D0725 14:31:03.548359 75498 usertrap_amd64.go:122] [ 1: 6] Allocate a new trap: 0xc000480450 16 D0725 14:31:03.548422 75498 usertrap_amd64.go:225] [ 1: 6] Apply the binary patch addr 4717cd trap addr 67500 ([184 0 0 0 0 15 5] -> [255 36 37 0 117 6 0]) I0725 14:31:04.307021 75498 calibrated_clock.go:74] CalibratedClock(Monotonic): ready I0725 14:31:04.307155 75498 calibrated_clock.go:74] CalibratedClock(Realtime): ready D0725 14:31:06.306665 75498 sampler.go:191] Time: Adjusting syscall overhead down to 875 D0725 14:31:10.306406 75498 sampler.go:191] Time: Adjusting syscall overhead down to 875 D0725 14:31:26.307248 75498 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0725 14:31:26.307335 75498 sampler.go:191] Time: Adjusting syscall overhead down to 766 I0725 14:31:33.872278 80729 main.go:230] *************************** I0725 14:31:33.872352 80729 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot exec -user=0:0 -cap CAP_CHOWN -cap CAP_DAC_OVERRIDE -cap CAP_DAC_READ_SEARCH -cap CAP_FOWNER -cap CAP_FSETID -cap CAP_KILL -cap CAP_SETGID -cap CAP_SETUID -cap CAP_SETPCAP -cap CAP_LINUX_IMMUTABLE -cap CAP_NET_BIND_SERVICE -cap CAP_NET_BROADCAST -cap CAP_NET_ADMIN -cap CAP_NET_RAW -cap CAP_IPC_LOCK -cap CAP_IPC_OWNER -cap CAP_SYS_MODULE -cap CAP_SYS_RAWIO -cap CAP_SYS_CHROOT -cap CAP_SYS_PTRACE -cap CAP_SYS_PACCT -cap CAP_SYS_ADMIN -cap CAP_SYS_BOOT -cap CAP_SYS_NICE -cap CAP_SYS_RESOURCE -cap CAP_SYS_TIME -cap CAP_SYS_TTY_CONFIG -cap CAP_MKNOD -cap CAP_LEASE -cap CAP_AUDIT_WRITE -cap CAP_AUDIT_CONTROL -cap CAP_SETFCAP -cap CAP_MAC_OVERRIDE -cap CAP_MAC_ADMIN -cap CAP_SYSLOG -cap CAP_WAKE_ALARM -cap CAP_BLOCK_SUSPEND -cap CAP_AUDIT_READ ci-gvisor-systrap-1-race-0 /syz-executor2213305348] I0725 14:31:33.872455 80729 main.go:232] Version 0.0.0 I0725 14:31:33.872492 80729 main.go:233] GOOS: linux I0725 14:31:33.872523 80729 main.go:234] GOARCH: amd64 I0725 14:31:33.872550 80729 main.go:235] PID: 80729 I0725 14:31:33.872579 80729 main.go:236] UID: 0, GID: 0 I0725 14:31:33.872620 80729 main.go:237] Configuration: I0725 14:31:33.872641 80729 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0725 14:31:33.872674 80729 main.go:239] Platform: systrap I0725 14:31:33.872706 80729 main.go:240] FileAccess: shared I0725 14:31:33.872732 80729 main.go:241] Directfs: true I0725 14:31:33.872764 80729 main.go:242] Overlay: none I0725 14:31:33.872785 80729 main.go:243] Network: sandbox, logging: false I0725 14:31:33.872826 80729 main.go:244] Strace: false, max size: 1024, syscalls: I0725 14:31:33.872849 80729 main.go:245] IOURING: false I0725 14:31:33.872879 80729 main.go:246] Debug: true I0725 14:31:33.872899 80729 main.go:247] Systemd: false I0725 14:31:33.872925 80729 main.go:248] *************************** W0725 14:31:33.872945 80729 main.go:253] Block the TERM signal. This is only safe in tests! D0725 14:31:33.873097 80729 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:false TryLock:false RootContainer:false} D0725 14:31:33.878753 80729 container.go:653] Signal container, cid: ci-gvisor-systrap-1-race-0, signal: signal 0 (0) D0725 14:31:33.878848 80729 sandbox.go:1177] Signal sandbox "ci-gvisor-systrap-1-race-0" D0725 14:31:33.878892 80729 sandbox.go:603] Connecting to sandbox "ci-gvisor-systrap-1-race-0" D0725 14:31:33.879234 80729 urpc.go:568] urpc: successfully marshalled 106 bytes. D0725 14:31:33.879399 75498 urpc.go:611] urpc: unmarshal success. D0725 14:31:33.879809 75498 controller.go:619] containerManager.Signal: cid: ci-gvisor-systrap-1-race-0, PID: 0, signal: 0, mode: Process D0725 14:31:33.879971 75498 urpc.go:568] urpc: successfully marshalled 37 bytes. D0725 14:31:33.880104 80729 urpc.go:611] urpc: unmarshal success. D0725 14:31:33.880189 80729 exec.go:129] Exec arguments: /syz-executor2213305348 D0725 14:31:33.880231 80729 exec.go:130] Exec capabilities: &{PermittedCaps:274877906943 InheritableCaps:274877906943 EffectiveCaps:274877906943 BoundingCaps:274877906943 AmbientCaps:0} D0725 14:31:33.880294 80729 container.go:572] Execute in container, cid: ci-gvisor-systrap-1-race-0, args: /syz-executor2213305348 D0725 14:31:33.880334 80729 sandbox.go:552] Executing new process in container "ci-gvisor-systrap-1-race-0" in sandbox "ci-gvisor-systrap-1-race-0" D0725 14:31:33.880361 80729 sandbox.go:603] Connecting to sandbox "ci-gvisor-systrap-1-race-0" D0725 14:31:33.880818 80729 urpc.go:568] urpc: successfully marshalled 462 bytes. D0725 14:31:33.881001 75498 urpc.go:611] urpc: unmarshal success. D0725 14:31:33.881611 75498 controller.go:368] containerManager.ExecuteAsync, cid: ci-gvisor-systrap-1-race-0, args: /syz-executor2213305348 I0725 14:31:33.881923 75498 kernel.go:844] EXEC: [/syz-executor2213305348] D0725 14:31:33.883250 75498 syscalls.go:262] Allocating stack with size of 8388608 bytes D0725 14:31:33.883884 75498 loader.go:1125] updated processes: map[{ci-gvisor-systrap-1-race-0 0}:0xc00036c1b0 {ci-gvisor-systrap-1-race-0 7}:0xc0002bcff0] D0725 14:31:33.884033 75498 urpc.go:568] urpc: successfully marshalled 36 bytes. D0725 14:31:33.884117 80729 urpc.go:611] urpc: unmarshal success. D0725 14:31:33.884201 80729 container.go:641] Wait on process 7 in container, cid: ci-gvisor-systrap-1-race-0 D0725 14:31:33.884261 80729 sandbox.go:1131] Waiting for PID 7 in sandbox "ci-gvisor-systrap-1-race-0" D0725 14:31:33.884299 80729 sandbox.go:603] Connecting to sandbox "ci-gvisor-systrap-1-race-0" D0725 14:31:33.884442 80729 urpc.go:568] urpc: successfully marshalled 88 bytes. D0725 14:31:33.884569 75498 urpc.go:611] urpc: unmarshal success. D0725 14:31:33.884704 75498 controller.go:558] containerManager.Wait, cid: ci-gvisor-systrap-1-race-0, pid: 7 D0725 14:31:33.889207 75498 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558c2ef4ce33:sysno 218 D0725 14:31:33.889327 75498 usertrap_amd64.go:106] [ 7: 7] Map a usertrap vma at 64000 D0725 14:31:33.889495 75498 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0001fe000 1 D0725 14:31:33.889582 75498 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558c2ef4ce33 trap addr 64050 ([184 218 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0725 14:31:33.890314 75498 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558c2ef4cec6:sysno 334 D0725 14:31:33.890365 75498 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0001fe000 2 D0725 14:31:33.890410 75498 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558c2ef4cec6 trap addr 640a0 ([184 78 1 0 0 15 5] -> [255 36 37 160 64 6 0]) I0725 14:31:33.890554 75498 compat.go:120] Unsupported syscall rseq(0x558c2efcaca0,0x20,0x0,0x53053053,0x0,0x558c2ef96b08). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/rseq for more information. D0725 14:31:33.891483 75498 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558c2ef5cbc9:sysno 318 D0725 14:31:33.891525 75498 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0001fe000 3 D0725 14:31:33.891574 75498 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558c2ef5cbc9 trap addr 640f0 ([184 62 1 0 0 15 5] -> [255 36 37 240 64 6 0]) D0725 14:31:33.892390 75498 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558c2ef4a970:sysno 12 D0725 14:31:33.892428 75498 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0001fe000 4 D0725 14:31:33.892471 75498 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558c2ef4a970 trap addr 64140 ([184 12 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0725 14:31:33.893548 75498 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558c2ef4abf0:sysno 10 D0725 14:31:33.893587 75498 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0001fe000 5 D0725 14:31:33.893625 75498 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558c2ef4abf0 trap addr 64190 ([184 10 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0725 14:31:33.894150 75498 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558c2ef48bfc:sysno 56 D0725 14:31:33.894187 75498 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0001fe000 6 D0725 14:31:33.894225 75498 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558c2ef48bfc trap addr 641e0 ([184 56 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0725 14:31:33.914734 75498 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558c2ef4866c:sysno 61 D0725 14:31:33.914807 75498 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0001fe000 7 D0725 14:31:33.915070 75498 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558c2ef4866c trap addr 64230 ([184 61 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0725 14:31:33.916189 75498 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 558c2ef8446c:sysno 230 D0725 14:31:33.916251 75498 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0001fe000 8 D0725 14:31:33.916307 75498 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 558c2ef8446c trap addr 64280 ([184 230 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0725 14:31:33.916825 75498 usertrap_amd64.go:212] [ 8: 8] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:33.916894 75498 usertrap_amd64.go:122] [ 8: 8] Allocate a new trap: 0xc0002de000 7 D0725 14:31:33.917212 75498 usertrap_amd64.go:225] [ 8: 8] Apply the binary patch addr 558c2ef48c36 trap addr 64230 ([184 17 1 0 0 15 5] -> [255 36 37 48 66 6 0]) D0725 14:31:33.919258 75498 usertrap_amd64.go:212] [ 8: 8] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:33.919318 75498 usertrap_amd64.go:122] [ 8: 8] Allocate a new trap: 0xc0002de000 8 D0725 14:31:33.919409 75498 usertrap_amd64.go:225] [ 8: 8] Apply the binary patch addr 558c2ef4bdd6 trap addr 64280 ([184 157 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0725 14:31:33.920424 75498 usertrap_amd64.go:212] [ 8: 8] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:33.920467 75498 usertrap_amd64.go:122] [ 8: 8] Allocate a new trap: 0xc0002de000 9 D0725 14:31:33.920510 75498 usertrap_amd64.go:225] [ 8: 8] Apply the binary patch addr 558c2ef722d0 trap addr 642d0 ([184 109 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:33.921623 75498 usertrap_amd64.go:212] [ 8: 8] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:33.921680 75498 usertrap_amd64.go:122] [ 8: 8] Allocate a new trap: 0xc0002de000 10 D0725 14:31:33.921745 75498 usertrap_amd64.go:225] [ 8: 8] Apply the binary patch addr 558c2ef49bda trap addr 64320 ([184 1 1 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:33.926002 75498 usertrap_amd64.go:212] [ 8: 8] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:33.926055 75498 usertrap_amd64.go:122] [ 8: 8] Allocate a new trap: 0xc0002de000 11 D0725 14:31:33.926114 75498 usertrap_amd64.go:225] [ 8: 8] Apply the binary patch addr 558c2ef49d69 trap addr 64370 ([184 1 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:33.926364 75498 usertrap_amd64.go:212] [ 8: 8] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:33.926410 75498 usertrap_amd64.go:122] [ 8: 8] Allocate a new trap: 0xc0002de000 12 D0725 14:31:33.926460 75498 usertrap_amd64.go:225] [ 8: 8] Apply the binary patch addr 558c2ef49e39 trap addr 643c0 ([184 3 0 0 0 15 5] -> [255 36 37 192 67 6 0]) executing program D0725 14:31:33.947740 75498 task_signals.go:470] [ 9: 9] Notified of signal 56 D0725 14:31:33.950412 75498 task_signals.go:204] [ 9: 9] Signal 9, PID: 9, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:33.950527 75498 task_exit.go:204] [ 9: 9] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:33.951526 75498 task_exit.go:204] [ 8: 8] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:33.953669 75498 task_exit.go:204] [ 9: 9] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:33.954164 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:33.954257 75498 task_exit.go:204] [ 8: 8] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:33.954311 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:33.954415 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:33.954501 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:33.955352 75498 task_exit.go:204] [ 8: 8] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:33.960639 75498 usertrap_amd64.go:212] [ 10: 10] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:33.960735 75498 usertrap_amd64.go:122] [ 10: 10] Allocate a new trap: 0xc0002dea80 9 D0725 14:31:33.961028 75498 usertrap_amd64.go:225] [ 10: 10] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:33.962876 75498 usertrap_amd64.go:212] [ 10: 10] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:33.962927 75498 usertrap_amd64.go:122] [ 10: 10] Allocate a new trap: 0xc0002dea80 10 D0725 14:31:33.962981 75498 usertrap_amd64.go:225] [ 10: 10] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:33.964131 75498 usertrap_amd64.go:212] [ 10: 10] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:33.964177 75498 usertrap_amd64.go:122] [ 10: 10] Allocate a new trap: 0xc0002dea80 11 D0725 14:31:33.964221 75498 usertrap_amd64.go:225] [ 10: 10] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:33.965365 75498 usertrap_amd64.go:212] [ 10: 10] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:33.965417 75498 usertrap_amd64.go:122] [ 10: 10] Allocate a new trap: 0xc0002dea80 12 D0725 14:31:33.965465 75498 usertrap_amd64.go:225] [ 10: 10] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:33.966998 75498 usertrap_amd64.go:212] [ 10: 10] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:33.967042 75498 usertrap_amd64.go:122] [ 10: 10] Allocate a new trap: 0xc0002dea80 13 D0725 14:31:33.967095 75498 usertrap_amd64.go:225] [ 10: 10] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:33.967265 75498 usertrap_amd64.go:212] [ 10: 10] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:33.967335 75498 usertrap_amd64.go:122] [ 10: 10] Allocate a new trap: 0xc0002dea80 14 D0725 14:31:33.967406 75498 usertrap_amd64.go:225] [ 10: 10] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:33.990358 75498 task_signals.go:470] [ 11: 11] Notified of signal 56 D0725 14:31:33.990471 75498 task_signals.go:204] [ 11: 11] Signal 11, PID: 11, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:33.990614 75498 task_exit.go:204] [ 11: 11] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:33.992070 75498 task_exit.go:204] [ 11: 11] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:33.993227 75498 task_exit.go:204] [ 10: 10] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:33.995146 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:33.995224 75498 task_exit.go:204] [ 10: 10] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:33.995278 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:33.995498 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:33.995539 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.000244 75498 task_exit.go:204] [ 10: 10] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.008188 75498 usertrap_amd64.go:212] [ 12: 12] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.008249 75498 usertrap_amd64.go:122] [ 12: 12] Allocate a new trap: 0xc0002de090 9 D0725 14:31:34.011155 75498 usertrap_amd64.go:225] [ 12: 12] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.020478 75498 usertrap_amd64.go:212] [ 12: 12] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.020556 75498 usertrap_amd64.go:122] [ 12: 12] Allocate a new trap: 0xc0002de090 10 D0725 14:31:34.020605 75498 usertrap_amd64.go:225] [ 12: 12] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.021699 75498 usertrap_amd64.go:212] [ 12: 12] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.021749 75498 usertrap_amd64.go:122] [ 12: 12] Allocate a new trap: 0xc0002de090 11 D0725 14:31:34.021817 75498 usertrap_amd64.go:225] [ 12: 12] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.023152 75498 usertrap_amd64.go:212] [ 12: 12] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.023205 75498 usertrap_amd64.go:122] [ 12: 12] Allocate a new trap: 0xc0002de090 12 D0725 14:31:34.023248 75498 usertrap_amd64.go:225] [ 12: 12] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.024819 75498 usertrap_amd64.go:212] [ 12: 12] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.024871 75498 usertrap_amd64.go:122] [ 12: 12] Allocate a new trap: 0xc0002de090 13 D0725 14:31:34.024917 75498 usertrap_amd64.go:225] [ 12: 12] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.025088 75498 usertrap_amd64.go:212] [ 12: 12] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.025127 75498 usertrap_amd64.go:122] [ 12: 12] Allocate a new trap: 0xc0002de090 14 D0725 14:31:34.025169 75498 usertrap_amd64.go:225] [ 12: 12] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.045281 75498 task_signals.go:470] [ 13: 13] Notified of signal 56 D0725 14:31:34.045405 75498 task_signals.go:204] [ 13: 13] Signal 13, PID: 13, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.045498 75498 task_exit.go:204] [ 13: 13] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.047261 75498 task_exit.go:204] [ 13: 13] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.048125 75498 task_exit.go:204] [ 12: 12] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.050042 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.050110 75498 task_exit.go:204] [ 12: 12] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.050169 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.050163 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.050219 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.050241 75498 task_exit.go:204] [ 12: 12] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.052848 75498 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.052919 75498 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000480db0 9 D0725 14:31:34.053280 75498 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.055315 75498 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.055380 75498 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000480db0 10 D0725 14:31:34.055425 75498 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.056295 75498 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.056339 75498 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000480db0 11 D0725 14:31:34.056388 75498 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.057442 75498 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.057481 75498 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000480db0 12 D0725 14:31:34.057520 75498 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.059069 75498 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.059128 75498 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000480db0 13 D0725 14:31:34.059180 75498 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.059377 75498 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.059433 75498 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000480db0 14 D0725 14:31:34.059494 75498 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.083843 75498 task_signals.go:470] [ 15: 15] Notified of signal 56 D0725 14:31:34.083991 75498 task_signals.go:204] [ 15: 15] Signal 15, PID: 15, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.084097 75498 task_exit.go:204] [ 15: 15] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.085482 75498 task_exit.go:204] [ 15: 15] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.086250 75498 task_exit.go:204] [ 14: 14] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.087870 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.087944 75498 task_exit.go:204] [ 14: 14] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.088003 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.088016 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.088111 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.088104 75498 task_exit.go:204] [ 14: 14] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.091534 75498 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.091594 75498 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc0003c89f0 9 D0725 14:31:34.091968 75498 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.094185 75498 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.094235 75498 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc0003c89f0 10 D0725 14:31:34.094280 75498 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.095174 75498 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.095230 75498 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc0003c89f0 11 D0725 14:31:34.095271 75498 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.096314 75498 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.096354 75498 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc0003c89f0 12 D0725 14:31:34.096394 75498 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.097868 75498 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.097909 75498 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc0003c89f0 13 D0725 14:31:34.097950 75498 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.098103 75498 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.098146 75498 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc0003c89f0 14 D0725 14:31:34.098184 75498 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.121278 75498 task_signals.go:470] [ 17: 17] Notified of signal 56 D0725 14:31:34.121422 75498 task_signals.go:204] [ 17: 17] Signal 17, PID: 17, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.121536 75498 task_exit.go:204] [ 17: 17] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.123056 75498 task_exit.go:204] [ 17: 17] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.124345 75498 task_exit.go:204] [ 16: 16] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.126497 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.126581 75498 task_exit.go:204] [ 16: 16] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.126642 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.126674 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.126827 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.127301 75498 task_exit.go:204] [ 16: 16] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.129898 75498 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.129964 75498 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000048240 9 D0725 14:31:34.130266 75498 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.132507 75498 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.132558 75498 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000048240 10 D0725 14:31:34.132615 75498 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.133522 75498 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.133568 75498 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000048240 11 D0725 14:31:34.133622 75498 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.134616 75498 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.134666 75498 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000048240 12 D0725 14:31:34.134715 75498 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.136264 75498 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.136315 75498 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000048240 13 D0725 14:31:34.136384 75498 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.136621 75498 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.136686 75498 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000048240 14 D0725 14:31:34.136731 75498 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.158023 75498 task_signals.go:470] [ 19: 19] Notified of signal 56 D0725 14:31:34.158125 75498 task_signals.go:204] [ 19: 19] Signal 19, PID: 19, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.158214 75498 task_exit.go:204] [ 19: 19] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.159969 75498 task_exit.go:204] [ 19: 19] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.160831 75498 task_exit.go:204] [ 18: 18] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.162795 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.162878 75498 task_exit.go:204] [ 18: 18] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.162950 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.163019 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.163086 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.163539 75498 task_exit.go:204] [ 18: 18] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.168288 75498 usertrap_amd64.go:212] [ 20: 20] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.168376 75498 usertrap_amd64.go:122] [ 20: 20] Allocate a new trap: 0xc000480480 9 D0725 14:31:34.168782 75498 usertrap_amd64.go:225] [ 20: 20] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.171062 75498 usertrap_amd64.go:212] [ 20: 20] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.171126 75498 usertrap_amd64.go:122] [ 20: 20] Allocate