124326] exe[653510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543241.246077] exe[670164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543242.057149] exe[665681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543265.859323] exe[669905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.014563] exe[673318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.109923] exe[655556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.226266] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.340307] exe[666615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.438645] exe[653578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.550820] exe[653447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.639930] exe[668546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543527.564952] exe[682036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85dfee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.843021] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.872086] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.901814] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.928287] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.960260] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.001419] exe[686062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.037270] exe[686072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.072724] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.101714] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11544123.311129] warn_bad_vsyscall: 43 callbacks suppressed [11544123.311132] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.485832] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.545188] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.727586] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544124.057735] exe[696402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.305506] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.507382] exe[669629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.623230] exe[695057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.735692] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.863236] exe[665545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544128.352152] warn_bad_vsyscall: 20 callbacks suppressed [11544128.352155] exe[671775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544128.511425] exe[696712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.375128] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.536371] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.698008] exe[653586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.893888] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.031510] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.130359] exe[673044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.235880] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.352844] exe[672186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.353612] warn_bad_vsyscall: 24 callbacks suppressed [11544133.353615] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.473154] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.609419] exe[668533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.901016] exe[696718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.174452] exe[666489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.475583] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.623602] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.772637] exe[696477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.888566] exe[670834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.988750] exe[697893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544138.414937] warn_bad_vsyscall: 63 callbacks suppressed [11544138.414941] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.523964] exe[680995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.625852] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.629193] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.773793] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.889988] exe[671086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.995711] exe[656008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.279460] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.285732] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.852350] exe[702011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.530343] warn_bad_vsyscall: 21 callbacks suppressed [11544143.530346] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.650402] exe[651695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.841742] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.870995] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.902268] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.948343] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.989607] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.024048] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.054902] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.087224] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544148.632017] warn_bad_vsyscall: 172 callbacks suppressed [11544148.632020] exe[669150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.794259] exe[668957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.989109] exe[668900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.994476] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.214390] exe[700441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.375421] exe[677325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.743745] exe[651266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.292722] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.474228] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.637207] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544153.658144] warn_bad_vsyscall: 27 callbacks suppressed [11544153.658148] exe[653423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.777426] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.903906] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.947438] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.109460] exe[660365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.158525] exe[653490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.258820] exe[651422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.391447] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.603018] exe[653409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.651409] exe[653440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544158.817051] warn_bad_vsyscall: 88 callbacks suppressed [11544158.817054] exe[694623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.075950] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.301459] exe[696410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.392503] exe[694615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.536699] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.643218] exe[693490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.745653] exe[687494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.834437] exe[669163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544159.940422] exe[693510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544160.043187] exe[673283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.101141] warn_bad_vsyscall: 21 callbacks suppressed [11544164.101144] exe[668876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.241344] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.416813] exe[696415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.572347] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.661162] exe[700444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.764040] exe[665928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.860384] exe[665956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.967054] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.069729] exe[696446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.167820] exe[667801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.171621] warn_bad_vsyscall: 29 callbacks suppressed [11544169.171624] exe[666533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.209223] exe[694404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.345652] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.449276] exe[666863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.579999] exe[652022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.628929] exe[681862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.748025] exe[694768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.754710] exe[651361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544170.115853] exe[695045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544170.211267] exe[694614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544487.006009] warn_bad_vsyscall: 7 callbacks suppressed [11544487.006013] exe[698657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56475d423839 cs:33 sp:7f017362b858 ax:0 si:56475d47c070 di:ffffffffff600000 [11544487.270484] exe[700399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563181efe839 cs:33 sp:7ebe85da1858 ax:0 si:563181f57070 di:ffffffffff600000 [11544511.054844] exe[643613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55671700d839 cs:33 sp:7fda3ebc7858 ax:0 si:556717066070 di:ffffffffff600000 [11544534.538680] exe[711402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650b2e68839 cs:33 sp:7ed2418f9858 ax:0 si:5650b2ec1070 di:ffffffffff600000 [11544541.236335] exe[714082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec31b7839 cs:33 sp:7f29fcf9d858 ax:0 si:563ec3210070 di:ffffffffff600000 [11544549.596877] exe[709232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85df858 ax:0 si:55f2a8264070 di:ffffffffff600000 [11544550.342713] exe[712067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd4032839 cs:33 sp:7fe3bd6b3858 ax:0 si:564cd408b070 di:ffffffffff600000 [11544636.437853] exe[540397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df21791839 cs:33 sp:7f199a286858 ax:0 si:55df217ea070 di:ffffffffff600000 [11544650.761105] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.648325] exe[680729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.692536] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.806399] exe[654057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544684.382904] exe[599414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f284d4839 cs:33 sp:7f961e482858 ax:0 si:556f2852d070 di:ffffffffff600000 [11544687.601444] exe[605347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557bb1bb839 cs:33 sp:7eccd13f5858 ax:0 si:5557bb214070 di:ffffffffff600000 [11545051.986254] exe[681960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11545064.270053] exe[698660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b51fb0839 cs:33 sp:7f9c7caaf858 ax:0 si:560b52009070 di:ffffffffff600000 [11545068.988305] exe[688573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564928b3b839 cs:33 sp:7ff955622858 ax:0 si:564928b94070 di:ffffffffff600000 [11545109.002939] exe[700093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11545257.023788] exe[699969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858858 ax:0 si:56468e7be070 di:ffffffffff600000 [11545310.043985] exe[730419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079858 ax:0 si:559d6ffcd070 di:ffffffffff600000 [11545747.024880] exe[668885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.207869] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.208393] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.369587] exe[698981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.086072] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.276578] exe[655585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.440844] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.661991] exe[651380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.864051] exe[691659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.032545] exe[669495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.180256] exe[668971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.327971] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.464233] exe[653467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.608138] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.724053] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.821867] exe[673278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545752.940728] exe[695059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.257832] exe[690707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.288251] exe[694599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.081142] warn_bad_vsyscall: 180 callbacks suppressed [11545757.081146] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.214468] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.680818] exe[660360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545757.976248] exe[669152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.152711] exe[673009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db06858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.411760] exe[666512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.527446] exe[666632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.650734] exe[670178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.653643] exe[696363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.792891] exe[666858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.314186] warn_bad_vsyscall: 