a new trap: 0xc000480480 10 D0725 14:31:34.171230 75498 usertrap_amd64.go:225] [ 20: 20] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.172304 75498 usertrap_amd64.go:212] [ 20: 20] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.172349 75498 usertrap_amd64.go:122] [ 20: 20] Allocate a new trap: 0xc000480480 11 D0725 14:31:34.172403 75498 usertrap_amd64.go:225] [ 20: 20] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.173492 75498 usertrap_amd64.go:212] [ 20: 20] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.173534 75498 usertrap_amd64.go:122] [ 20: 20] Allocate a new trap: 0xc000480480 12 D0725 14:31:34.173596 75498 usertrap_amd64.go:225] [ 20: 20] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.175219 75498 usertrap_amd64.go:212] [ 20: 20] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.175277 75498 usertrap_amd64.go:122] [ 20: 20] Allocate a new trap: 0xc000480480 13 D0725 14:31:34.175333 75498 usertrap_amd64.go:225] [ 20: 20] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.175522 75498 usertrap_amd64.go:212] [ 20: 20] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.175567 75498 usertrap_amd64.go:122] [ 20: 20] Allocate a new trap: 0xc000480480 14 D0725 14:31:34.175627 75498 usertrap_amd64.go:225] [ 20: 20] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.197302 75498 task_signals.go:470] [ 21: 21] Notified of signal 56 D0725 14:31:34.197500 75498 task_signals.go:204] [ 21: 21] Signal 21, PID: 21, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.197595 75498 task_exit.go:204] [ 21: 21] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.199034 75498 task_exit.go:204] [ 21: 21] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.199428 75498 task_exit.go:204] [ 20: 20] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.201025 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.201084 75498 task_exit.go:204] [ 20: 20] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.201142 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.201152 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.201192 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.201240 75498 task_exit.go:204] [ 20: 20] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.203703 75498 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.203774 75498 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc000048420 9 D0725 14:31:34.204081 75498 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.206101 75498 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.206145 75498 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc000048420 10 D0725 14:31:34.206195 75498 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.207067 75498 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.207108 75498 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc000048420 11 D0725 14:31:34.207147 75498 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.208103 75498 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.208153 75498 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc000048420 12 D0725 14:31:34.208200 75498 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.209614 75498 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.209659 75498 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc000048420 13 D0725 14:31:34.209699 75498 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.209848 75498 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.209884 75498 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc000048420 14 D0725 14:31:34.209931 75498 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.229998 75498 task_signals.go:470] [ 23: 23] Notified of signal 56 D0725 14:31:34.230130 75498 task_signals.go:204] [ 23: 23] Signal 23, PID: 23, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.230211 75498 task_exit.go:204] [ 23: 23] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.231731 75498 task_exit.go:204] [ 23: 23] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.232733 75498 task_exit.go:204] [ 22: 22] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.234609 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.234675 75498 task_exit.go:204] [ 22: 22] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.234730 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.234782 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.234801 75498 task_exit.go:204] [ 22: 22] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.234820 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.237256 75498 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.237334 75498 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0002e4810 9 D0725 14:31:34.237668 75498 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.239517 75498 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.239557 75498 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0002e4810 10 D0725 14:31:34.239622 75498 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.240343 75498 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.240383 75498 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0002e4810 11 D0725 14:31:34.240442 75498 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.241371 75498 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.241409 75498 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0002e4810 12 D0725 14:31:34.241457 75498 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.242934 75498 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.242997 75498 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0002e4810 13 D0725 14:31:34.243066 75498 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.243221 75498 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.243278 75498 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0002e4810 14 D0725 14:31:34.243320 75498 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.267576 75498 task_signals.go:470] [ 25: 25] Notified of signal 56 D0725 14:31:34.267830 75498 task_signals.go:204] [ 25: 25] Signal 25, PID: 25, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.267951 75498 task_exit.go:204] [ 25: 25] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.269764 75498 task_exit.go:204] [ 25: 25] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.269962 75498 task_exit.go:204] [ 24: 24] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.271904 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.271978 75498 task_exit.go:204] [ 24: 24] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.272044 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.272076 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.272153 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.272424 75498 task_exit.go:204] [ 24: 24] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.275886 75498 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.275947 75498 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0002e4030 9 D0725 14:31:34.276252 75498 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.278102 75498 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.278152 75498 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0002e4030 10 D0725 14:31:34.278203 75498 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.279268 75498 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.279341 75498 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0002e4030 11 D0725 14:31:34.279413 75498 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.280642 75498 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.280704 75498 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0002e4030 12 D0725 14:31:34.280748 75498 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.282341 75498 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.282382 75498 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0002e4030 13 D0725 14:31:34.282431 75498 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.282587 75498 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.282619 75498 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0002e4030 14 D0725 14:31:34.282658 75498 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.302762 75498 task_signals.go:470] [ 27: 27] Notified of signal 56 D0725 14:31:34.302863 75498 task_signals.go:204] [ 27: 27] Signal 27, PID: 27, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.302931 75498 task_exit.go:204] [ 27: 27] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.304309 75498 task_exit.go:204] [ 27: 27] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.305615 75498 task_exit.go:204] [ 26: 26] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.307590 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.307720 75498 task_exit.go:204] [ 26: 26] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.307789 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.307876 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.307934 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.308535 75498 task_exit.go:204] [ 26: 26] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.311358 75498 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.311424 75498 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0002de150 9 D0725 14:31:34.311759 75498 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.313896 75498 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.313938 75498 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0002de150 10 D0725 14:31:34.313989 75498 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.314962 75498 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.315018 75498 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0002de150 11 D0725 14:31:34.315067 75498 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.316142 75498 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.316182 75498 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0002de150 12 D0725 14:31:34.316223 75498 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.317807 75498 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.317862 75498 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0002de150 13 D0725 14:31:34.317904 75498 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.318100 75498 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.318151 75498 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0002de150 14 D0725 14:31:34.318195 75498 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.339972 75498 task_signals.go:470] [ 29: 29] Notified of signal 56 D0725 14:31:34.340092 75498 task_signals.go:204] [ 29: 29] Signal 29, PID: 29, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.340157 75498 task_exit.go:204] [ 29: 29] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.341591 75498 task_exit.go:204] [ 29: 29] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.342298 75498 task_exit.go:204] [ 28: 28] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.343996 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.344076 75498 task_exit.go:204] [ 28: 28] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.344119 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.344222 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.344284 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.344977 75498 task_exit.go:204] [ 28: 28] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.347474 75498 usertrap_amd64.go:212] [ 30: 30] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.347552 75498 usertrap_amd64.go:122] [ 30: 30] Allocate a new trap: 0xc0000482a0 9 D0725 14:31:34.347949 75498 usertrap_amd64.go:225] [ 30: 30] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.350286 75498 usertrap_amd64.go:212] [ 30: 30] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.350345 75498 usertrap_amd64.go:122] [ 30: 30] Allocate a new trap: 0xc0000482a0 10 D0725 14:31:34.350389 75498 usertrap_amd64.go:225] [ 30: 30] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.351224 75498 usertrap_amd64.go:212] [ 30: 30] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.351262 75498 usertrap_amd64.go:122] [ 30: 30] Allocate a new trap: 0xc0000482a0 11 D0725 14:31:34.351302 75498 usertrap_amd64.go:225] [ 30: 30] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.352298 75498 usertrap_amd64.go:212] [ 30: 30] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.352337 75498 usertrap_amd64.go:122] [ 30: 30] Allocate a new trap: 0xc0000482a0 12 D0725 14:31:34.352388 75498 usertrap_amd64.go:225] [ 30: 30] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.354132 75498 usertrap_amd64.go:212] [ 30: 30] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.354185 75498 usertrap_amd64.go:122] [ 30: 30] Allocate a new trap: 0xc0000482a0 13 D0725 14:31:34.354240 75498 usertrap_amd64.go:225] [ 30: 30] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.354473 75498 usertrap_amd64.go:212] [ 30: 30] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.354516 75498 usertrap_amd64.go:122] [ 30: 30] Allocate a new trap: 0xc0000482a0 14 D0725 14:31:34.354565 75498 usertrap_amd64.go:225] [ 30: 30] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.375590 75498 task_signals.go:470] [ 31: 31] Notified of signal 56 D0725 14:31:34.375945 75498 task_signals.go:204] [ 31: 31] Signal 31, PID: 31, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.376045 75498 task_exit.go:204] [ 31: 31] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.377671 75498 task_exit.go:204] [ 31: 31] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.378146 75498 task_exit.go:204] [ 30: 30] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.380020 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.380135 75498 task_exit.go:204] [ 30: 30] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.380191 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.380188 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.380265 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.380991 75498 task_exit.go:204] [ 30: 30] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.385547 75498 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.385662 75498 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc0003c8990 9 D0725 14:31:34.386026 75498 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.388078 75498 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.388133 75498 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc0003c8990 10 D0725 14:31:34.388176 75498 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.388986 75498 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.389035 75498 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc0003c8990 11 D0725 14:31:34.389112 75498 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.390066 75498 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.390114 75498 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc0003c8990 12 D0725 14:31:34.390154 75498 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.391639 75498 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.391688 75498 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc0003c8990 13 D0725 14:31:34.391750 75498 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.391955 75498 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.392003 75498 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc0003c8990 14 D0725 14:31:34.392059 75498 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.414077 75498 task_signals.go:470] [ 33: 33] Notified of signal 56 D0725 14:31:34.414205 75498 task_signals.go:204] [ 33: 33] Signal 33, PID: 33, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.414301 75498 task_exit.go:204] [ 33: 33] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.415702 75498 task_exit.go:204] [ 33: 33] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.416767 75498 task_exit.go:204] [ 32: 32] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.418701 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.418762 75498 task_exit.go:204] [ 32: 32] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.418819 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.418807 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.418877 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.418894 75498 task_exit.go:204] [ 32: 32] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.421487 75498 usertrap_amd64.go:212] [ 34: 34] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.421548 75498 usertrap_amd64.go:122] [ 34: 34] Allocate a new trap: 0xc0003c9800 9 D0725 14:31:34.421923 75498 usertrap_amd64.go:225] [ 34: 34] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.424129 75498 usertrap_amd64.go:212] [ 34: 34] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.424182 75498 usertrap_amd64.go:122] [ 34: 34] Allocate a new trap: 0xc0003c9800 10 D0725 14:31:34.424259 75498 usertrap_amd64.go:225] [ 34: 34] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.425357 75498 usertrap_amd64.go:212] [ 34: 34] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.425399 75498 usertrap_amd64.go:122] [ 34: 34] Allocate a new trap: 0xc0003c9800 11 D0725 14:31:34.425454 75498 usertrap_amd64.go:225] [ 34: 34] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.426437 75498 usertrap_amd64.go:212] [ 34: 34] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.426477 75498 usertrap_amd64.go:122] [ 34: 34] Allocate a new trap: 0xc0003c9800 12 D0725 14:31:34.426517 75498 usertrap_amd64.go:225] [ 34: 34] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.428488 75498 usertrap_amd64.go:212] [ 34: 34] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.428533 75498 usertrap_amd64.go:122] [ 34: 34] Allocate a new trap: 0xc0003c9800 13 D0725 14:31:34.428581 75498 usertrap_amd64.go:225] [ 34: 34] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.428754 75498 usertrap_amd64.go:212] [ 34: 34] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.428789 75498 usertrap_amd64.go:122] [ 34: 34] Allocate a new trap: 0xc0003c9800 14 D0725 14:31:34.428838 75498 usertrap_amd64.go:225] [ 34: 34] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.450018 75498 task_signals.go:470] [ 35: 35] Notified of signal 56 D0725 14:31:34.450145 75498 task_signals.go:204] [ 35: 35] Signal 35, PID: 35, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.450234 75498 task_exit.go:204] [ 35: 35] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.451867 75498 task_exit.go:204] [ 35: 35] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.452810 75498 task_exit.go:204] [ 34: 34] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.454637 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.454731 75498 task_exit.go:204] [ 34: 34] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.454799 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.454866 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.454915 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.454970 75498 task_exit.go:204] [ 34: 34] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.457783 75498 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.457863 75498 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc0002e4900 9 D0725 14:31:34.458183 75498 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.460275 75498 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.460340 75498 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc0002e4900 10 D0725 14:31:34.460393 75498 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.461237 75498 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.461277 75498 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc0002e4900 11 D0725 14:31:34.461317 75498 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.462343 75498 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.462393 75498 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc0002e4900 12 D0725 14:31:34.462440 75498 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.463887 75498 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.463930 75498 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc0002e4900 13 D0725 14:31:34.463969 75498 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.464141 75498 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.464188 75498 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc0002e4900 14 D0725 14:31:34.464235 75498 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.486277 75498 task_signals.go:470] [ 37: 37] Notified of signal 56 D0725 14:31:34.486508 75498 task_signals.go:204] [ 37: 37] Signal 37, PID: 37, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.486599 75498 task_exit.go:204] [ 37: 37] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.488288 75498 task_exit.go:204] [ 37: 37] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.489117 75498 task_exit.go:204] [ 36: 36] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.490890 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.490960 75498 task_exit.go:204] [ 36: 36] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.490996 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.491050 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.491008 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.491186 75498 task_exit.go:204] [ 36: 36] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.494056 75498 usertrap_amd64.go:212] [ 38: 38] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.494149 75498 usertrap_amd64.go:122] [ 38: 38] Allocate a new trap: 0xc0001fe120 9 D0725 14:31:34.494467 75498 usertrap_amd64.go:225] [ 38: 38] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.496828 75498 usertrap_amd64.go:212] [ 38: 38] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.496877 75498 usertrap_amd64.go:122] [ 38: 38] Allocate a new trap: 0xc0001fe120 10 D0725 14:31:34.496921 75498 usertrap_amd64.go:225] [ 38: 38] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.497997 75498 usertrap_amd64.go:212] [ 38: 38] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.498046 75498 usertrap_amd64.go:122] [ 38: 38] Allocate a new trap: 0xc0001fe120 11 D0725 14:31:34.498097 75498 usertrap_amd64.go:225] [ 38: 38] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.499173 75498 usertrap_amd64.go:212] [ 38: 38] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.499221 75498 usertrap_amd64.go:122] [ 38: 38] Allocate a new trap: 0xc0001fe120 12 D0725 14:31:34.499279 75498 usertrap_amd64.go:225] [ 38: 38] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.500831 75498 usertrap_amd64.go:212] [ 38: 38] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.500872 75498 usertrap_amd64.go:122] [ 38: 38] Allocate a new trap: 0xc0001fe120 13 D0725 14:31:34.500922 75498 usertrap_amd64.go:225] [ 38: 38] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.501100 75498 usertrap_amd64.go:212] [ 38: 38] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.501145 75498 usertrap_amd64.go:122] [ 38: 38] Allocate a new trap: 0xc0001fe120 14 D0725 14:31:34.501194 75498 usertrap_amd64.go:225] [ 38: 38] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.524551 75498 task_signals.go:470] [ 39: 39] Notified of signal 56 D0725 14:31:34.524774 75498 task_signals.go:204] [ 39: 39] Signal 39, PID: 39, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.524872 75498 task_exit.go:204] [ 39: 39] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.526365 75498 task_exit.go:204] [ 39: 39] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.527099 75498 task_exit.go:204] [ 38: 38] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.528977 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.529046 75498 task_exit.go:204] [ 38: 38] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.529088 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.529160 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.529223 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.529637 75498 task_exit.go:204] [ 38: 38] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.532037 75498 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.532107 75498 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000048090 9 D0725 14:31:34.532407 75498 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.534417 75498 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.534456 75498 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000048090 10 D0725 14:31:34.534507 75498 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.535305 75498 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.535351 75498 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000048090 11 D0725 14:31:34.535392 75498 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.536307 75498 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.536361 75498 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000048090 12 D0725 14:31:34.536400 75498 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.537884 75498 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.537932 75498 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000048090 13 D0725 14:31:34.537972 75498 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.538130 75498 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.538172 75498 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000048090 14 D0725 14:31:34.538213 75498 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.559432 75498 task_signals.go:470] [ 41: 41] Notified of signal 56 D0725 14:31:34.559586 75498 task_signals.go:204] [ 41: 41] Signal 41, PID: 41, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.559704 75498 task_exit.go:204] [ 41: 41] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.561124 75498 task_exit.go:204] [ 41: 41] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.561638 75498 task_exit.go:204] [ 40: 40] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.563682 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.563768 75498 task_exit.go:204] [ 40: 40] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.563812 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.563831 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.563893 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.564359 75498 task_exit.go:204] [ 40: 40] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.566887 75498 usertrap_amd64.go:212] [ 42: 42] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.566962 75498 usertrap_amd64.go:122] [ 42: 42] Allocate a new trap: 0xc000048600 9 D0725 14:31:34.567358 75498 usertrap_amd64.go:225] [ 42: 42] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.569213 75498 usertrap_amd64.go:212] [ 42: 42] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.569266 75498 usertrap_amd64.go:122] [ 42: 42] Allocate a new trap: 0xc000048600 10 D0725 14:31:34.569345 75498 usertrap_amd64.go:225] [ 42: 42] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.570265 75498 usertrap_amd64.go:212] [ 42: 42] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.570310 75498 usertrap_amd64.go:122] [ 42: 42] Allocate a new trap: 0xc000048600 11 D0725 14:31:34.570363 75498 usertrap_amd64.go:225] [ 42: 42] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.571280 75498 usertrap_amd64.go:212] [ 42: 42] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.571320 75498 usertrap_amd64.go:122] [ 42: 42] Allocate a new trap: 0xc000048600 12 D0725 14:31:34.571359 75498 usertrap_amd64.go:225] [ 42: 42] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.572784 75498 usertrap_amd64.go:212] [ 42: 42] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.572823 75498 usertrap_amd64.go:122] [ 42: 42] Allocate a new trap: 0xc000048600 13 D0725 14:31:34.572872 75498 usertrap_amd64.go:225] [ 42: 42] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.573020 75498 usertrap_amd64.go:212] [ 42: 42] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.573059 75498 usertrap_amd64.go:122] [ 42: 42] Allocate a new trap: 0xc000048600 14 D0725 14:31:34.573106 75498 usertrap_amd64.go:225] [ 42: 42] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.594308 75498 task_signals.go:470] [ 43: 43] Notified of signal 56 D0725 14:31:34.594547 75498 task_signals.go:204] [ 43: 43] Signal 43, PID: 43, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.594632 75498 task_exit.go:204] [ 43: 43] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.596110 75498 task_exit.go:204] [ 43: 43] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.596659 75498 task_exit.go:204] [ 42: 42] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.598398 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.598469 75498 task_exit.go:204] [ 42: 42] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.598505 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.598546 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.598573 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.598656 75498 task_exit.go:204] [ 42: 42] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.601188 75498 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.601251 75498 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc0002de2a0 9 D0725 14:31:34.601564 75498 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.603713 75498 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.603776 75498 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc0002de2a0 10 D0725 14:31:34.603820 75498 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.604685 75498 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.604723 75498 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc0002de2a0 11 D0725 14:31:34.604762 75498 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.605954 75498 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.605992 75498 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc0002de2a0 12 D0725 14:31:34.606032 75498 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.607534 75498 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.607598 75498 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc0002de2a0 13 D0725 14:31:34.607673 75498 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.607860 75498 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.607907 75498 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc0002de2a0 14 D0725 14:31:34.607950 75498 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.631116 75498 task_signals.go:470] [ 45: 45] Notified of signal 56 D0725 14:31:34.631228 75498 task_signals.go:204] [ 45: 45] Signal 45, PID: 45, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.631329 75498 task_exit.go:204] [ 45: 45] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.632922 75498 task_exit.go:204] [ 45: 45] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.633557 75498 task_exit.go:204] [ 44: 44] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.635433 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.635510 75498 task_exit.go:204] [ 44: 44] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.635568 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.635642 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.635692 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.636152 75498 task_exit.go:204] [ 44: 44] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.639149 75498 usertrap_amd64.go:212] [ 46: 46] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.639235 75498 usertrap_amd64.go:122] [ 46: 46] Allocate a new trap: 0xc000bdc810 9 D0725 14:31:34.639570 75498 usertrap_amd64.go:225] [ 46: 46] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.641776 75498 usertrap_amd64.go:212] [ 46: 46] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.641825 75498 usertrap_amd64.go:122] [ 46: 46] Allocate a new trap: 0xc000bdc810 10 D0725 14:31:34.641888 75498 usertrap_amd64.go:225] [ 46: 46] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.642719 75498 usertrap_amd64.go:212] [ 46: 46] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.642757 75498 usertrap_amd64.go:122] [ 46: 46] Allocate a new trap: 0xc000bdc810 11 D0725 14:31:34.642823 75498 usertrap_amd64.go:225] [ 46: 46] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.644032 75498 usertrap_amd64.go:212] [ 46: 46] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.644104 75498 usertrap_amd64.go:122] [ 46: 46] Allocate a new trap: 0xc000bdc810 12 D0725 14:31:34.644153 75498 usertrap_amd64.go:225] [ 46: 46] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.645726 75498 usertrap_amd64.go:212] [ 46: 46] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.645780 75498 usertrap_amd64.go:122] [ 46: 46] Allocate a new trap: 0xc000bdc810 13 D0725 14:31:34.645824 75498 usertrap_amd64.go:225] [ 46: 46] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.645999 75498 usertrap_amd64.go:212] [ 46: 46] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.646033 75498 usertrap_amd64.go:122] [ 46: 46] Allocate a new trap: 0xc000bdc810 14 D0725 14:31:34.646080 75498 usertrap_amd64.go:225] [ 46: 46] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.668441 75498 task_signals.go:470] [ 47: 47] Notified of signal 56 D0725 14:31:34.668626 75498 task_signals.go:204] [ 47: 47] Signal 47, PID: 47, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.668735 75498 task_exit.go:204] [ 47: 47] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.670346 75498 task_exit.go:204] [ 47: 47] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.670633 75498 task_exit.go:204] [ 46: 46] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.672520 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.672598 75498 task_exit.go:204] [ 46: 46] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.672668 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.672737 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.672808 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.672820 75498 task_exit.go:204] [ 46: 46] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.675440 75498 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.675532 75498 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc000bdc840 9 D0725 14:31:34.675937 75498 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.677875 75498 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.677916 75498 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc000bdc840 10 D0725 14:31:34.677957 75498 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.678951 75498 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.679003 75498 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc000bdc840 11 D0725 14:31:34.679048 75498 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.680223 75498 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.680288 75498 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc000bdc840 12 D0725 14:31:34.680331 75498 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.683308 75498 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.683420 75498 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc000bdc840 13 D0725 14:31:34.683491 75498 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.683719 75498 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.683779 75498 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc000bdc840 14 D0725 14:31:34.683871 75498 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.741725 75498 task_signals.go:470] [ 49: 49] Notified of signal 56 D0725 14:31:34.741880 75498 task_signals.go:204] [ 49: 49] Signal 49, PID: 49, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.742007 75498 task_exit.go:204] [ 49: 49] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.743711 75498 task_exit.go:204] [ 49: 49] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.744273 75498 task_exit.go:204] [ 48: 48] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.746205 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.746281 75498 task_exit.go:204] [ 48: 48] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.746342 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.746416 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.746509 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.747258 75498 task_exit.go:204] [ 48: 48] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.750156 75498 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.750228 75498 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc001898210 9 D0725 14:31:34.750499 75498 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.752398 75498 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.752439 75498 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc001898210 10 D0725 14:31:34.752481 75498 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.753239 75498 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.753284 75498 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc001898210 11 D0725 14:31:34.753330 75498 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.754396 75498 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.754444 75498 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc001898210 12 D0725 14:31:34.754493 75498 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.756150 75498 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.756209 75498 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc001898210 13 D0725 14:31:34.756250 75498 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.756416 75498 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.756448 75498 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc001898210 14 D0725 14:31:34.756486 75498 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.778374 75498 task_signals.go:470] [ 51: 51] Notified of signal 56 D0725 14:31:34.778537 75498 task_signals.go:204] [ 51: 51] Signal 51, PID: 51, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.778648 75498 task_exit.go:204] [ 51: 51] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.780071 75498 task_exit.go:204] [ 51: 51] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.780750 75498 task_exit.go:204] [ 50: 50] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.782690 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.782764 75498 task_exit.go:204] [ 50: 50] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.782819 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.782912 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.782950 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.783945 75498 task_exit.go:204] [ 50: 50] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.786372 75498 usertrap_amd64.go:212] [ 52: 52] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.786440 75498 usertrap_amd64.go:122] [ 52: 52] Allocate a new trap: 0xc0002de1b0 9 D0725 14:31:34.786771 75498 usertrap_amd64.go:225] [ 52: 52] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.788791 75498 usertrap_amd64.go:212] [ 52: 52] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.788832 75498 usertrap_amd64.go:122] [ 52: 52] Allocate a new trap: 0xc0002de1b0 10 D0725 14:31:34.788878 75498 usertrap_amd64.go:225] [ 52: 52] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.789826 75498 usertrap_amd64.go:212] [ 52: 52] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.789866 75498 usertrap_amd64.go:122] [ 52: 52] Allocate a new trap: 0xc0002de1b0 11 D0725 14:31:34.789933 75498 usertrap_amd64.go:225] [ 52: 52] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.791055 75498 usertrap_amd64.go:212] [ 52: 52] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.791114 75498 usertrap_amd64.go:122] [ 52: 52] Allocate a new trap: 0xc0002de1b0 12 D0725 14:31:34.791179 75498 usertrap_amd64.go:225] [ 52: 52] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.792714 75498 usertrap_amd64.go:212] [ 52: 52] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.792770 75498 usertrap_amd64.go:122] [ 52: 52] Allocate a new trap: 0xc0002de1b0 13 D0725 14:31:34.792851 75498 usertrap_amd64.go:225] [ 52: 52] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.793274 75498 usertrap_amd64.go:212] [ 52: 52] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.793328 75498 usertrap_amd64.go:122] [ 52: 52] Allocate a new trap: 0xc0002de1b0 14 D0725 14:31:34.793383 75498 usertrap_amd64.go:225] [ 52: 52] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.816935 75498 task_signals.go:470] [ 53: 53] Notified of signal 56 D0725 14:31:34.817068 75498 task_signals.go:204] [ 53: 53] Signal 53, PID: 53, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.817171 75498 task_exit.go:204] [ 53: 53] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.819037 75498 task_exit.go:204] [ 53: 53] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.819524 75498 task_exit.go:204] [ 52: 52] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.821718 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.821807 75498 task_exit.go:204] [ 52: 52] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.821884 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.821995 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.822053 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.823031 75498 task_exit.go:204] [ 52: 52] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.826063 75498 usertrap_amd64.go:212] [ 54: 54] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.826191 75498 usertrap_amd64.go:122] [ 54: 54] Allocate a new trap: 0xc0002de5a0 9 D0725 14:31:34.826616 75498 usertrap_amd64.go:225] [ 54: 54] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.829006 75498 usertrap_amd64.go:212] [ 54: 54] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.829052 75498 usertrap_amd64.go:122] [ 54: 54] Allocate a new trap: 0xc0002de5a0 10 D0725 14:31:34.829109 75498 usertrap_amd64.go:225] [ 54: 54] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.829943 75498 usertrap_amd64.go:212] [ 54: 54] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.829990 75498 usertrap_amd64.go:122] [ 54: 54] Allocate a new trap: 0xc0002de5a0 11 D0725 14:31:34.830063 75498 usertrap_amd64.go:225] [ 54: 54] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.831477 75498 usertrap_amd64.go:212] [ 54: 54] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.831529 75498 usertrap_amd64.go:122] [ 54: 54] Allocate a new trap: 0xc0002de5a0 12 D0725 14:31:34.831638 75498 usertrap_amd64.go:225] [ 54: 54] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.833381 75498 usertrap_amd64.go:212] [ 54: 54] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.833436 75498 usertrap_amd64.go:122] [ 54: 54] Allocate a new trap: 0xc0002de5a0 13 D0725 14:31:34.833480 75498 usertrap_amd64.go:225] [ 54: 54] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.833686 75498 usertrap_amd64.go:212] [ 54: 54] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.833746 75498 usertrap_amd64.go:122] [ 54: 54] Allocate a new trap: 0xc0002de5a0 14 D0725 14:31:34.833788 75498 usertrap_amd64.go:225] [ 54: 54] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.856021 75498 task_signals.go:470] [ 55: 55] Notified of signal 56 D0725 14:31:34.856147 75498 task_signals.go:204] [ 55: 55] Signal 55, PID: 55, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.856247 75498 task_exit.go:204] [ 55: 55] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.857594 75498 task_exit.go:204] [ 55: 55] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.858887 75498 task_exit.go:204] [ 54: 54] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.861021 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.861150 75498 task_exit.go:204] [ 54: 54] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.861182 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.861227 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.861222 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.861331 75498 task_exit.go:204] [ 54: 54] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.864171 75498 usertrap_amd64.go:212] [ 56: 56] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.864257 75498 usertrap_amd64.go:122] [ 56: 56] Allocate a new trap: 0xc0002e44e0 9 D0725 14:31:34.864631 75498 usertrap_amd64.go:225] [ 56: 56] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.867463 75498 usertrap_amd64.go:212] [ 56: 56] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.867509 75498 usertrap_amd64.go:122] [ 56: 56] Allocate a new trap: 0xc0002e44e0 10 D0725 14:31:34.867565 75498 usertrap_amd64.go:225] [ 56: 56] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.868738 75498 usertrap_amd64.go:212] [ 56: 56] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.868798 75498 usertrap_amd64.go:122] [ 56: 56] Allocate a new trap: 0xc0002e44e0 11 D0725 14:31:34.868857 75498 usertrap_amd64.go:225] [ 56: 56] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.869822 75498 usertrap_amd64.go:212] [ 56: 56] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.869861 75498 usertrap_amd64.go:122] [ 56: 56] Allocate a new trap: 0xc0002e44e0 12 D0725 14:31:34.869907 75498 usertrap_amd64.go:225] [ 56: 56] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.871310 75498 usertrap_amd64.go:212] [ 56: 56] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.871360 75498 usertrap_amd64.go:122] [ 56: 56] Allocate a new trap: 0xc0002e44e0 13 D0725 14:31:34.871416 75498 usertrap_amd64.go:225] [ 56: 56] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.871683 75498 usertrap_amd64.go:212] [ 56: 56] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.871730 75498 usertrap_amd64.go:122] [ 56: 56] Allocate a new trap: 0xc0002e44e0 14 D0725 14:31:34.871787 75498 usertrap_amd64.go:225] [ 56: 56] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.895288 75498 task_signals.go:470] [ 57: 57] Notified of signal 56 D0725 14:31:34.895558 75498 task_signals.go:204] [ 57: 57] Signal 57, PID: 57, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.895677 75498 task_exit.go:204] [ 57: 57] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.897254 75498 task_exit.go:204] [ 57: 57] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.897722 75498 task_exit.go:204] [ 56: 56] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.899373 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.899454 75498 task_exit.go:204] [ 56: 56] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.899509 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.899504 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.899599 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.899647 75498 task_exit.go:204] [ 56: 56] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.902876 75498 usertrap_amd64.go:212] [ 58: 58] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.902971 75498 usertrap_amd64.go:122] [ 58: 58] Allocate a new trap: 0xc0015bc9f0 9 D0725 14:31:34.903295 75498 usertrap_amd64.go:225] [ 58: 58] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.906781 75498 usertrap_amd64.go:212] [ 58: 58] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.906834 75498 usertrap_amd64.go:122] [ 58: 58] Allocate a new trap: 0xc0015bc9f0 10 D0725 14:31:34.906895 75498 usertrap_amd64.go:225] [ 58: 58] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.908074 75498 usertrap_amd64.go:212] [ 58: 58] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.908151 75498 usertrap_amd64.go:122] [ 58: 58] Allocate a new trap: 0xc0015bc9f0 11 D0725 14:31:34.908222 75498 usertrap_amd64.go:225] [ 58: 58] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.909470 75498 usertrap_amd64.go:212] [ 58: 58] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.909547 75498 usertrap_amd64.go:122] [ 58: 58] Allocate a new trap: 0xc0015bc9f0 12 D0725 14:31:34.909632 75498 usertrap_amd64.go:225] [ 58: 58] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.911378 75498 usertrap_amd64.go:212] [ 58: 58] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.911443 75498 usertrap_amd64.go:122] [ 58: 58] Allocate a new trap: 0xc0015bc9f0 13 D0725 14:31:34.911508 75498 usertrap_amd64.go:225] [ 58: 58] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.911780 75498 usertrap_amd64.go:212] [ 58: 58] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.911827 75498 usertrap_amd64.go:122] [ 58: 58] Allocate a new trap: 0xc0015bc9f0 14 D0725 14:31:34.911874 75498 usertrap_amd64.go:225] [ 58: 58] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.941156 75498 task_signals.go:470] [ 59: 59] Notified of signal 56 D0725 14:31:34.941376 75498 task_signals.go:204] [ 59: 59] Signal 59, PID: 59, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.941459 75498 task_exit.go:204] [ 59: 59] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.942980 75498 task_exit.go:204] [ 59: 59] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.944002 75498 task_exit.go:204] [ 58: 58] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.945897 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.945981 75498 task_exit.go:204] [ 58: 58] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.946050 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.946074 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.946107 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.947253 75498 task_exit.go:204] [ 58: 58] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.949991 75498 usertrap_amd64.go:212] [ 60: 60] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.950051 75498 usertrap_amd64.go:122] [ 60: 60] Allocate a new trap: 0xc0002de240 9 D0725 14:31:34.950434 75498 