20 callbacks suppressed [11545762.314189] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.467684] exe[670066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.649946] exe[673641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.943504] exe[660379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.043408] exe[669128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.327908] exe[669526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.366578] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.522288] exe[669522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.352902] exe[696365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.927217] exe[668856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.329883] warn_bad_vsyscall: 19 callbacks suppressed [11545767.329886] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.356567] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.513570] exe[697884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.562772] exe[670199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.711961] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.846666] exe[673281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.887751] exe[673284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.020071] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.057366] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.194079] exe[677299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545895.545245] warn_bad_vsyscall: 20 callbacks suppressed [11545895.545249] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.697993] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.785536] exe[721585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c837ee8 ax:0 si:200001c0 di:ffffffffff600000 [11546263.751083] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.760352] exe[750487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cd5eee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.909919] exe[733995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546785.957834] exe[722877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546786.864503] exe[719747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546787.823769] exe[718998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11547088.502200] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.547606] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.594335] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.508654] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.559999] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.608707] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.659695] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.718362] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.781423] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.831867] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.888097] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.977889] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547100.030632] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547104.513495] warn_bad_vsyscall: 291 callbacks suppressed [11547104.513499] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.539086] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.559309] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.578791] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.599547] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.620080] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.640504] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.659820] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.679561] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.700181] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547109.524219] warn_bad_vsyscall: 177 callbacks suppressed [11547109.524223] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.571444] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.623374] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.666991] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.687953] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.739406] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.781901] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.828639] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.849421] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.897272] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.703281] warn_bad_vsyscall: 176 callbacks suppressed [11547226.703285] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.750753] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.799595] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.236010] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.275452] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.317150] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.312120] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.354274] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.397972] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.426494] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.481647] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.534048] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547286.183628] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.224975] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.249969] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.292623] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547292.084095] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.127160] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.168264] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.584508] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.638463] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.658311] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.678417] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.699893] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.719994] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.740570] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.761543] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.782276] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.803395] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.755488] warn_bad_vsyscall: 32 callbacks suppressed [11547304.755491] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.820801] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.870285] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547305.231833] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.080890] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.932040] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.868022] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.927403] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.983135] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547309.035076] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.512279] warn_bad_vsyscall: 3 callbacks suppressed [11547312.512283] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.573549] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.593042] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.613765] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.634451] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.654831] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.674844] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.695789] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.716034] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.735650] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.072811] warn_bad_vsyscall: 25 callbacks suppressed [11547323.072814] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.126130] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.168909] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.169422] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.577119] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.618137] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.659742] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.430811] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.470418] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.471364] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.540794] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.575387] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.234296] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.287869] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.341084] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.150024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.197367] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.613691] warn_bad_vsyscall: 1 callbacks suppressed [11547359.613695] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.673012] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.722811] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.747468] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.889779] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.945222] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.980565] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547371.026574] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547381.799394] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.864307] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.906009] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.933118] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547384.896734] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547384.942724] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547385.004823] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547394.986983] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.029433] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.072479] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.899409] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.945764] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.998894] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547402.412281] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.457209] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.458646] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539688] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539824] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547414.727517] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.524355] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.575392] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.624984] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.681183] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.722741] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.761925] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.879392] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.921135] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.960705] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.692664] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.746736] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.780646] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.157398] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.227524] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.267610] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.241019] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.314637] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.354549] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.400116] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.441352] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.461983] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.499263] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.711900] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.766945] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.815670] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.678890] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.727877] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.747719] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.767929] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.788113] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.807588] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.826881] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.107205] warn_bad_vsyscall: 63 callbacks suppressed [11547478.107208] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.164816] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.204636] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.384520] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.441631] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.483337] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.658315] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547498.516799] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.368994] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.390429] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.411047] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.430939] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.452865] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.945209] warn_bad_vsyscall: 28 callbacks suppressed [11547504.945212] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.998022] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547505.038001] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.867524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.912298] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.955068] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.977045] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547536.142402] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.183582] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.217323] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.569508] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.614546] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.663836] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547538.951959] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.000244] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.081981] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.997217] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.887928] warn_bad_vsyscall: 69 callbacks suppressed [11547564.887932] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.979509] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.178943] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.229576] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.296841] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.055098] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.108833] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.156638] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.185291] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.306678] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.358066] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.406256] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.036059] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.086889] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.108968] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.156744] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.880353] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.931926] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.953668] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.989459] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.559099] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.600969] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.648685] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.670795] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.298350] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.336522] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.375194] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547619.302393] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.356222] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.395199] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547628.124097] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.175121] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.195646] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.242715] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.055190] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.102818] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.146651] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.408345] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.450251] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.489444] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.515277] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.494419] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.543322] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.564399] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.602948] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.605910] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.679150] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.726624] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547662.729392] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.772014] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.817232] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547666.997387] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.036554] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.076179] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.948193] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.996557] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.038514] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.039086] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547673.715197] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.774874] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.796267] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.836633] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547696.173266] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.232828] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.255864] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.294590] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.314254] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.335246] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.355631] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.376818] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.396933] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.417149] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.297493] warn_bad_vsyscall: 65 callbacks suppressed [11547715.297496] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.351733] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.396006] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.417741] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.369570] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.412168] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.433703] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.476531] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.185928] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.229580] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.267114] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.034535] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.079956] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.081096] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.142656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.827814] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.871810] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.895490] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.935407] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.937018] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.115105] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.155340] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.179243] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.226345] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.556996] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.594141] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.641491] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.738092] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.785040] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.827300] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.849354] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.631390] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.672124] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.713813] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.715026] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.110481] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.167223] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.188945] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.209538] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.229116] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.248124] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547785.250849] warn_bad_vsyscall: 39 callbacks suppressed [11547785.250853] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.017175] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.058414] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.098809] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.452423] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.491354] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.530741] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.157406] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.405882] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.569025] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.689830] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.730995] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.770001] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.771515] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547812.197802] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.267933] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.268869] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547813.941768] warn_bad_vsyscall: 5 callbacks suppressed [11547813.941772] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547813.985351] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.023826] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.283366] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.373377] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.430322] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.428583] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.479106] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.517226] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547821.217341] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.304135] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.358901] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.381326] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.403008] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.917629] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547822.010021] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.374491] warn_bad_vsyscall: 6 callbacks suppressed [11547838.374495] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.433268] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.487754] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.517159] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.542981] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.594031] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.633861] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547847.990984] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.047899] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.090172] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.278529] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.318322] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.357865] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.656438] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.696366] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.730899] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547851.240037] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.042222] warn_bad_vsyscall: 2 callbacks suppressed [11547866.042225] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.098981] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.161778] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.079020] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.130030] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.184976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.225662] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.268419] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.320362] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.047221] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.096888] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.137370] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.386318] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.432437] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.486510] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547884.683356] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.762816] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.813991] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.189876] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.254562] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.293397] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547903.407887] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.447383] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.470252] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.506155] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.721533] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.782550] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.820577] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.096045] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.142337] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.161621] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547911.216020] warn_bad_vsyscall: 64 callbacks suppressed [11547911.216024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.267332] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.307191] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547912.057581] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.095772] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.097086] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.157993] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547913.388972] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.423889] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.465344] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547924.521450] warn_bad_vsyscall: 