usertrap_amd64.go:225] [ 60: 60] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.952825 75498 usertrap_amd64.go:212] [ 60: 60] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.952870 75498 usertrap_amd64.go:122] [ 60: 60] Allocate a new trap: 0xc0002de240 10 D0725 14:31:34.952919 75498 usertrap_amd64.go:225] [ 60: 60] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.953988 75498 usertrap_amd64.go:212] [ 60: 60] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.954043 75498 usertrap_amd64.go:122] [ 60: 60] Allocate a new trap: 0xc0002de240 11 D0725 14:31:34.954156 75498 usertrap_amd64.go:225] [ 60: 60] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.955172 75498 usertrap_amd64.go:212] [ 60: 60] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.955219 75498 usertrap_amd64.go:122] [ 60: 60] Allocate a new trap: 0xc0002de240 12 D0725 14:31:34.955268 75498 usertrap_amd64.go:225] [ 60: 60] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.956928 75498 usertrap_amd64.go:212] [ 60: 60] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.956979 75498 usertrap_amd64.go:122] [ 60: 60] Allocate a new trap: 0xc0002de240 13 D0725 14:31:34.957062 75498 usertrap_amd64.go:225] [ 60: 60] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.957276 75498 usertrap_amd64.go:212] [ 60: 60] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.957312 75498 usertrap_amd64.go:122] [ 60: 60] Allocate a new trap: 0xc0002de240 14 D0725 14:31:34.957369 75498 usertrap_amd64.go:225] [ 60: 60] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:34.979383 75498 task_signals.go:470] [ 61: 61] Notified of signal 56 D0725 14:31:34.979587 75498 task_signals.go:204] [ 61: 61] Signal 61, PID: 61, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:34.979768 75498 task_exit.go:204] [ 61: 61] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.981762 75498 task_exit.go:204] [ 61: 61] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.981926 75498 task_exit.go:204] [ 60: 60] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:34.983591 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:34.983687 75498 task_exit.go:204] [ 60: 60] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:34.983735 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:34.983832 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:34.983923 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:34.984433 75498 task_exit.go:204] [ 60: 60] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:34.987367 75498 usertrap_amd64.go:212] [ 62: 62] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:34.987466 75498 usertrap_amd64.go:122] [ 62: 62] Allocate a new trap: 0xc000bdc000 9 D0725 14:31:34.987907 75498 usertrap_amd64.go:225] [ 62: 62] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:34.990774 75498 usertrap_amd64.go:212] [ 62: 62] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:34.990848 75498 usertrap_amd64.go:122] [ 62: 62] Allocate a new trap: 0xc000bdc000 10 D0725 14:31:34.990930 75498 usertrap_amd64.go:225] [ 62: 62] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:34.992251 75498 usertrap_amd64.go:212] [ 62: 62] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:34.992323 75498 usertrap_amd64.go:122] [ 62: 62] Allocate a new trap: 0xc000bdc000 11 D0725 14:31:34.992407 75498 usertrap_amd64.go:225] [ 62: 62] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:34.993946 75498 usertrap_amd64.go:212] [ 62: 62] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:34.994001 75498 usertrap_amd64.go:122] [ 62: 62] Allocate a new trap: 0xc000bdc000 12 D0725 14:31:34.994084 75498 usertrap_amd64.go:225] [ 62: 62] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:34.995824 75498 usertrap_amd64.go:212] [ 62: 62] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:34.995875 75498 usertrap_amd64.go:122] [ 62: 62] Allocate a new trap: 0xc000bdc000 13 D0725 14:31:34.995962 75498 usertrap_amd64.go:225] [ 62: 62] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:34.996162 75498 usertrap_amd64.go:212] [ 62: 62] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:34.996197 75498 usertrap_amd64.go:122] [ 62: 62] Allocate a new trap: 0xc000bdc000 14 D0725 14:31:34.996247 75498 usertrap_amd64.go:225] [ 62: 62] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.018303 75498 task_signals.go:470] [ 63: 63] Notified of signal 56 D0725 14:31:35.018461 75498 task_signals.go:204] [ 63: 63] Signal 63, PID: 63, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.018550 75498 task_exit.go:204] [ 63: 63] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.020244 75498 task_exit.go:204] [ 63: 63] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.020894 75498 task_exit.go:204] [ 62: 62] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.022689 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.022748 75498 task_exit.go:204] [ 62: 62] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.022784 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.022804 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.022849 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.022896 75498 task_exit.go:204] [ 62: 62] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.025792 75498 usertrap_amd64.go:212] [ 64: 64] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.025913 75498 usertrap_amd64.go:122] [ 64: 64] Allocate a new trap: 0xc0002e4390 9 D0725 14:31:35.026366 75498 usertrap_amd64.go:225] [ 64: 64] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.028589 75498 usertrap_amd64.go:212] [ 64: 64] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.028643 75498 usertrap_amd64.go:122] [ 64: 64] Allocate a new trap: 0xc0002e4390 10 D0725 14:31:35.028693 75498 usertrap_amd64.go:225] [ 64: 64] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.029814 75498 usertrap_amd64.go:212] [ 64: 64] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.029888 75498 usertrap_amd64.go:122] [ 64: 64] Allocate a new trap: 0xc0002e4390 11 D0725 14:31:35.029989 75498 usertrap_amd64.go:225] [ 64: 64] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.031221 75498 usertrap_amd64.go:212] [ 64: 64] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.031274 75498 usertrap_amd64.go:122] [ 64: 64] Allocate a new trap: 0xc0002e4390 12 D0725 14:31:35.031324 75498 usertrap_amd64.go:225] [ 64: 64] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.033000 75498 usertrap_amd64.go:212] [ 64: 64] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.033051 75498 usertrap_amd64.go:122] [ 64: 64] Allocate a new trap: 0xc0002e4390 13 D0725 14:31:35.033104 75498 usertrap_amd64.go:225] [ 64: 64] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.033304 75498 usertrap_amd64.go:212] [ 64: 64] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.033339 75498 usertrap_amd64.go:122] [ 64: 64] Allocate a new trap: 0xc0002e4390 14 D0725 14:31:35.033396 75498 usertrap_amd64.go:225] [ 64: 64] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.055175 75498 task_signals.go:470] [ 65: 65] Notified of signal 56 D0725 14:31:35.055379 75498 task_signals.go:204] [ 65: 65] Signal 65, PID: 65, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.055459 75498 task_exit.go:204] [ 65: 65] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.056945 75498 task_exit.go:204] [ 65: 65] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.058107 75498 task_exit.go:204] [ 64: 64] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.060223 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.060314 75498 task_exit.go:204] [ 64: 64] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.060371 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.060385 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.060419 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.060485 75498 task_exit.go:204] [ 64: 64] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.063136 75498 usertrap_amd64.go:212] [ 66: 66] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.063227 75498 usertrap_amd64.go:122] [ 66: 66] Allocate a new trap: 0xc0002deea0 9 D0725 14:31:35.063595 75498 usertrap_amd64.go:225] [ 66: 66] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.066979 75498 usertrap_amd64.go:212] [ 66: 66] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.067032 75498 usertrap_amd64.go:122] [ 66: 66] Allocate a new trap: 0xc0002deea0 10 D0725 14:31:35.067074 75498 usertrap_amd64.go:225] [ 66: 66] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.067902 75498 usertrap_amd64.go:212] [ 66: 66] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.067944 75498 usertrap_amd64.go:122] [ 66: 66] Allocate a new trap: 0xc0002deea0 11 D0725 14:31:35.067985 75498 usertrap_amd64.go:225] [ 66: 66] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.069171 75498 usertrap_amd64.go:212] [ 66: 66] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.069220 75498 usertrap_amd64.go:122] [ 66: 66] Allocate a new trap: 0xc0002deea0 12 D0725 14:31:35.069281 75498 usertrap_amd64.go:225] [ 66: 66] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.070870 75498 usertrap_amd64.go:212] [ 66: 66] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.070933 75498 usertrap_amd64.go:122] [ 66: 66] Allocate a new trap: 0xc0002deea0 13 D0725 14:31:35.070979 75498 usertrap_amd64.go:225] [ 66: 66] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.071183 75498 usertrap_amd64.go:212] [ 66: 66] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.071233 75498 usertrap_amd64.go:122] [ 66: 66] Allocate a new trap: 0xc0002deea0 14 D0725 14:31:35.071311 75498 usertrap_amd64.go:225] [ 66: 66] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.093737 75498 task_signals.go:470] [ 67: 67] Notified of signal 56 D0725 14:31:35.093948 75498 task_signals.go:204] [ 67: 67] Signal 67, PID: 67, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.094043 75498 task_exit.go:204] [ 67: 67] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.095688 75498 task_exit.go:204] [ 67: 67] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.096357 75498 task_exit.go:204] [ 66: 66] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.098011 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.098074 75498 task_exit.go:204] [ 66: 66] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.098126 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.098167 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.098196 75498 task_exit.go:204] [ 66: 66] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.098241 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.100926 75498 usertrap_amd64.go:212] [ 68: 68] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.101014 75498 usertrap_amd64.go:122] [ 68: 68] Allocate a new trap: 0xc0002df8c0 9 D0725 14:31:35.101333 75498 usertrap_amd64.go:225] [ 68: 68] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.103571 75498 usertrap_amd64.go:212] [ 68: 68] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.103653 75498 usertrap_amd64.go:122] [ 68: 68] Allocate a new trap: 0xc0002df8c0 10 D0725 14:31:35.103703 75498 usertrap_amd64.go:225] [ 68: 68] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.104684 75498 usertrap_amd64.go:212] [ 68: 68] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.104744 75498 usertrap_amd64.go:122] [ 68: 68] Allocate a new trap: 0xc0002df8c0 11 D0725 14:31:35.104835 75498 usertrap_amd64.go:225] [ 68: 68] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.105899 75498 usertrap_amd64.go:212] [ 68: 68] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.105947 75498 usertrap_amd64.go:122] [ 68: 68] Allocate a new trap: 0xc0002df8c0 12 D0725 14:31:35.105996 75498 usertrap_amd64.go:225] [ 68: 68] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.107499 75498 usertrap_amd64.go:212] [ 68: 68] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.107547 75498 usertrap_amd64.go:122] [ 68: 68] Allocate a new trap: 0xc0002df8c0 13 D0725 14:31:35.107634 75498 usertrap_amd64.go:225] [ 68: 68] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.107865 75498 usertrap_amd64.go:212] [ 68: 68] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.107908 75498 usertrap_amd64.go:122] [ 68: 68] Allocate a new trap: 0xc0002df8c0 14 D0725 14:31:35.107967 75498 usertrap_amd64.go:225] [ 68: 68] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.129536 75498 task_signals.go:470] [ 69: 69] Notified of signal 56 D0725 14:31:35.129737 75498 task_signals.go:204] [ 69: 69] Signal 69, PID: 69, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.129849 75498 task_exit.go:204] [ 69: 69] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.132273 75498 task_exit.go:204] [ 69: 69] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.132513 75498 task_exit.go:204] [ 68: 68] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.134115 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.134208 75498 task_exit.go:204] [ 68: 68] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.134237 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.134278 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.134307 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.134795 75498 task_exit.go:204] [ 68: 68] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.137207 75498 usertrap_amd64.go:212] [ 70: 70] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.137265 75498 usertrap_amd64.go:122] [ 70: 70] Allocate a new trap: 0xc001898330 9 D0725 14:31:35.137540 75498 usertrap_amd64.go:225] [ 70: 70] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.139454 75498 usertrap_amd64.go:212] [ 70: 70] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.139508 75498 usertrap_amd64.go:122] [ 70: 70] Allocate a new trap: 0xc001898330 10 D0725 14:31:35.139551 75498 usertrap_amd64.go:225] [ 70: 70] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.140346 75498 usertrap_amd64.go:212] [ 70: 70] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.140386 75498 usertrap_amd64.go:122] [ 70: 70] Allocate a new trap: 0xc001898330 11 D0725 14:31:35.140439 75498 usertrap_amd64.go:225] [ 70: 70] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.141315 75498 usertrap_amd64.go:212] [ 70: 70] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.141373 75498 usertrap_amd64.go:122] [ 70: 70] Allocate a new trap: 0xc001898330 12 D0725 14:31:35.141465 75498 usertrap_amd64.go:225] [ 70: 70] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.142988 75498 usertrap_amd64.go:212] [ 70: 70] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.143030 75498 usertrap_amd64.go:122] [ 70: 70] Allocate a new trap: 0xc001898330 13 D0725 14:31:35.143107 75498 usertrap_amd64.go:225] [ 70: 70] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.143291 75498 usertrap_amd64.go:212] [ 70: 70] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.143339 75498 usertrap_amd64.go:122] [ 70: 70] Allocate a new trap: 0xc001898330 14 D0725 14:31:35.143387 75498 usertrap_amd64.go:225] [ 70: 70] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.168463 75498 task_signals.go:470] [ 71: 71] Notified of signal 56 D0725 14:31:35.168596 75498 task_signals.go:204] [ 71: 71] Signal 71, PID: 71, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.168669 75498 task_exit.go:204] [ 71: 71] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.170009 75498 task_exit.go:204] [ 71: 71] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.170927 75498 task_exit.go:204] [ 70: 70] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.172691 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.172784 75498 task_exit.go:204] [ 70: 70] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.172851 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.172933 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.173010 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.173672 75498 task_exit.go:204] [ 70: 70] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.176528 75498 usertrap_amd64.go:212] [ 72: 72] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.176630 75498 usertrap_amd64.go:122] [ 72: 72] Allocate a new trap: 0xc000048060 9 D0725 14:31:35.177081 75498 usertrap_amd64.go:225] [ 72: 72] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.179722 75498 usertrap_amd64.go:212] [ 72: 72] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.179774 75498 usertrap_amd64.go:122] [ 72: 72] Allocate a new trap: 0xc000048060 10 D0725 14:31:35.179865 75498 usertrap_amd64.go:225] [ 72: 72] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.180888 75498 usertrap_amd64.go:212] [ 72: 72] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.180934 75498 usertrap_amd64.go:122] [ 72: 72] Allocate a new trap: 0xc000048060 11 D0725 14:31:35.180997 75498 usertrap_amd64.go:225] [ 72: 72] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.182380 75498 usertrap_amd64.go:212] [ 72: 72] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.182424 75498 usertrap_amd64.go:122] [ 72: 72] Allocate a new trap: 0xc000048060 12 D0725 14:31:35.182469 75498 usertrap_amd64.go:225] [ 72: 72] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.186437 75498 usertrap_amd64.go:212] [ 72: 72] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.186486 75498 usertrap_amd64.go:122] [ 72: 72] Allocate a new trap: 0xc000048060 13 D0725 14:31:35.186551 75498 usertrap_amd64.go:225] [ 72: 72] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.186907 75498 usertrap_amd64.go:212] [ 72: 72] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.186984 75498 usertrap_amd64.go:122] [ 72: 72] Allocate a new trap: 0xc000048060 14 D0725 14:31:35.187063 75498 usertrap_amd64.go:225] [ 72: 72] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.211808 75498 task_signals.go:470] [ 73: 73] Notified of signal 56 D0725 14:31:35.211946 75498 task_signals.go:204] [ 73: 73] Signal 73, PID: 73, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.212026 75498 task_exit.go:204] [ 73: 73] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.213495 75498 task_exit.go:204] [ 73: 73] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.214195 75498 task_exit.go:204] [ 72: 72] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.216532 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.216613 75498 task_exit.go:204] [ 72: 72] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.216690 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.216706 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.216757 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.217645 75498 task_exit.go:204] [ 72: 72] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.220297 75498 usertrap_amd64.go:212] [ 74: 74] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.220395 75498 usertrap_amd64.go:122] [ 74: 74] Allocate a new trap: 0xc0015bc1b0 9 D0725 14:31:35.220782 75498 usertrap_amd64.go:225] [ 74: 74] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.222983 75498 usertrap_amd64.go:212] [ 74: 74] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.223040 75498 usertrap_amd64.go:122] [ 74: 74] Allocate a new trap: 0xc0015bc1b0 10 D0725 14:31:35.223097 75498 usertrap_amd64.go:225] [ 74: 74] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.224168 75498 usertrap_amd64.go:212] [ 74: 74] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.224218 75498 usertrap_amd64.go:122] [ 74: 74] Allocate a new trap: 0xc0015bc1b0 11 D0725 14:31:35.224271 75498 usertrap_amd64.go:225] [ 74: 74] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.226437 75498 usertrap_amd64.go:212] [ 74: 74] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.226511 75498 usertrap_amd64.go:122] [ 74: 74] Allocate a new trap: 0xc0015bc1b0 12 D0725 14:31:35.226581 75498 usertrap_amd64.go:225] [ 74: 74] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.228389 75498 usertrap_amd64.go:212] [ 74: 74] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.228432 75498 usertrap_amd64.go:122] [ 74: 74] Allocate a new trap: 0xc0015bc1b0 13 D0725 14:31:35.228495 75498 usertrap_amd64.go:225] [ 74: 74] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.229280 75498 usertrap_amd64.go:212] [ 74: 74] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.229334 75498 usertrap_amd64.go:122] [ 74: 74] Allocate a new trap: 0xc0015bc1b0 14 D0725 14:31:35.229380 75498 usertrap_amd64.go:225] [ 74: 74] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.254934 75498 task_signals.go:470] [ 75: 75] Notified of signal 56 D0725 14:31:35.255092 75498 task_signals.go:204] [ 75: 75] Signal 75, PID: 75, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.255192 75498 task_exit.go:204] [ 75: 75] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.257204 75498 task_exit.go:204] [ 75: 75] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.257762 75498 task_exit.go:204] [ 74: 74] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.260125 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.260221 75498 task_exit.go:204] [ 74: 74] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.260292 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.260285 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.260380 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.260672 75498 task_exit.go:204] [ 74: 74] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.263296 75498 usertrap_amd64.go:212] [ 76: 76] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.263395 75498 usertrap_amd64.go:122] [ 76: 76] Allocate a new trap: 0xc000bdc090 9 D0725 14:31:35.263760 75498 usertrap_amd64.go:225] [ 76: 76] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.266074 75498 usertrap_amd64.go:212] [ 76: 76] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.266119 75498 usertrap_amd64.go:122] [ 76: 76] Allocate a new trap: 0xc000bdc090 10 D0725 14:31:35.266210 75498 usertrap_amd64.go:225] [ 76: 76] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.266945 75498 usertrap_amd64.go:212] [ 76: 76] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.266993 75498 usertrap_amd64.go:122] [ 76: 76] Allocate a new trap: 0xc000bdc090 11 D0725 14:31:35.267044 75498 usertrap_amd64.go:225] [ 76: 76] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.268414 75498 usertrap_amd64.go:212] [ 76: 76] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.268517 75498 usertrap_amd64.go:122] [ 76: 76] Allocate a new trap: 0xc000bdc090 12 D0725 14:31:35.268616 75498 usertrap_amd64.go:225] [ 76: 76] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.270449 75498 usertrap_amd64.go:212] [ 76: 76] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.270506 75498 usertrap_amd64.go:122] [ 76: 76] Allocate a new trap: 0xc000bdc090 13 D0725 14:31:35.270559 75498 usertrap_amd64.go:225] [ 76: 76] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.270749 75498 usertrap_amd64.go:212] [ 76: 76] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.270797 75498 usertrap_amd64.go:122] [ 76: 76] Allocate a new trap: 0xc000bdc090 14 D0725 14:31:35.270837 75498 usertrap_amd64.go:225] [ 76: 76] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.292953 75498 task_signals.go:470] [ 77: 77] Notified of signal 56 D0725 14:31:35.293101 75498 task_signals.go:204] [ 77: 77] Signal 77, PID: 77, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.293190 75498 task_exit.go:204] [ 77: 77] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.295042 75498 task_exit.go:204] [ 77: 77] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.295457 75498 task_exit.go:204] [ 76: 76] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.297551 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.297650 75498 task_exit.go:204] [ 76: 76] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.297716 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.297777 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.297811 75498 task_exit.go:204] [ 76: 76] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.297854 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.300947 75498 usertrap_amd64.go:212] [ 78: 78] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.301031 75498 usertrap_amd64.go:122] [ 78: 78] Allocate a new trap: 0xc000048bd0 9 D0725 14:31:35.301592 75498 usertrap_amd64.go:225] [ 78: 78] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.304693 75498 usertrap_amd64.go:212] [ 78: 78] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.304765 75498 usertrap_amd64.go:122] [ 78: 78] Allocate a new trap: 0xc000048bd0 10 D0725 14:31:35.304847 75498 usertrap_amd64.go:225] [ 78: 78] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.306097 75498 usertrap_amd64.go:212] [ 78: 78] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.306174 75498 usertrap_amd64.go:122] [ 78: 78] Allocate a new trap: 0xc000048bd0 11 D0725 14:31:35.306238 75498 usertrap_amd64.go:225] [ 78: 78] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.307344 75498 usertrap_amd64.go:212] [ 78: 78] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.307385 75498 usertrap_amd64.go:122] [ 78: 78] Allocate a new trap: 0xc000048bd0 12 D0725 14:31:35.307437 75498 usertrap_amd64.go:225] [ 78: 78] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.309311 75498 usertrap_amd64.go:212] [ 78: 78] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.309365 75498 usertrap_amd64.go:122] [ 78: 78] Allocate a new trap: 0xc000048bd0 13 D0725 14:31:35.309417 75498 usertrap_amd64.go:225] [ 78: 78] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.309656 75498 usertrap_amd64.go:212] [ 78: 78] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.309706 75498 usertrap_amd64.go:122] [ 78: 78] Allocate a new trap: 0xc000048bd0 14 D0725 14:31:35.309751 75498 usertrap_amd64.go:225] [ 78: 78] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.334056 75498 task_signals.go:470] [ 79: 79] Notified of signal 56 D0725 14:31:35.334301 75498 task_signals.go:204] [ 79: 79] Signal 79, PID: 79, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.334400 75498 task_exit.go:204] [ 79: 79] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.335907 75498 task_exit.go:204] [ 79: 79] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.336505 75498 task_exit.go:204] [ 78: 78] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.338468 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.338572 75498 task_exit.go:204] [ 78: 78] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.338660 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.338697 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.338751 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.339740 75498 task_exit.go:204] [ 78: 78] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.342165 75498 usertrap_amd64.go:212] [ 80: 80] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.342240 75498 usertrap_amd64.go:122] [ 80: 80] Allocate a new trap: 0xc0015bc390 9 D0725 14:31:35.342622 75498 usertrap_amd64.go:225] [ 80: 80] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.344589 75498 usertrap_amd64.go:212] [ 80: 80] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.344642 75498 usertrap_amd64.go:122] [ 80: 80] Allocate a new trap: 0xc0015bc390 10 D0725 14:31:35.344716 75498 usertrap_amd64.go:225] [ 80: 80] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.345637 75498 usertrap_amd64.go:212] [ 80: 80] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.345704 75498 usertrap_amd64.go:122] [ 80: 80] Allocate a new trap: 0xc0015bc390 11 D0725 14:31:35.345779 75498 usertrap_amd64.go:225] [ 80: 80] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.346744 75498 usertrap_amd64.go:212] [ 80: 80] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.346794 75498 usertrap_amd64.go:122] [ 80: 80] Allocate a new trap: 0xc0015bc390 12 D0725 14:31:35.346869 75498 usertrap_amd64.go:225] [ 80: 80] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.348854 75498 usertrap_amd64.go:212] [ 80: 80] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.348908 75498 usertrap_amd64.go:122] [ 80: 80] Allocate a new trap: 0xc0015bc390 13 D0725 14:31:35.348981 75498 usertrap_amd64.go:225] [ 80: 80] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.349282 75498 usertrap_amd64.go:212] [ 80: 80] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.349353 75498 usertrap_amd64.go:122] [ 80: 80] Allocate a new trap: 0xc0015bc390 14 D0725 14:31:35.349418 75498 usertrap_amd64.go:225] [ 80: 80] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.374854 75498 task_signals.go:470] [ 81: 81] Notified of signal 56 D0725 14:31:35.374998 75498 task_signals.go:204] [ 81: 81] Signal 81, PID: 81, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.375087 75498 task_exit.go:204] [ 81: 81] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.376514 75498 task_exit.go:204] [ 81: 81] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.377151 75498 task_exit.go:204] [ 80: 80] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.378845 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.378925 75498 task_exit.go:204] [ 80: 80] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.378982 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.379065 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.379146 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.379742 75498 task_exit.go:204] [ 80: 80] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.382464 75498 usertrap_amd64.go:212] [ 82: 82] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.382540 75498 usertrap_amd64.go:122] [ 82: 82] Allocate a new trap: 0xc000048cf0 9 D0725 14:31:35.382983 75498 usertrap_amd64.go:225] [ 82: 82] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.385780 75498 usertrap_amd64.go:212] [ 82: 82] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.385849 75498 usertrap_amd64.go:122] [ 82: 82] Allocate a new trap: 0xc000048cf0 10 D0725 14:31:35.385949 75498 usertrap_amd64.go:225] [ 82: 82] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.387365 75498 usertrap_amd64.go:212] [ 82: 82] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.387418 75498 usertrap_amd64.go:122] [ 82: 82] Allocate a new trap: 0xc000048cf0 11 D0725 14:31:35.387528 75498 usertrap_amd64.go:225] [ 82: 82] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.388950 75498 usertrap_amd64.go:212] [ 82: 82] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.389004 75498 usertrap_amd64.go:122] [ 82: 82] Allocate a new trap: 0xc000048cf0 12 D0725 14:31:35.389058 75498 usertrap_amd64.go:225] [ 82: 82] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.390612 75498 usertrap_amd64.go:212] [ 82: 82] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.390665 75498 usertrap_amd64.go:122] [ 82: 82] Allocate a new trap: 0xc000048cf0 13 D0725 14:31:35.390712 75498 usertrap_amd64.go:225] [ 82: 82] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.390917 75498 usertrap_amd64.go:212] [ 82: 82] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.390963 75498 usertrap_amd64.go:122] [ 82: 82] Allocate a new trap: 0xc000048cf0 14 D0725 14:31:35.391022 75498 usertrap_amd64.go:225] [ 82: 82] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.412096 75498 task_signals.go:470] [ 83: 83] Notified of signal 56 D0725 14:31:35.412253 75498 task_signals.go:204] [ 83: 83] Signal 83, PID: 83, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.412354 75498 task_exit.go:204] [ 83: 83] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.413946 75498 task_exit.go:204] [ 83: 83] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.414426 75498 task_exit.go:204] [ 82: 82] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.416190 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.416261 75498 task_exit.go:204] [ 82: 82] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.416319 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.416346 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.416371 75498 task_exit.go:204] [ 82: 82] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.416431 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.418862 75498 usertrap_amd64.go:212] [ 84: 84] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.418952 75498 usertrap_amd64.go:122] [ 84: 84] Allocate a new trap: 0xc0015bccc0 9 D0725 14:31:35.419343 75498 usertrap_amd64.go:225] [ 84: 84] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.421311 75498 usertrap_amd64.go:212] [ 84: 84] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.421352 75498 usertrap_amd64.go:122] [ 84: 84] Allocate a new trap: 0xc0015bccc0 10 D0725 14:31:35.421410 75498 usertrap_amd64.go:225] [ 84: 84] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.422232 75498 usertrap_amd64.go:212] [ 84: 84] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.422271 75498 usertrap_amd64.go:122] [ 84: 84] Allocate a new trap: 0xc0015bccc0 11 D0725 14:31:35.422323 75498 usertrap_amd64.go:225] [ 84: 84] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.423398 75498 usertrap_amd64.go:212] [ 84: 84] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.423439 75498 usertrap_amd64.go:122] [ 84: 84] Allocate a new trap: 0xc0015bccc0 12 D0725 14:31:35.423493 75498 usertrap_amd64.go:225] [ 84: 84] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.424994 75498 usertrap_amd64.go:212] [ 84: 84] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.425048 75498 usertrap_amd64.go:122] [ 84: 84] Allocate a new trap: 0xc0015bccc0 13 D0725 14:31:35.425101 75498 usertrap_amd64.go:225] [ 84: 84] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.425255 75498 usertrap_amd64.go:212] [ 84: 84] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.425296 75498 usertrap_amd64.go:122] [ 84: 84] Allocate a new trap: 0xc0015bccc0 14 D0725 14:31:35.425333 75498 usertrap_amd64.go:225] [ 84: 84] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.450910 75498 task_signals.go:470] [ 85: 85] Notified of signal 56 D0725 14:31:35.451177 75498 task_signals.go:204] [ 85: 85] Signal 85, PID: 85, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.451249 75498 task_exit.go:204] [ 85: 85] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.452776 75498 task_exit.go:204] [ 85: 85] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.453601 75498 task_exit.go:204] [ 84: 84] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.455376 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.455456 75498 task_exit.go:204] [ 84: 84] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.455523 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.455632 75498 task_exit.go:204] [ 84: 84] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.455662 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.455771 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.459059 75498 usertrap_amd64.go:212] [ 86: 86] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.459147 75498 usertrap_amd64.go:122] [ 86: 86] Allocate a new trap: 0xc000bdc120 9 D0725 14:31:35.459580 75498 usertrap_amd64.go:225] [ 86: 86] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.461697 75498 usertrap_amd64.go:212] [ 86: 86] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.461742 75498 usertrap_amd64.go:122] [ 86: 86] Allocate a new trap: 0xc000bdc120 10 D0725 14:31:35.461787 75498 usertrap_amd64.go:225] [ 86: 86] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.462740 75498 usertrap_amd64.go:212] [ 86: 86] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.462789 75498 usertrap_amd64.go:122] [ 86: 86] Allocate a new trap: 0xc000bdc120 11 D0725 14:31:35.462838 75498 usertrap_amd64.go:225] [ 86: 86] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.463938 75498 usertrap_amd64.go:212] [ 86: 86] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.463987 75498 usertrap_amd64.go:122] [ 86: 86] Allocate a new trap: 0xc000bdc120 12 D0725 14:31:35.464031 75498 usertrap_amd64.go:225] [ 86: 86] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.465711 75498 usertrap_amd64.go:212] [ 86: 86] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.465776 75498 usertrap_amd64.go:122] [ 86: 86] Allocate a new trap: 0xc000bdc120 13 D0725 14:31:35.465890 75498 usertrap_amd64.go:225] [ 86: 86] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.466147 75498 usertrap_amd64.go:212] [ 86: 86] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.466205 75498 usertrap_amd64.go:122] [ 86: 86] Allocate a new trap: 0xc000bdc120 14 D0725 14:31:35.466252 75498 usertrap_amd64.go:225] [ 86: 86] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.487304 75498 task_signals.go:470] [ 87: 87] Notified of signal 56 D0725 14:31:35.487439 75498 task_signals.go:204] [ 87: 87] Signal 87, PID: 87, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.487512 75498 task_exit.go:204] [ 87: 87] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.488927 75498 task_exit.go:204] [ 87: 87] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.490154 75498 task_exit.go:204] [ 86: 86] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.492163 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.492237 75498 task_exit.go:204] [ 86: 86] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.492282 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.492297 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.492339 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.493144 75498 task_exit.go:204] [ 86: 86] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.495826 75498 usertrap_amd64.go:212] [ 88: 88] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.495893 75498 usertrap_amd64.go:122] [ 88: 88] Allocate a new trap: 0xc000bdcd80 9 D0725 14:31:35.496242 75498 usertrap_amd64.go:225] [ 88: 88] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.498129 75498 usertrap_amd64.go:212] [ 88: 88] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.498173 75498 usertrap_amd64.go:122] [ 88: 88] Allocate a new trap: 0xc000bdcd80 10 D0725 14:31:35.498217 75498 usertrap_amd64.go:225] [ 88: 88] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.499292 75498 usertrap_amd64.go:212] [ 88: 88] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.499337 75498 usertrap_amd64.go:122] [ 88: 88] Allocate a new trap: 0xc000bdcd80 11 D0725 14:31:35.499397 75498 usertrap_amd64.go:225] [ 88: 88] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.500587 75498 usertrap_amd64.go:212] [ 88: 88] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.500639 75498 usertrap_amd64.go:122] [ 88: 88] Allocate a new trap: 0xc000bdcd80 12 D0725 14:31:35.500690 75498 usertrap_amd64.go:225] [ 88: 88] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.502172 75498 usertrap_amd64.go:212] [ 88: 88] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.502214 75498 usertrap_amd64.go:122] [ 88: 88] Allocate a new trap: 0xc000bdcd80 13 D0725 14:31:35.502254 75498 usertrap_amd64.go:225] [ 88: 88] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.502427 75498 usertrap_amd64.go:212] [ 88: 88] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.502485 75498 usertrap_amd64.go:122] [ 88: 88] Allocate a new trap: 0xc000bdcd80 14 D0725 14:31:35.502531 75498 usertrap_amd64.go:225] [ 88: 88] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.523926 75498 task_signals.go:470] [ 89: 89] Notified of signal 56 D0725 14:31:35.524079 75498 task_signals.go:204] [ 89: 89] Signal 89, PID: 89, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.524208 75498 task_exit.go:204] [ 89: 89] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.526099 75498 task_exit.go:204] [ 89: 89] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.526214 75498 task_exit.go:204] [ 88: 88] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.528594 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.528690 75498 task_exit.go:204] [ 88: 88] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.528733 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.528760 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.528793 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.529021 75498 task_exit.go:204] [ 88: 88] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.532400 75498 usertrap_amd64.go:212] [ 90: 90] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.532470 75498 usertrap_amd64.go:122] [ 90: 90] Allocate a new trap: 0xc0015bc0c0 9 D0725 14:31:35.532841 75498 usertrap_amd64.go:225] [ 90: 90] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.534675 75498 usertrap_amd64.go:212] [ 90: 90] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.534719 75498 usertrap_amd64.go:122] [ 90: 90] Allocate a new trap: 0xc0015bc0c0 10 D0725 14:31:35.534763 75498 usertrap_amd64.go:225] [ 90: 90] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.535661 75498 usertrap_amd64.go:212] [ 90: 90] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.535718 75498 usertrap_amd64.go:122] [ 90: 90] Allocate a new trap: 0xc0015bc0c0 11 D0725 14:31:35.535777 75498 usertrap_amd64.go:225] [ 90: 90] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.537103 75498 usertrap_amd64.go:212] [ 90: 90] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.537176 75498 usertrap_amd64.go:122] [ 90: 90] Allocate a new trap: 0xc0015bc0c0 12 D0725 14:31:35.537264 75498 usertrap_amd64.go:225] [ 90: 90] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.539091 75498 usertrap_amd64.go:212] [ 90: 90] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.539128 75498 usertrap_amd64.go:122] [ 90: 90] Allocate a new trap: 0xc0015bc0c0 13 D0725 14:31:35.539180 75498 usertrap_amd64.go:225] [ 90: 90] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.539359 75498 usertrap_amd64.go:212] [ 90: 90] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.539403 75498 usertrap_amd64.go:122] [ 90: 90] Allocate a new trap: 0xc0015bc0c0 14 D0725 14:31:35.539452 75498 usertrap_amd64.go:225] [ 90: 90] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.560694 75498 task_signals.go:470] [ 91: 91] Notified of signal 56 D0725 14:31:35.560894 75498 task_signals.go:204] [ 91: 91] Signal 91, PID: 91, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.560972 75498 task_exit.go:204] [ 91: 91] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.562538 75498 task_exit.go:204] [ 91: 91] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.563218 75498 task_exit.go:204] [ 90: 90] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.565341 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.565448 75498 task_exit.go:204] [ 90: 90] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.565494 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.565624 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.565697 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.565597 75498 task_exit.go:204] [ 90: 90] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.568588 75498 usertrap_amd64.go:212] [ 92: 92] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.568715 75498 usertrap_amd64.go:122] [ 92: 92] Allocate a new trap: 0xc0002e4390 9 D0725 14:31:35.569160 75498 usertrap_amd64.go:225] [ 92: 92] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.571309 75498 usertrap_amd64.go:212] [ 92: 92] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.571356 75498 usertrap_amd64.go:122] [ 92: 92] Allocate a new trap: 0xc0002e4390 10 D0725 14:31:35.571415 75498 usertrap_amd64.go:225] [ 92: 92] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.572634 75498 usertrap_amd64.go:212] [ 92: 92] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.572691 75498 usertrap_amd64.go:122] [ 92: 92] Allocate a new trap: 0xc0002e4390 11 D0725 14:31:35.572746 75498 usertrap_amd64.go:225] [ 92: 92] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.574022 75498 usertrap_amd64.go:212] [ 92: 92] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.574071 75498 usertrap_amd64.go:122] [ 92: 92] Allocate a new trap: 0xc0002e4390 12 D0725 14:31:35.574120 75498 usertrap_amd64.go:225] [ 92: 92] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.575879 75498 usertrap_amd64.go:212] [ 92: 92] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.575949 75498 usertrap_amd64.go:122] [ 92: 92] Allocate a new trap: 0xc0002e4390 13 D0725 14:31:35.576068 75498 usertrap_amd64.go:225] [ 92: 92] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.576317 75498 usertrap_amd64.go:212] [ 92: 92] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.576370 75498 usertrap_amd64.go:122] [ 92: 92] Allocate a new trap: 0xc0002e4390 14 D0725 14:31:35.576461 75498 usertrap_amd64.go:225] [ 92: 92] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.597758 75498 task_signals.go:470] [ 93: 93] Notified of signal 56 D0725 14:31:35.597989 75498 task_signals.go:204] [ 93: 93] Signal 93, PID: 93, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.598093 75498 task_exit.go:204] [ 93: 93] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.600018 75498 task_exit.go:204] [ 93: 93] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.600644 75498 task_exit.go:204] [ 92: 92] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.602493 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.602570 75498 task_exit.go:204] [ 92: 92] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.602624 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.602630 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.602677 75498 task_exit.go:204] [ 92: 92] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.602719 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.605630 75498 usertrap_amd64.go:212] [ 94: 94] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.605733 75498 usertrap_amd64.go:122] [ 94: 94] Allocate a new trap: 0xc000bdd9b0 9 D0725 14:31:35.606252 75498 usertrap_amd64.go:225] [ 94: 94] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.609172 75498 usertrap_amd64.go:212] [ 94: 94] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.609230 75498 usertrap_amd64.go:122] [ 94: 94] Allocate a new trap: 0xc000bdd9b0 10 D0725 14:31:35.609292 75498 usertrap_amd64.go:225] [ 94: 94] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.610391 75498 usertrap_amd64.go:212] [ 94: 94] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.610459 75498 usertrap_amd64.go:122] [ 94: 94] Allocate a new trap: 0xc000bdd9b0 11 D0725 14:31:35.610519 75498 usertrap_amd64.go:225] [ 94: 94] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.611968 75498 usertrap_amd64.go:212] [ 94: 94] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.612036 75498 usertrap_amd64.go:122] [ 94: 94] Allocate a new trap: 0xc000bdd9b0 12 D0725 14:31:35.612094 75498 usertrap_amd64.go:225] [ 94: 94] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.613774 75498 usertrap_amd64.go:212] [ 94: 94] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.613817 75498 usertrap_amd64.go:122] [ 94: 94] Allocate a new trap: 0xc000bdd9b0 13 D0725 14:31:35.613865 75498 usertrap_amd64.go:225] [ 94: 94] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.614080 75498 usertrap_amd64.go:212] [ 94: 94] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.614127 75498 usertrap_amd64.go:122] [ 94: 94] Allocate a new trap: 0xc000bdd9b0 14 D0725 14:31:35.614175 75498 usertrap_amd64.go:225] [ 94: 94] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.637478 75498 task_signals.go:470] [ 95: 95] Notified of signal 56 D0725 14:31:35.637654 75498 task_signals.go:204] [ 95: 95] Signal 95, PID: 95, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.637744 75498 task_exit.go:204] [ 95: 95] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.639431 75498 task_exit.go:204] [ 95: 95] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.640785 75498 task_exit.go:204] [ 94: 94] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.642724 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.642792 75498 task_exit.go:204] [ 94: 94] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.642860 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.642937 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.642987 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.643728 75498 task_exit.go:204] [ 94: 94] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.646321 75498 usertrap_amd64.go:212] [ 96: 96] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.646391 75498 usertrap_amd64.go:122] [ 96: 96] Allocate a new trap: 0xc000bddbf0 9 D0725 14:31:35.646704 75498 usertrap_amd64.go:225] [ 96: 96] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.648918 75498 usertrap_amd64.go:212] [ 96: 96] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.648973 75498 usertrap_amd64.go:122] [ 96: 96] Allocate a new trap: 0xc000bddbf0 10 D0725 14:31:35.649070 75498 usertrap_amd64.go:225] [ 96: 96] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.650006 75498 usertrap_amd64.go:212] [ 96: 96] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.650054 75498 usertrap_amd64.go:122] [ 96: 96] Allocate a new trap: 0xc000bddbf0 11 D0725 14:31:35.650098 75498 usertrap_amd64.go:225] [ 96: 96] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.651321 75498 usertrap_amd64.go:212] [ 96: 96] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.651370 75498 usertrap_amd64.go:122] [ 96: 96] Allocate a new trap: 0xc000bddbf0 12 D0725 14:31:35.651415 75498 usertrap_amd64.go:225] [ 96: 96] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.652854 75498 usertrap_amd64.go:212] [ 96: 96] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.652914 75498 usertrap_amd64.go:122] [ 96: 96] Allocate a new trap: 0xc000bddbf0 13 D0725 14:31:35.652992 75498 usertrap_amd64.go:225] [ 96: 96] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.653203 75498 usertrap_amd64.go:212] [ 96: 96] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.653239 75498 usertrap_amd64.go:122] [ 96: 96] Allocate a new trap: 0xc000bddbf0 14 D0725 14:31:35.653288 75498 usertrap_amd64.go:225] [ 96: 96] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.675083 75498 task_signals.go:470] [ 97: 97] Notified of signal 56 D0725 14:31:35.675248 75498 task_signals.go:204] [ 97: 97] Signal 97, PID: 97, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.675315 75498 task_exit.go:204] [ 97: 97] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.676967 75498 task_exit.go:204] [ 97: 97] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.677983 75498 task_exit.go:204] [ 96: 96] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.680043 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.680121 75498 task_exit.go:204] [ 96: 96] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.680161 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.680181 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.680239 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.681265 75498 task_exit.go:204] [ 96: 96] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.683965 75498 usertrap_amd64.go:212] [ 98: 98] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.684039 75498 usertrap_amd64.go:122] [ 98: 98] Allocate a new trap: 0xc001898180 9 D0725 14:31:35.684455 75498 usertrap_amd64.go:225] [ 98: 98] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.687027 75498 usertrap_amd64.go:212] [ 98: 98] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.687084 75498 usertrap_amd64.go:122] [ 98: 98] Allocate a new trap: 0xc001898180 10 D0725 14:31:35.687129 75498 usertrap_amd64.go:225] [ 98: 98] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.688147 75498 usertrap_amd64.go:212] [ 98: 98] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.688196 75498 usertrap_amd64.go:122] [ 98: 98] Allocate a new trap: 0xc001898180 11 D0725 14:31:35.688240 75498 usertrap_amd64.go:225] [ 98: 98] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.689244 75498 usertrap_amd64.go:212] [ 98: 98] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.689301 75498 usertrap_amd64.go:122] [ 98: 98] Allocate a new trap: 0xc001898180 12 D0725 14:31:35.689392 75498 usertrap_amd64.go:225] [ 98: 98] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.691009 75498 usertrap_amd64.go:212] [ 98: 98] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.691081 75498 usertrap_amd64.go:122] [ 98: 98] Allocate a new trap: 0xc001898180 13 D0725 14:31:35.691134 75498 usertrap_amd64.go:225] [ 98: 98] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.691309 75498 usertrap_amd64.go:212] [ 98: 98] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.691363 75498 usertrap_amd64.go:122] [ 98: 98] Allocate a new trap: 0xc001898180 14 D0725 14:31:35.691414 75498 usertrap_amd64.go:225] [ 98: 98] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.716280 75498 task_signals.go:470] [ 99: 99] Notified of signal 56 D0725 14:31:35.716434 75498 task_signals.go:204] [ 99: 99] Signal 99, PID: 99, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.716508 75498 task_exit.go:204] [ 99: 99] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.718620 75498 task_exit.go:204] [ 99: 99] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.719884 75498 task_exit.go:204] [ 98: 98] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.721801 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.721874 75498 task_exit.go:204] [ 98: 98] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.721917 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.721936 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.721993 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.722014 75498 task_exit.go:204] [ 98: 98] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.725228 75498 usertrap_amd64.go:212] [ 100: 100] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.725306 75498 usertrap_amd64.go:122] [ 100: 100] Allocate a new trap: 0xc0003c8990 9 D0725 14:31:35.725659 75498 usertrap_amd64.go:225] [ 100: 100] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.727651 75498 usertrap_amd64.go:212] [ 100: 100] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.727697 75498 usertrap_amd64.go:122] [ 100: 100] Allocate a new trap: 0xc0003c8990 10 D0725 14:31:35.727741 75498 usertrap_amd64.go:225] [ 100: 100] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.728729 75498 usertrap_amd64.go:212] [ 100: 100] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.728774 75498 usertrap_amd64.go:122] [ 100: 100] Allocate a new trap: 0xc0003c8990 11 D0725 14:31:35.728815 75498 usertrap_amd64.go:225] [ 100: 100] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.729936 75498 usertrap_amd64.go:212] [ 100: 100] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.729984 75498 usertrap_amd64.go:122] [ 100: 100] Allocate a new trap: 0xc0003c8990 12 D0725 14:31:35.730026 75498 usertrap_amd64.go:225] [ 100: 100] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.731470 75498 usertrap_amd64.go:212] [ 100: 100] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.731525 75498 usertrap_amd64.go:122] [ 100: 100] Allocate a new trap: 0xc0003c8990 13 D0725 14:31:35.731573 75498 usertrap_amd64.go:225] [ 100: 100] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.731767 75498 usertrap_amd64.go:212] [ 100: 100] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.731819 75498 usertrap_amd64.go:122] [ 100: 100] Allocate a new trap: 0xc0003c8990 14 D0725 14:31:35.731863 75498 usertrap_amd64.go:225] [ 100: 100] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.759086 75498 task_signals.go:470] [ 101: 101] Notified of signal 56 D0725 14:31:35.759201 75498 task_signals.go:204] [ 101: 101] Signal 101, PID: 101, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.759302 75498 task_exit.go:204] [ 101: 101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.760793 75498 task_exit.go:204] [ 101: 101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.761289 75498 task_exit.go:204] [ 100: 100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.763614 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.763715 75498 task_exit.go:204] [ 100: 100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.763774 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.763825 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.763789 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.764997 75498 task_exit.go:204] [ 100: 100] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.767661 75498 usertrap_amd64.go:212] [ 102: 102] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.767760 75498 usertrap_amd64.go:122] [ 102: 102] Allocate a new trap: 0xc0002de5a0 9 D0725 14:31:35.768187 75498 usertrap_amd64.go:225] [ 102: 102] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.770904 75498 usertrap_amd64.go:212] [ 102: 102] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.770962 75498 usertrap_amd64.go:122] [ 102: 102] Allocate a new trap: 0xc0002de5a0 10 D0725 14:31:35.771043 75498 usertrap_amd64.go:225] [ 102: 102] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.772227 75498 usertrap_amd64.go:212] [ 102: 102] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.772286 75498 usertrap_amd64.go:122] [ 102: 102] Allocate a new trap: 0xc0002de5a0 11 D0725 14:31:35.772388 75498 usertrap_amd64.go:225] [ 102: 102] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.773641 75498 usertrap_amd64.go:212] [ 102: 102] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.773689 75498 usertrap_amd64.go:122] [ 102: 102] Allocate a new trap: 0xc0002de5a0 12 D0725 14:31:35.773738 75498 usertrap_amd64.go:225] [ 102: 102] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.775532 75498 usertrap_amd64.go:212] [ 102: 102] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.775574 75498 usertrap_amd64.go:122] [ 102: 102] Allocate a new trap: 0xc0002de5a0 13 D0725 14:31:35.775669 75498 usertrap_amd64.go:225] [ 102: 102] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.775836 75498 usertrap_amd64.go:212] [ 102: 102] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.775877 75498 usertrap_amd64.go:122] [ 102: 102] Allocate a new trap: 0xc0002de5a0 14 D0725 14:31:35.775942 75498 usertrap_amd64.go:225] [ 102: 102] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.803050 75498 task_signals.go:470] [ 103: 103] Notified of signal 56 D0725 14:31:35.803208 75498 task_signals.go:204] [ 103: 103] Signal 103, PID: 103, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.803324 75498 task_exit.go:204] [ 103: 103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.804776 75498 task_exit.go:204] [ 103: 103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.805670 75498 task_exit.go:204] [ 102: 102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.807450 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.807523 75498 task_exit.go:204] [ 102: 102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.807591 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.807682 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.807761 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.808307 75498 task_exit.go:204] [ 102: 102] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.810989 75498 usertrap_amd64.go:212] [ 104: 104] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.811082 75498 usertrap_amd64.go:122] [ 104: 104] Allocate a new trap: 0xc0003c89f0 9 D0725 14:31:35.811453 75498 usertrap_amd64.go:225] [ 104: 104] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.813489 75498 usertrap_amd64.go:212] [ 104: 104] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.813532 75498 usertrap_amd64.go:122] [ 104: 104] Allocate a new trap: 0xc0003c89f0 10 D0725 14:31:35.813583 75498 usertrap_amd64.go:225] [ 104: 104] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.814475 75498 usertrap_amd64.go:212] [ 104: 104] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.814541 75498 usertrap_amd64.go:122] [ 104: 104] Allocate a new trap: 0xc0003c89f0 11 D0725 14:31:35.814591 75498 usertrap_amd64.go:225] [ 104: 104] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.815880 75498 usertrap_amd64.go:212] [ 104: 104] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.815925 75498 usertrap_amd64.go:122] [ 104: 104] Allocate a new trap: 0xc0003c89f0 12 D0725 14:31:35.815979 75498 usertrap_amd64.go:225] [ 104: 104] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.817616 75498 usertrap_amd64.go:212] [ 104: 104] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.817668 75498 usertrap_amd64.go:122] [ 104: 104] Allocate a new trap: 0xc0003c89f0 13 D0725 14:31:35.817717 75498 usertrap_amd64.go:225] [ 104: 104] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.817874 75498 usertrap_amd64.go:212] [ 104: 104] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.817916 75498 usertrap_amd64.go:122] [ 104: 104] Allocate a new trap: 0xc0003c89f0 14 D0725 14:31:35.817954 75498 usertrap_amd64.go:225] [ 104: 104] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.839913 75498 task_signals.go:470] [ 105: 105] Notified of signal 56 D0725 14:31:35.840181 75498 task_signals.go:204] [ 105: 105] Signal 105, PID: 105, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.840287 75498 task_exit.go:204] [ 105: 105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.841807 75498 task_exit.go:204] [ 105: 105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.842422 75498 task_exit.go:204] [ 104: 104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.844588 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.844676 75498 task_exit.go:204] [ 104: 104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.844731 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.844758 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.844812 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.845757 75498 task_exit.go:204] [ 104: 104] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.848837 75498 usertrap_amd64.go:212] [ 106: 106] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.848945 75498 usertrap_amd64.go:122] [ 106: 106] Allocate a new trap: 0xc001898000 9 D0725 14:31:35.849380 75498 usertrap_amd64.go:225] [ 106: 106] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.851698 75498 usertrap_amd64.go:212] [ 106: 106] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.851745 75498 usertrap_amd64.go:122] [ 106: 106] Allocate a new trap: 0xc001898000 10 D0725 14:31:35.851793 75498 usertrap_amd64.go:225] [ 106: 106] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.852736 75498 usertrap_amd64.go:212] [ 106: 106] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.852776 75498 usertrap_amd64.go:122] [ 106: 106] Allocate a new trap: 0xc001898000 11 D0725 14:31:35.852816 75498 usertrap_amd64.go:225] [ 106: 106] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.853943 75498 usertrap_amd64.go:212] [ 106: 106] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.853994 75498 usertrap_amd64.go:122] [ 106: 106] Allocate a new trap: 0xc001898000 12 D0725 14:31:35.854053 75498 usertrap_amd64.go:225] [ 106: 106] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.855648 75498 usertrap_amd64.go:212] [ 106: 106] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.855713 75498 usertrap_amd64.go:122] [ 106: 106] Allocate a new trap: 0xc001898000 13 D0725 14:31:35.855767 75498 usertrap_amd64.go:225] [ 106: 106] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.855952 75498 usertrap_amd64.go:212] [ 106: 106] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.855988 75498 usertrap_amd64.go:122] [ 106: 106] Allocate a new trap: 0xc001898000 14 D0725 14:31:35.856024 75498 usertrap_amd64.go:225] [ 106: 106] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.877735 75498 task_signals.go:470] [ 107: 107] Notified of signal 56 D0725 14:31:35.877875 75498 task_signals.go:204] [ 107: 107] Signal 107, PID: 107, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.877962 75498 task_exit.go:204] [ 107: 107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.879373 75498 task_exit.go:204] [ 107: 107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.880424 75498 task_exit.go:204] [ 106: 106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.882455 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.882523 75498 task_exit.go:204] [ 106: 106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.882567 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.882691 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.882765 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.883054 75498 task_exit.go:204] [ 106: 106] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.885818 75498 usertrap_amd64.go:212] [ 108: 108] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.885914 75498 usertrap_amd64.go:122] [ 108: 108] Allocate a new trap: 0xc0015bc0f0 9 D0725 14:31:35.886360 75498 usertrap_amd64.go:225] [ 108: 108] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.889575 75498 usertrap_amd64.go:212] [ 108: 108] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.889635 75498 usertrap_amd64.go:122] [ 108: 108] Allocate a new trap: 0xc0015bc0f0 10 D0725 14:31:35.889715 75498 usertrap_amd64.go:225] [ 108: 108] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.890535 75498 usertrap_amd64.go:212] [ 108: 108] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.890595 75498 usertrap_amd64.go:122] [ 108: 108] Allocate a new trap: 0xc0015bc0f0 11 D0725 14:31:35.890656 75498 usertrap_amd64.go:225] [ 108: 108] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.891822 75498 usertrap_amd64.go:212] [ 108: 108] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.891865 75498 usertrap_amd64.go:122] [ 108: 108] Allocate a new trap: 0xc0015bc0f0 12 D0725 14:31:35.891912 75498 usertrap_amd64.go:225] [ 108: 108] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.893843 75498 usertrap_amd64.go:212] [ 108: 108] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.893906 75498 usertrap_amd64.go:122] [ 108: 108] Allocate a new trap: 0xc0015bc0f0 13 D0725 14:31:35.893961 75498 usertrap_amd64.go:225] [ 108: 108] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.894167 75498 usertrap_amd64.go:212] [ 108: 108] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.894216 75498 usertrap_amd64.go:122] [ 108: 108] Allocate a new trap: 0xc0015bc0f0 14 D0725 14:31:35.894256 75498 usertrap_amd64.go:225] [ 108: 108] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.916348 75498 task_signals.go:470] [ 109: 109] Notified of signal 56 D0725 14:31:35.916446 75498 task_signals.go:204] [ 109: 109] Signal 109, PID: 109, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.916522 75498 task_exit.go:204] [ 109: 109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.917905 75498 task_exit.go:204] [ 109: 109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.918602 75498 task_exit.go:204] [ 108: 108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.920499 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.920605 75498 task_exit.go:204] [ 108: 108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.920665 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.920778 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.920850 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.921222 75498 task_exit.go:204] [ 108: 108] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.923870 75498 usertrap_amd64.go:212] [ 110: 110] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.923949 75498 usertrap_amd64.go:122] [ 110: 110] Allocate a new trap: 0xc001898fc0 9 D0725 14:31:35.924246 75498 usertrap_amd64.go:225] [ 110: 110] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.926396 75498 usertrap_amd64.go:212] [ 110: 110] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.926446 75498 usertrap_amd64.go:122] [ 110: 110] Allocate a new trap: 0xc001898fc0 10 D0725 14:31:35.926493 75498 usertrap_amd64.go:225] [ 110: 110] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.927392 75498 usertrap_amd64.go:212] [ 110: 110] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.927439 75498 usertrap_amd64.go:122] [ 110: 110] Allocate a new trap: 0xc001898fc0 11 D0725 14:31:35.927490 75498 usertrap_amd64.go:225] [ 110: 110] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.928523 75498 usertrap_amd64.go:212] [ 110: 110] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.928576 75498 usertrap_amd64.go:122] [ 110: 110] Allocate a new trap: 0xc001898fc0 12 D0725 14:31:35.928619 75498 usertrap_amd64.go:225] [ 110: 110] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.930467 75498 usertrap_amd64.go:212] [ 110: 110] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.930510 75498 usertrap_amd64.go:122] [ 110: 110] Allocate a new trap: 0xc001898fc0 13 D0725 14:31:35.930552 75498 usertrap_amd64.go:225] [ 110: 110] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.930705 75498 usertrap_amd64.go:212] [ 110: 110] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.930747 75498 usertrap_amd64.go:122] [ 110: 110] Allocate a new trap: 0xc001898fc0 14 D0725 14:31:35.930805 75498 usertrap_amd64.go:225] [ 110: 110] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.953297 75498 task_signals.go:470] [ 111: 111] Notified of signal 56 D0725 14:31:35.953466 75498 task_signals.go:204] [ 111: 111] Signal 111, PID: 111, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.953534 75498 task_exit.go:204] [ 111: 111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.954863 75498 task_exit.go:204] [ 111: 111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.955861 75498 task_exit.go:204] [ 110: 110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.957603 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.957665 75498 task_exit.go:204] [ 110: 110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.957705 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.957782 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.957852 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.957891 75498 task_exit.go:204] [ 110: 110] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.960495 75498 usertrap_amd64.go:212] [ 112: 112] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.960562 75498 usertrap_amd64.go:122] [ 112: 112] Allocate a new trap: 0xc0015bce40 9 D0725 14:31:35.960895 75498 usertrap_amd64.go:225] [ 112: 112] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:35.962675 75498 usertrap_amd64.go:212] [ 112: 112] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:35.962719 75498 usertrap_amd64.go:122] [ 112: 112] Allocate a new trap: 0xc0015bce40 10 D0725 14:31:35.962780 75498 usertrap_amd64.go:225] [ 112: 112] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:35.963725 75498 usertrap_amd64.go:212] [ 112: 112] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:35.963778 75498 usertrap_amd64.go:122] [ 112: 112] Allocate a new trap: 0xc0015bce40 11 D0725 14:31:35.963826 75498 usertrap_amd64.go:225] [ 112: 112] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:35.964995 75498 usertrap_amd64.go:212] [ 112: 112] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:35.965058 75498 usertrap_amd64.go:122] [ 112: 112] Allocate a new trap: 0xc0015bce40 12 D0725 14:31:35.965113 75498 usertrap_amd64.go:225] [ 112: 112] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:35.966672 75498 usertrap_amd64.go:212] [ 112: 112] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:35.966714 75498 usertrap_amd64.go:122] [ 112: 112] Allocate a new trap: 0xc0015bce40 13 D0725 14:31:35.966764 75498 usertrap_amd64.go:225] [ 112: 112] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:35.966909 75498 usertrap_amd64.go:212] [ 112: 112] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:35.966943 75498 usertrap_amd64.go:122] [ 112: 112] Allocate a new trap: 0xc0015bce40 14 D0725 14:31:35.966990 75498 usertrap_amd64.go:225] [ 112: 112] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:35.988779 75498 task_signals.go:470] [ 113: 113] Notified of signal 56 D0725 14:31:35.988941 75498 task_signals.go:204] [ 113: 113] Signal 113, PID: 113, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:35.989029 75498 task_exit.go:204] [ 113: 113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.990934 75498 task_exit.go:204] [ 113: 113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.991578 75498 task_exit.go:204] [ 112: 112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:35.993687 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:35.993770 75498 task_exit.go:204] [ 112: 112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:35.993824 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:35.993893 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:35.993964 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:35.994935 75498 task_exit.go:204] [ 112: 112] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:35.998502 75498 usertrap_amd64.go:212] [ 114: 114] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:35.998595 75498 usertrap_amd64.go:122] [ 114: 114] Allocate a new trap: 0xc0015bd110 9 D0725 14:31:35.998959 75498 usertrap_amd64.go:225] [ 114: 114] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.001141 75498 usertrap_amd64.go:212] [ 114: 114] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.001200 75498 usertrap_amd64.go:122] [ 114: 114] Allocate a new trap: 0xc0015bd110 10 D0725 14:31:36.001257 75498 usertrap_amd64.go:225] [ 114: 114] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.002079 75498 usertrap_amd64.go:212] [ 114: 114] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.002119 75498 usertrap_amd64.go:122] [ 114: 114] Allocate a new trap: 0xc0015bd110 11 D0725 14:31:36.002170 75498 usertrap_amd64.go:225] [ 114: 114] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.003598 75498 usertrap_amd64.go:212] [ 114: 114] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.003690 75498 usertrap_amd64.go:122] [ 114: 114] Allocate a new trap: 0xc0015bd110 12 D0725 14:31:36.003758 75498 usertrap_amd64.go:225] [ 114: 114] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.005875 75498 usertrap_amd64.go:212] [ 114: 114] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.005936 75498 usertrap_amd64.go:122] [ 114: 114] Allocate a new trap: 0xc0015bd110 