5 callbacks suppressed [11547924.521454] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.577796] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.602125] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.641611] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.133391] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.194823] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.197273] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.263427] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.418619] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.475719] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.543133] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.125423] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.228337] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.688513] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.730652] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.766521] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.807188] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.851432] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.871960] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.914064] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.259541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.337004] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.398917] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.978258] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.026688] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.029306] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.092103] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.100263] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.144346] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.174814] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.211169] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.832995] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.876208] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.898352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.934693] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.414771] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.456497] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.496767] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.291929] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.329604] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.369969] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.372328] warn_bad_vsyscall: 3 callbacks suppressed [11547989.372332] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.421337] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.465823] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.485942] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.841813] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.890432] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.943125] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.261522] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.301370] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.342764] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.299293] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.345532] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.381167] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.818109] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.874942] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.929681] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548017.498804] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.546061] exe[755951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.589351] exe[755959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.635935] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dfd5ee8 ax:0 si:20000680 di:ffffffffff600000 [11548019.396684] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.444824] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.480770] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.067924] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.105876] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.106597] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.730218] warn_bad_vsyscall: 5 callbacks suppressed [11548023.730221] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.775332] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.815656] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.219256] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.300235] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.347676] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.947538] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.999970] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.040895] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.069553] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.004537] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.049080] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.113890] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.137352] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548077.206282] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.251934] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.274716] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.295013] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.315325] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.336012] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.357843] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.377872] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.398283] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.418613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548097.528517] warn_bad_vsyscall: 57 callbacks suppressed [11548097.528521] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.576429] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.633295] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.634854] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.133965] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.176503] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.214588] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.215240] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.412752] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.462777] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548104.996660] warn_bad_vsyscall: 1 callbacks suppressed [11548104.996663] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548105.850076] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548106.696238] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.157724] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.208597] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.261372] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.343202] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.382779] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.426112] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.403368] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.452789] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.499910] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.417742] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.522190] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.936100] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.988256] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.016505] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.070003] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.445818] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.511715] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.553978] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.286390] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.334009] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.375931] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548175.546300] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.589700] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.629037] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.651488] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548179.585264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.631159] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.650585] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.670448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.691290] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.711967] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.732380] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.752068] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.772801] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.793448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.872059] warn_bad_vsyscall: 61 callbacks suppressed [11548193.872063] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.952821] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.928684] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.996448] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548202.037007] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.156027] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.196959] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.219143] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.258912] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.281350] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.546657] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.589787] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.627425] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.699725] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.745535] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.788742] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.471018] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.514946] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.515574] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.585099] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.038187] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.079907] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.127070] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.182158] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.221914] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.242963] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.281592] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.367833] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.410279] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.431732] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.485658] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.287473] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.328228] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.378594] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.674482] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.723577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.769676] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.411340] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.454118] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.496501] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.637682] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.680537] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.717881] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.175744] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.244740] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.289491] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.347827] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.386962] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.432610] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.452510] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.472049] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.493392] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.514001] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.534326] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.555439] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.575831] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.591661] warn_bad_vsyscall: 28 callbacks suppressed [11548299.591664] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.716645] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.218082] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.333278] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.369844] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602597.777330] audit: type=1326 audit(1689206344.991:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602603.869164] audit: type=1326 audit(1689206351.083:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754999 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.285215] audit: type=1326 audit(1689206425.499:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=755000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.677713] audit: type=1326 audit(1689206425.891:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602696.843980] audit: type=1326 audit(1689206444.055:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=753602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000