13 D0725 14:31:36.005985 75498 usertrap_amd64.go:225] [ 114: 114] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.006174 75498 usertrap_amd64.go:212] [ 114: 114] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.006211 75498 usertrap_amd64.go:122] [ 114: 114] Allocate a new trap: 0xc0015bd110 14 D0725 14:31:36.006269 75498 usertrap_amd64.go:225] [ 114: 114] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.028024 75498 task_signals.go:470] [ 115: 115] Notified of signal 56 D0725 14:31:36.028148 75498 task_signals.go:204] [ 115: 115] Signal 115, PID: 115, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.028224 75498 task_exit.go:204] [ 115: 115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.029766 75498 task_exit.go:204] [ 115: 115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.030743 75498 task_exit.go:204] [ 114: 114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.032486 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.032550 75498 task_exit.go:204] [ 114: 114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.032615 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.032711 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.032769 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.032771 75498 task_exit.go:204] [ 114: 114] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.035710 75498 usertrap_amd64.go:212] [ 116: 116] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.035785 75498 usertrap_amd64.go:122] [ 116: 116] Allocate a new trap: 0xc0015bd440 9 D0725 14:31:36.036146 75498 usertrap_amd64.go:225] [ 116: 116] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.038294 75498 usertrap_amd64.go:212] [ 116: 116] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.038350 75498 usertrap_amd64.go:122] [ 116: 116] Allocate a new trap: 0xc0015bd440 10 D0725 14:31:36.038397 75498 usertrap_amd64.go:225] [ 116: 116] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.039297 75498 usertrap_amd64.go:212] [ 116: 116] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.039339 75498 usertrap_amd64.go:122] [ 116: 116] Allocate a new trap: 0xc0015bd440 11 D0725 14:31:36.039390 75498 usertrap_amd64.go:225] [ 116: 116] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.040856 75498 usertrap_amd64.go:212] [ 116: 116] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.040901 75498 usertrap_amd64.go:122] [ 116: 116] Allocate a new trap: 0xc0015bd440 12 D0725 14:31:36.040943 75498 usertrap_amd64.go:225] [ 116: 116] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.042613 75498 usertrap_amd64.go:212] [ 116: 116] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.042656 75498 usertrap_amd64.go:122] [ 116: 116] Allocate a new trap: 0xc0015bd440 13 D0725 14:31:36.042702 75498 usertrap_amd64.go:225] [ 116: 116] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.042880 75498 usertrap_amd64.go:212] [ 116: 116] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.042930 75498 usertrap_amd64.go:122] [ 116: 116] Allocate a new trap: 0xc0015bd440 14 D0725 14:31:36.043008 75498 usertrap_amd64.go:225] [ 116: 116] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.067464 75498 task_signals.go:470] [ 117: 117] Notified of signal 56 D0725 14:31:36.067660 75498 task_signals.go:204] [ 117: 117] Signal 117, PID: 117, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.067740 75498 task_exit.go:204] [ 117: 117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.069416 75498 task_exit.go:204] [ 117: 117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.070572 75498 task_exit.go:204] [ 116: 116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.072770 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.072871 75498 task_exit.go:204] [ 116: 116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.072929 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.073030 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.073105 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.073116 75498 task_exit.go:204] [ 116: 116] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.076312 75498 usertrap_amd64.go:212] [ 118: 118] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.076372 75498 usertrap_amd64.go:122] [ 118: 118] Allocate a new trap: 0xc0002def90 9 D0725 14:31:36.076689 75498 usertrap_amd64.go:225] [ 118: 118] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.078676 75498 usertrap_amd64.go:212] [ 118: 118] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.078737 75498 usertrap_amd64.go:122] [ 118: 118] Allocate a new trap: 0xc0002def90 10 D0725 14:31:36.078781 75498 usertrap_amd64.go:225] [ 118: 118] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.079741 75498 usertrap_amd64.go:212] [ 118: 118] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.079797 75498 usertrap_amd64.go:122] [ 118: 118] Allocate a new trap: 0xc0002def90 11 D0725 14:31:36.079849 75498 usertrap_amd64.go:225] [ 118: 118] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.080996 75498 usertrap_amd64.go:212] [ 118: 118] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.081037 75498 usertrap_amd64.go:122] [ 118: 118] Allocate a new trap: 0xc0002def90 12 D0725 14:31:36.081079 75498 usertrap_amd64.go:225] [ 118: 118] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.082690 75498 usertrap_amd64.go:212] [ 118: 118] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.082766 75498 usertrap_amd64.go:122] [ 118: 118] Allocate a new trap: 0xc0002def90 13 D0725 14:31:36.082821 75498 usertrap_amd64.go:225] [ 118: 118] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.083029 75498 usertrap_amd64.go:212] [ 118: 118] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.083067 75498 usertrap_amd64.go:122] [ 118: 118] Allocate a new trap: 0xc0002def90 14 D0725 14:31:36.083103 75498 usertrap_amd64.go:225] [ 118: 118] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.106717 75498 task_signals.go:470] [ 119: 119] Notified of signal 56 D0725 14:31:36.106866 75498 task_signals.go:204] [ 119: 119] Signal 119, PID: 119, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.106980 75498 task_exit.go:204] [ 119: 119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.108838 75498 task_exit.go:204] [ 119: 119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.109501 75498 task_exit.go:204] [ 118: 118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.111837 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.111909 75498 task_exit.go:204] [ 118: 118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.111960 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.112064 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.112147 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.112770 75498 task_exit.go:204] [ 118: 118] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.115656 75498 usertrap_amd64.go:212] [ 120: 120] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.115756 75498 usertrap_amd64.go:122] [ 120: 120] Allocate a new trap: 0xc0002dfaa0 9 D0725 14:31:36.116244 75498 usertrap_amd64.go:225] [ 120: 120] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.118726 75498 usertrap_amd64.go:212] [ 120: 120] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.118778 75498 usertrap_amd64.go:122] [ 120: 120] Allocate a new trap: 0xc0002dfaa0 10 D0725 14:31:36.118835 75498 usertrap_amd64.go:225] [ 120: 120] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.119841 75498 usertrap_amd64.go:212] [ 120: 120] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.119896 75498 usertrap_amd64.go:122] [ 120: 120] Allocate a new trap: 0xc0002dfaa0 11 D0725 14:31:36.119942 75498 usertrap_amd64.go:225] [ 120: 120] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.121195 75498 usertrap_amd64.go:212] [ 120: 120] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.121244 75498 usertrap_amd64.go:122] [ 120: 120] Allocate a new trap: 0xc0002dfaa0 12 D0725 14:31:36.121297 75498 usertrap_amd64.go:225] [ 120: 120] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.123279 75498 usertrap_amd64.go:212] [ 120: 120] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.123337 75498 usertrap_amd64.go:122] [ 120: 120] Allocate a new trap: 0xc0002dfaa0 13 D0725 14:31:36.123419 75498 usertrap_amd64.go:225] [ 120: 120] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.123865 75498 usertrap_amd64.go:212] [ 120: 120] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.123939 75498 usertrap_amd64.go:122] [ 120: 120] Allocate a new trap: 0xc0002dfaa0 14 D0725 14:31:36.123988 75498 usertrap_amd64.go:225] [ 120: 120] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.149959 75498 task_signals.go:470] [ 121: 121] Notified of signal 56 D0725 14:31:36.150198 75498 task_signals.go:204] [ 121: 121] Signal 121, PID: 121, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.150314 75498 task_exit.go:204] [ 121: 121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.152271 75498 task_exit.go:204] [ 121: 121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.153107 75498 task_exit.go:204] [ 120: 120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.155383 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.155484 75498 task_exit.go:204] [ 120: 120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.155546 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.155581 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.155666 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.156296 75498 task_exit.go:204] [ 120: 120] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.159300 75498 usertrap_amd64.go:212] [ 122: 122] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.159386 75498 usertrap_amd64.go:122] [ 122: 122] Allocate a new trap: 0xc0000498f0 9 D0725 14:31:36.159797 75498 usertrap_amd64.go:225] [ 122: 122] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.165749 75498 usertrap_amd64.go:212] [ 122: 122] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.165830 75498 usertrap_amd64.go:122] [ 122: 122] Allocate a new trap: 0xc0000498f0 10 D0725 14:31:36.165919 75498 usertrap_amd64.go:225] [ 122: 122] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.166945 75498 usertrap_amd64.go:212] [ 122: 122] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.166989 75498 usertrap_amd64.go:122] [ 122: 122] Allocate a new trap: 0xc0000498f0 11 D0725 14:31:36.167058 75498 usertrap_amd64.go:225] [ 122: 122] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.168198 75498 usertrap_amd64.go:212] [ 122: 122] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.168243 75498 usertrap_amd64.go:122] [ 122: 122] Allocate a new trap: 0xc0000498f0 12 D0725 14:31:36.168298 75498 usertrap_amd64.go:225] [ 122: 122] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.170126 75498 usertrap_amd64.go:212] [ 122: 122] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.170174 75498 usertrap_amd64.go:122] [ 122: 122] Allocate a new trap: 0xc0000498f0 13 D0725 14:31:36.170264 75498 usertrap_amd64.go:225] [ 122: 122] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.170511 75498 usertrap_amd64.go:212] [ 122: 122] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.170561 75498 usertrap_amd64.go:122] [ 122: 122] Allocate a new trap: 0xc0000498f0 14 D0725 14:31:36.170621 75498 usertrap_amd64.go:225] [ 122: 122] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.191898 75498 task_signals.go:470] [ 123: 123] Notified of signal 56 D0725 14:31:36.192125 75498 task_signals.go:204] [ 123: 123] Signal 123, PID: 123, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.192268 75498 task_exit.go:204] [ 123: 123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.193916 75498 task_exit.go:204] [ 123: 123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.194154 75498 task_exit.go:204] [ 122: 122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.196082 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.196183 75498 task_exit.go:204] [ 122: 122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.196276 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.196258 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.196368 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.196383 75498 task_exit.go:204] [ 122: 122] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.199160 75498 usertrap_amd64.go:212] [ 124: 124] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.199241 75498 usertrap_amd64.go:122] [ 124: 124] Allocate a new trap: 0xc001898000 9 D0725 14:31:36.199678 75498 usertrap_amd64.go:225] [ 124: 124] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.202002 75498 usertrap_amd64.go:212] [ 124: 124] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.202060 75498 usertrap_amd64.go:122] [ 124: 124] Allocate a new trap: 0xc001898000 10 D0725 14:31:36.202107 75498 usertrap_amd64.go:225] [ 124: 124] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.203109 75498 usertrap_amd64.go:212] [ 124: 124] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.203153 75498 usertrap_amd64.go:122] [ 124: 124] Allocate a new trap: 0xc001898000 11 D0725 14:31:36.203239 75498 usertrap_amd64.go:225] [ 124: 124] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.204518 75498 usertrap_amd64.go:212] [ 124: 124] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.204569 75498 usertrap_amd64.go:122] [ 124: 124] Allocate a new trap: 0xc001898000 12 D0725 14:31:36.204662 75498 usertrap_amd64.go:225] [ 124: 124] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.206529 75498 usertrap_amd64.go:212] [ 124: 124] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.206588 75498 usertrap_amd64.go:122] [ 124: 124] Allocate a new trap: 0xc001898000 13 D0725 14:31:36.206651 75498 usertrap_amd64.go:225] [ 124: 124] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.206867 75498 usertrap_amd64.go:212] [ 124: 124] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.206916 75498 usertrap_amd64.go:122] [ 124: 124] Allocate a new trap: 0xc001898000 14 D0725 14:31:36.206976 75498 usertrap_amd64.go:225] [ 124: 124] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.232013 75498 task_signals.go:470] [ 125: 125] Notified of signal 56 D0725 14:31:36.232152 75498 task_signals.go:204] [ 125: 125] Signal 125, PID: 125, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.232267 75498 task_exit.go:204] [ 125: 125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.234052 75498 task_exit.go:204] [ 125: 125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.234757 75498 task_exit.go:204] [ 124: 124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.236524 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.236603 75498 task_exit.go:204] [ 124: 124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.236659 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.236692 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.236731 75498 task_exit.go:204] [ 124: 124] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.236748 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.239347 75498 usertrap_amd64.go:212] [ 126: 126] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.239405 75498 usertrap_amd64.go:122] [ 126: 126] Allocate a new trap: 0xc0002de1e0 9 D0725 14:31:36.239756 75498 usertrap_amd64.go:225] [ 126: 126] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.241907 75498 usertrap_amd64.go:212] [ 126: 126] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.241963 75498 usertrap_amd64.go:122] [ 126: 126] Allocate a new trap: 0xc0002de1e0 10 D0725 14:31:36.242026 75498 usertrap_amd64.go:225] [ 126: 126] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.242870 75498 usertrap_amd64.go:212] [ 126: 126] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.242926 75498 usertrap_amd64.go:122] [ 126: 126] Allocate a new trap: 0xc0002de1e0 11 D0725 14:31:36.242974 75498 usertrap_amd64.go:225] [ 126: 126] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.244534 75498 usertrap_amd64.go:212] [ 126: 126] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.244625 75498 usertrap_amd64.go:122] [ 126: 126] Allocate a new trap: 0xc0002de1e0 12 D0725 14:31:36.244688 75498 usertrap_amd64.go:225] [ 126: 126] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.246753 75498 usertrap_amd64.go:212] [ 126: 126] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.246834 75498 usertrap_amd64.go:122] [ 126: 126] Allocate a new trap: 0xc0002de1e0 13 D0725 14:31:36.246893 75498 usertrap_amd64.go:225] [ 126: 126] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.247082 75498 usertrap_amd64.go:212] [ 126: 126] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.247133 75498 usertrap_amd64.go:122] [ 126: 126] Allocate a new trap: 0xc0002de1e0 14 D0725 14:31:36.247173 75498 usertrap_amd64.go:225] [ 126: 126] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.269867 75498 task_signals.go:470] [ 127: 127] Notified of signal 56 D0725 14:31:36.270099 75498 task_signals.go:204] [ 127: 127] Signal 127, PID: 127, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.270190 75498 task_exit.go:204] [ 127: 127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.272262 75498 task_exit.go:204] [ 127: 127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.272817 75498 task_exit.go:204] [ 126: 126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.274849 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.274919 75498 task_exit.go:204] [ 126: 126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.274992 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.275091 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.275162 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.275654 75498 task_exit.go:204] [ 126: 126] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.278033 75498 usertrap_amd64.go:212] [ 128: 128] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.278116 75498 usertrap_amd64.go:122] [ 128: 128] Allocate a new trap: 0xc0002de9f0 9 D0725 14:31:36.278477 75498 usertrap_amd64.go:225] [ 128: 128] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.280434 75498 usertrap_amd64.go:212] [ 128: 128] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.280488 75498 usertrap_amd64.go:122] [ 128: 128] Allocate a new trap: 0xc0002de9f0 10 D0725 14:31:36.280554 75498 usertrap_amd64.go:225] [ 128: 128] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.281647 75498 usertrap_amd64.go:212] [ 128: 128] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.281703 75498 usertrap_amd64.go:122] [ 128: 128] Allocate a new trap: 0xc0002de9f0 11 D0725 14:31:36.281764 75498 usertrap_amd64.go:225] [ 128: 128] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.285424 75498 usertrap_amd64.go:212] [ 128: 128] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.285480 75498 usertrap_amd64.go:122] [ 128: 128] Allocate a new trap: 0xc0002de9f0 12 D0725 14:31:36.285536 75498 usertrap_amd64.go:225] [ 128: 128] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.287588 75498 usertrap_amd64.go:212] [ 128: 128] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.287677 75498 usertrap_amd64.go:122] [ 128: 128] Allocate a new trap: 0xc0002de9f0 13 D0725 14:31:36.287734 75498 usertrap_amd64.go:225] [ 128: 128] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.287940 75498 usertrap_amd64.go:212] [ 128: 128] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.287982 75498 usertrap_amd64.go:122] [ 128: 128] Allocate a new trap: 0xc0002de9f0 14 D0725 14:31:36.288068 75498 usertrap_amd64.go:225] [ 128: 128] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.311488 75498 task_signals.go:470] [ 129: 129] Notified of signal 56 D0725 14:31:36.311760 75498 task_signals.go:204] [ 129: 129] Signal 129, PID: 129, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.311855 75498 task_exit.go:204] [ 129: 129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.313360 75498 task_exit.go:204] [ 129: 129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.314116 75498 task_exit.go:204] [ 128: 128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.316027 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.316098 75498 task_exit.go:204] [ 128: 128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.316139 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.316129 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.316194 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.316203 75498 task_exit.go:204] [ 128: 128] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.318921 75498 usertrap_amd64.go:212] [ 130: 130] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.318994 75498 usertrap_amd64.go:122] [ 130: 130] Allocate a new trap: 0xc001899050 9 D0725 14:31:36.319292 75498 usertrap_amd64.go:225] [ 130: 130] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.321777 75498 usertrap_amd64.go:212] [ 130: 130] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.321857 75498 usertrap_amd64.go:122] [ 130: 130] Allocate a new trap: 0xc001899050 10 D0725 14:31:36.321912 75498 usertrap_amd64.go:225] [ 130: 130] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.323103 75498 usertrap_amd64.go:212] [ 130: 130] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.323165 75498 usertrap_amd64.go:122] [ 130: 130] Allocate a new trap: 0xc001899050 11 D0725 14:31:36.323247 75498 usertrap_amd64.go:225] [ 130: 130] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.324822 75498 usertrap_amd64.go:212] [ 130: 130] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.324885 75498 usertrap_amd64.go:122] [ 130: 130] Allocate a new trap: 0xc001899050 12 D0725 14:31:36.325002 75498 usertrap_amd64.go:225] [ 130: 130] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.326719 75498 usertrap_amd64.go:212] [ 130: 130] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.326778 75498 usertrap_amd64.go:122] [ 130: 130] Allocate a new trap: 0xc001899050 13 D0725 14:31:36.326836 75498 usertrap_amd64.go:225] [ 130: 130] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.327038 75498 usertrap_amd64.go:212] [ 130: 130] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.327076 75498 usertrap_amd64.go:122] [ 130: 130] Allocate a new trap: 0xc001899050 14 D0725 14:31:36.327132 75498 usertrap_amd64.go:225] [ 130: 130] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.349977 75498 task_signals.go:470] [ 131: 131] Notified of signal 56 D0725 14:31:36.350150 75498 task_signals.go:204] [ 131: 131] Signal 131, PID: 131, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.350255 75498 task_exit.go:204] [ 131: 131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.352190 75498 task_exit.go:204] [ 131: 131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.352900 75498 task_exit.go:204] [ 130: 130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.354617 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.354684 75498 task_exit.go:204] [ 130: 130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.354754 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.354821 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.354899 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.355219 75498 task_exit.go:204] [ 130: 130] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.358308 75498 usertrap_amd64.go:212] [ 132: 132] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.358378 75498 usertrap_amd64.go:122] [ 132: 132] Allocate a new trap: 0xc0000485a0 9 D0725 14:31:36.358688 75498 usertrap_amd64.go:225] [ 132: 132] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.360952 75498 usertrap_amd64.go:212] [ 132: 132] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.361007 75498 usertrap_amd64.go:122] [ 132: 132] Allocate a new trap: 0xc0000485a0 10 D0725 14:31:36.361052 75498 usertrap_amd64.go:225] [ 132: 132] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.361805 75498 usertrap_amd64.go:212] [ 132: 132] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.361843 75498 usertrap_amd64.go:122] [ 132: 132] Allocate a new trap: 0xc0000485a0 11 D0725 14:31:36.361893 75498 usertrap_amd64.go:225] [ 132: 132] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.362894 75498 usertrap_amd64.go:212] [ 132: 132] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.362948 75498 usertrap_amd64.go:122] [ 132: 132] Allocate a new trap: 0xc0000485a0 12 D0725 14:31:36.363001 75498 usertrap_amd64.go:225] [ 132: 132] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.364574 75498 usertrap_amd64.go:212] [ 132: 132] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.364625 75498 usertrap_amd64.go:122] [ 132: 132] Allocate a new trap: 0xc0000485a0 13 D0725 14:31:36.364668 75498 usertrap_amd64.go:225] [ 132: 132] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.364859 75498 usertrap_amd64.go:212] [ 132: 132] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.364898 75498 usertrap_amd64.go:122] [ 132: 132] Allocate a new trap: 0xc0000485a0 14 D0725 14:31:36.364982 75498 usertrap_amd64.go:225] [ 132: 132] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.388079 75498 task_signals.go:470] [ 133: 133] Notified of signal 56 D0725 14:31:36.388402 75498 task_signals.go:204] [ 133: 133] Signal 133, PID: 133, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.388507 75498 task_exit.go:204] [ 133: 133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.390208 75498 task_exit.go:204] [ 132: 132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.390335 75498 task_exit.go:204] [ 133: 133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.392080 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.392160 75498 task_exit.go:204] [ 132: 132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.392220 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.392264 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.392327 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.392323 75498 task_exit.go:204] [ 132: 132] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.394793 75498 usertrap_amd64.go:212] [ 134: 134] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.394861 75498 usertrap_amd64.go:122] [ 134: 134] Allocate a new trap: 0xc0003c91d0 9 D0725 14:31:36.395174 75498 usertrap_amd64.go:225] [ 134: 134] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.397151 75498 usertrap_amd64.go:212] [ 134: 134] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.397207 75498 usertrap_amd64.go:122] [ 134: 134] Allocate a new trap: 0xc0003c91d0 10 D0725 14:31:36.397253 75498 usertrap_amd64.go:225] [ 134: 134] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.398121 75498 usertrap_amd64.go:212] [ 134: 134] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.398164 75498 usertrap_amd64.go:122] [ 134: 134] Allocate a new trap: 0xc0003c91d0 11 D0725 14:31:36.398205 75498 usertrap_amd64.go:225] [ 134: 134] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.399103 75498 usertrap_amd64.go:212] [ 134: 134] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.399142 75498 usertrap_amd64.go:122] [ 134: 134] Allocate a new trap: 0xc0003c91d0 12 D0725 14:31:36.399182 75498 usertrap_amd64.go:225] [ 134: 134] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.400819 75498 usertrap_amd64.go:212] [ 134: 134] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.400862 75498 usertrap_amd64.go:122] [ 134: 134] Allocate a new trap: 0xc0003c91d0 13 D0725 14:31:36.400915 75498 usertrap_amd64.go:225] [ 134: 134] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.401066 75498 usertrap_amd64.go:212] [ 134: 134] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.401108 75498 usertrap_amd64.go:122] [ 134: 134] Allocate a new trap: 0xc0003c91d0 14 D0725 14:31:36.401155 75498 usertrap_amd64.go:225] [ 134: 134] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.422694 75498 task_signals.go:470] [ 135: 135] Notified of signal 56 D0725 14:31:36.422869 75498 task_signals.go:204] [ 135: 135] Signal 135, PID: 135, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.422966 75498 task_exit.go:204] [ 135: 135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.424704 75498 task_exit.go:204] [ 135: 135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.425208 75498 task_exit.go:204] [ 134: 134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.426906 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.426993 75498 task_exit.go:204] [ 134: 134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.427058 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.427044 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.427124 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.427439 75498 task_exit.go:204] [ 134: 134] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.430209 75498 usertrap_amd64.go:212] [ 136: 136] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.430285 75498 usertrap_amd64.go:122] [ 136: 136] Allocate a new trap: 0xc001899290 9 D0725 14:31:36.430595 75498 usertrap_amd64.go:225] [ 136: 136] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.432502 75498 usertrap_amd64.go:212] [ 136: 136] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.432555 75498 usertrap_amd64.go:122] [ 136: 136] Allocate a new trap: 0xc001899290 10 D0725 14:31:36.432597 75498 usertrap_amd64.go:225] [ 136: 136] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.433572 75498 usertrap_amd64.go:212] [ 136: 136] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.433619 75498 usertrap_amd64.go:122] [ 136: 136] Allocate a new trap: 0xc001899290 11 D0725 14:31:36.433667 75498 usertrap_amd64.go:225] [ 136: 136] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.434581 75498 usertrap_amd64.go:212] [ 136: 136] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.434620 75498 usertrap_amd64.go:122] [ 136: 136] Allocate a new trap: 0xc001899290 12 D0725 14:31:36.434667 75498 usertrap_amd64.go:225] [ 136: 136] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.436500 75498 usertrap_amd64.go:212] [ 136: 136] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.436543 75498 usertrap_amd64.go:122] [ 136: 136] Allocate a new trap: 0xc001899290 13 D0725 14:31:36.436600 75498 usertrap_amd64.go:225] [ 136: 136] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.436766 75498 usertrap_amd64.go:212] [ 136: 136] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.436808 75498 usertrap_amd64.go:122] [ 136: 136] Allocate a new trap: 0xc001899290 14 D0725 14:31:36.436846 75498 usertrap_amd64.go:225] [ 136: 136] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.459592 75498 task_signals.go:470] [ 137: 137] Notified of signal 56 D0725 14:31:36.459764 75498 task_signals.go:204] [ 137: 137] Signal 137, PID: 137, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.459859 75498 task_exit.go:204] [ 137: 137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.461296 75498 task_exit.go:204] [ 137: 137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.462698 75498 task_exit.go:204] [ 136: 136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.465158 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.465261 75498 task_exit.go:204] [ 136: 136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.465304 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.465331 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.465353 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.466139 75498 task_exit.go:204] [ 136: 136] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.468906 75498 usertrap_amd64.go:212] [ 138: 138] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.468990 75498 usertrap_amd64.go:122] [ 138: 138] Allocate a new trap: 0xc0015bc0f0 9 D0725 14:31:36.469350 75498 usertrap_amd64.go:225] [ 138: 138] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.471767 75498 usertrap_amd64.go:212] [ 138: 138] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.471824 75498 usertrap_amd64.go:122] [ 138: 138] Allocate a new trap: 0xc0015bc0f0 10 D0725 14:31:36.471875 75498 usertrap_amd64.go:225] [ 138: 138] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.472696 75498 usertrap_amd64.go:212] [ 138: 138] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.472754 75498 usertrap_amd64.go:122] [ 138: 138] Allocate a new trap: 0xc0015bc0f0 11 D0725 14:31:36.472797 75498 usertrap_amd64.go:225] [ 138: 138] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.473801 75498 usertrap_amd64.go:212] [ 138: 138] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.473848 75498 usertrap_amd64.go:122] [ 138: 138] Allocate a new trap: 0xc0015bc0f0 12 D0725 14:31:36.473894 75498 usertrap_amd64.go:225] [ 138: 138] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.475438 75498 usertrap_amd64.go:212] [ 138: 138] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.475481 75498 usertrap_amd64.go:122] [ 138: 138] Allocate a new trap: 0xc0015bc0f0 13 D0725 14:31:36.475558 75498 usertrap_amd64.go:225] [ 138: 138] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.475806 75498 usertrap_amd64.go:212] [ 138: 138] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.475850 75498 usertrap_amd64.go:122] [ 138: 138] Allocate a new trap: 0xc0015bc0f0 14 D0725 14:31:36.475889 75498 usertrap_amd64.go:225] [ 138: 138] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.497450 75498 task_signals.go:470] [ 139: 139] Notified of signal 56 D0725 14:31:36.497595 75498 task_signals.go:204] [ 139: 139] Signal 139, PID: 139, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.497672 75498 task_exit.go:204] [ 139: 139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.499179 75498 task_exit.go:204] [ 139: 139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.499760 75498 task_exit.go:204] [ 138: 138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.501909 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.501979 75498 task_exit.go:204] [ 138: 138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.502023 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.502036 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.502089 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.502840 75498 task_exit.go:204] [ 138: 138] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.505602 75498 usertrap_amd64.go:212] [ 140: 140] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.505681 75498 usertrap_amd64.go:122] [ 140: 140] Allocate a new trap: 0xc0004815f0 9 D0725 14:31:36.506013 75498 usertrap_amd64.go:225] [ 140: 140] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.508091 75498 usertrap_amd64.go:212] [ 140: 140] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.508136 75498 usertrap_amd64.go:122] [ 140: 140] Allocate a new trap: 0xc0004815f0 10 D0725 14:31:36.508195 75498 usertrap_amd64.go:225] [ 140: 140] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.508996 75498 usertrap_amd64.go:212] [ 140: 140] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.509045 75498 usertrap_amd64.go:122] [ 140: 140] Allocate a new trap: 0xc0004815f0 11 D0725 14:31:36.509085 75498 usertrap_amd64.go:225] [ 140: 140] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.510017 75498 usertrap_amd64.go:212] [ 140: 140] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.510060 75498 usertrap_amd64.go:122] [ 140: 140] Allocate a new trap: 0xc0004815f0 12 D0725 14:31:36.510107 75498 usertrap_amd64.go:225] [ 140: 140] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.511564 75498 usertrap_amd64.go:212] [ 140: 140] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.511640 75498 usertrap_amd64.go:122] [ 140: 140] Allocate a new trap: 0xc0004815f0 13 D0725 14:31:36.511695 75498 usertrap_amd64.go:225] [ 140: 140] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.511849 75498 usertrap_amd64.go:212] [ 140: 140] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.511884 75498 usertrap_amd64.go:122] [ 140: 140] Allocate a new trap: 0xc0004815f0 14 D0725 14:31:36.511928 75498 usertrap_amd64.go:225] [ 140: 140] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.536099 75498 task_signals.go:470] [ 141: 141] Notified of signal 56 D0725 14:31:36.536202 75498 task_signals.go:204] [ 141: 141] Signal 141, PID: 141, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.536298 75498 task_exit.go:204] [ 141: 141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.537786 75498 task_exit.go:204] [ 141: 141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.538720 75498 task_exit.go:204] [ 140: 140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.540606 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.540686 75498 task_exit.go:204] [ 140: 140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.540754 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.540849 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.540910 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.540931 75498 task_exit.go:204] [ 140: 140] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.544103 75498 usertrap_amd64.go:212] [ 142: 142] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.544210 75498 usertrap_amd64.go:122] [ 142: 142] Allocate a new trap: 0xc000049530 9 D0725 14:31:36.544522 75498 usertrap_amd64.go:225] [ 142: 142] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.547071 75498 usertrap_amd64.go:212] [ 142: 142] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.547121 75498 usertrap_amd64.go:122] [ 142: 142] Allocate a new trap: 0xc000049530 10 D0725 14:31:36.547167 75498 usertrap_amd64.go:225] [ 142: 142] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.548037 75498 usertrap_amd64.go:212] [ 142: 142] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.548081 75498 usertrap_amd64.go:122] [ 142: 142] Allocate a new trap: 0xc000049530 11 D0725 14:31:36.548141 75498 usertrap_amd64.go:225] [ 142: 142] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.549152 75498 usertrap_amd64.go:212] [ 142: 142] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.549207 75498 usertrap_amd64.go:122] [ 142: 142] Allocate a new trap: 0xc000049530 12 D0725 14:31:36.549275 75498 usertrap_amd64.go:225] [ 142: 142] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.550745 75498 usertrap_amd64.go:212] [ 142: 142] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.550786 75498 usertrap_amd64.go:122] [ 142: 142] Allocate a new trap: 0xc000049530 13 D0725 14:31:36.550825 75498 usertrap_amd64.go:225] [ 142: 142] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.550981 75498 usertrap_amd64.go:212] [ 142: 142] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.551027 75498 usertrap_amd64.go:122] [ 142: 142] Allocate a new trap: 0xc000049530 14 D0725 14:31:36.551067 75498 usertrap_amd64.go:225] [ 142: 142] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.575655 75498 task_signals.go:470] [ 143: 143] Notified of signal 56 D0725 14:31:36.575794 75498 task_signals.go:204] [ 143: 143] Signal 143, PID: 143, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.575868 75498 task_exit.go:204] [ 143: 143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.577370 75498 task_exit.go:204] [ 143: 143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.578459 75498 task_exit.go:204] [ 142: 142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.580320 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.580380 75498 task_exit.go:204] [ 142: 142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.580425 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.580447 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.580511 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.580751 75498 task_exit.go:204] [ 142: 142] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.583915 75498 usertrap_amd64.go:212] [ 144: 144] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.584011 75498 usertrap_amd64.go:122] [ 144: 144] Allocate a new trap: 0xc0002df710 9 D0725 14:31:36.584438 75498 usertrap_amd64.go:225] [ 144: 144] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.586879 75498 usertrap_amd64.go:212] [ 144: 144] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.586936 75498 usertrap_amd64.go:122] [ 144: 144] Allocate a new trap: 0xc0002df710 10 D0725 14:31:36.587003 75498 usertrap_amd64.go:225] [ 144: 144] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.587962 75498 usertrap_amd64.go:212] [ 144: 144] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.588017 75498 usertrap_amd64.go:122] [ 144: 144] Allocate a new trap: 0xc0002df710 11 D0725 14:31:36.588062 75498 usertrap_amd64.go:225] [ 144: 144] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.589451 75498 usertrap_amd64.go:212] [ 144: 144] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.589520 75498 usertrap_amd64.go:122] [ 144: 144] Allocate a new trap: 0xc0002df710 12 D0725 14:31:36.589571 75498 usertrap_amd64.go:225] [ 144: 144] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.591060 75498 usertrap_amd64.go:212] [ 144: 144] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.591115 75498 usertrap_amd64.go:122] [ 144: 144] Allocate a new trap: 0xc0002df710 13 D0725 14:31:36.591166 75498 usertrap_amd64.go:225] [ 144: 144] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.591323 75498 usertrap_amd64.go:212] [ 144: 144] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.591366 75498 usertrap_amd64.go:122] [ 144: 144] Allocate a new trap: 0xc0002df710 14 D0725 14:31:36.591407 75498 usertrap_amd64.go:225] [ 144: 144] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.617740 75498 task_signals.go:470] [ 145: 145] Notified of signal 56 D0725 14:31:36.617944 75498 task_signals.go:204] [ 145: 145] Signal 145, PID: 145, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.618073 75498 task_exit.go:204] [ 145: 145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.619670 75498 task_exit.go:204] [ 145: 145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.620290 75498 task_exit.go:204] [ 144: 144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.622021 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.622084 75498 task_exit.go:204] [ 144: 144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.622179 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.622216 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.622272 75498 task_exit.go:204] [ 144: 144] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.622275 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.625321 75498 usertrap_amd64.go:212] [ 146: 146] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.625414 75498 usertrap_amd64.go:122] [ 146: 146] Allocate a new trap: 0xc0002e4180 9 D0725 14:31:36.625704 75498 usertrap_amd64.go:225] [ 146: 146] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.627776 75498 usertrap_amd64.go:212] [ 146: 146] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.627833 75498 usertrap_amd64.go:122] [ 146: 146] Allocate a new trap: 0xc0002e4180 10 D0725 14:31:36.627904 75498 usertrap_amd64.go:225] [ 146: 146] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.628804 75498 usertrap_amd64.go:212] [ 146: 146] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.628850 75498 usertrap_amd64.go:122] [ 146: 146] Allocate a new trap: 0xc0002e4180 11 D0725 14:31:36.628915 75498 usertrap_amd64.go:225] [ 146: 146] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.629863 75498 usertrap_amd64.go:212] [ 146: 146] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.629901 75498 usertrap_amd64.go:122] [ 146: 146] Allocate a new trap: 0xc0002e4180 12 D0725 14:31:36.629951 75498 usertrap_amd64.go:225] [ 146: 146] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.631440 75498 usertrap_amd64.go:212] [ 146: 146] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.631480 75498 usertrap_amd64.go:122] [ 146: 146] Allocate a new trap: 0xc0002e4180 13 D0725 14:31:36.631520 75498 usertrap_amd64.go:225] [ 146: 146] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.631685 75498 usertrap_amd64.go:212] [ 146: 146] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.631730 75498 usertrap_amd64.go:122] [ 146: 146] Allocate a new trap: 0xc0002e4180 14 D0725 14:31:36.631770 75498 usertrap_amd64.go:225] [ 146: 146] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.652555 75498 task_signals.go:470] [ 147: 147] Notified of signal 56 D0725 14:31:36.652654 75498 task_signals.go:204] [ 147: 147] Signal 147, PID: 147, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.652770 75498 task_exit.go:204] [ 147: 147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.654226 75498 task_exit.go:204] [ 147: 147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.654324 75498 task_exit.go:204] [ 146: 146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.655951 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.656011 75498 task_exit.go:204] [ 146: 146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.656065 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.656160 75498 task_exit.go:204] [ 146: 146] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.656157 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.656215 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.658553 75498 usertrap_amd64.go:212] [ 148: 148] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.658638 75498 usertrap_amd64.go:122] [ 148: 148] Allocate a new trap: 0xc0000484b0 9 D0725 14:31:36.658965 75498 usertrap_amd64.go:225] [ 148: 148] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.661026 75498 usertrap_amd64.go:212] [ 148: 148] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.661071 75498 usertrap_amd64.go:122] [ 148: 148] Allocate a new trap: 0xc0000484b0 10 D0725 14:31:36.661148 75498 usertrap_amd64.go:225] [ 148: 148] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.661905 75498 usertrap_amd64.go:212] [ 148: 148] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.661961 75498 usertrap_amd64.go:122] [ 148: 148] Allocate a new trap: 0xc0000484b0 11 D0725 14:31:36.662019 75498 usertrap_amd64.go:225] [ 148: 148] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.663145 75498 usertrap_amd64.go:212] [ 148: 148] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.663207 75498 usertrap_amd64.go:122] [ 148: 148] Allocate a new trap: 0xc0000484b0 12 D0725 14:31:36.663255 75498 usertrap_amd64.go:225] [ 148: 148] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.664978 75498 usertrap_amd64.go:212] [ 148: 148] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.665032 75498 usertrap_amd64.go:122] [ 148: 148] Allocate a new trap: 0xc0000484b0 13 D0725 14:31:36.665075 75498 usertrap_amd64.go:225] [ 148: 148] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.665278 75498 usertrap_amd64.go:212] [ 148: 148] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.665318 75498 usertrap_amd64.go:122] [ 148: 148] Allocate a new trap: 0xc0000484b0 14 D0725 14:31:36.665366 75498 usertrap_amd64.go:225] [ 148: 148] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.685436 75498 task_signals.go:470] [ 149: 149] Notified of signal 56 D0725 14:31:36.685571 75498 task_signals.go:204] [ 149: 149] Signal 149, PID: 149, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.685651 75498 task_exit.go:204] [ 149: 149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.687176 75498 task_exit.go:204] [ 149: 149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.687594 75498 task_exit.go:204] [ 148: 148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.689293 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.689367 75498 task_exit.go:204] [ 148: 148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.689417 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.689440 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.689505 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.690367 75498 task_exit.go:204] [ 148: 148] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.692990 75498 usertrap_amd64.go:212] [ 150: 150] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.693052 75498 usertrap_amd64.go:122] [ 150: 150] Allocate a new trap: 0xc0004806c0 9 D0725 14:31:36.693446 75498 usertrap_amd64.go:225] [ 150: 150] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.695370 75498 usertrap_amd64.go:212] [ 150: 150] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.695419 75498 usertrap_amd64.go:122] [ 150: 150] Allocate a new trap: 0xc0004806c0 10 D0725 14:31:36.695461 75498 usertrap_amd64.go:225] [ 150: 150] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.696376 75498 usertrap_amd64.go:212] [ 150: 150] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.696417 75498 usertrap_amd64.go:122] [ 150: 150] Allocate a new trap: 0xc0004806c0 11 D0725 14:31:36.696468 75498 usertrap_amd64.go:225] [ 150: 150] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.697797 75498 usertrap_amd64.go:212] [ 150: 150] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.697851 75498 usertrap_amd64.go:122] [ 150: 150] Allocate a new trap: 0xc0004806c0 12 D0725 14:31:36.697928 75498 usertrap_amd64.go:225] [ 150: 150] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.699525 75498 usertrap_amd64.go:212] [ 150: 150] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.699577 75498 usertrap_amd64.go:122] [ 150: 150] Allocate a new trap: 0xc0004806c0 13 D0725 14:31:36.699700 75498 usertrap_amd64.go:225] [ 150: 150] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.699912 75498 usertrap_amd64.go:212] [ 150: 150] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.699949 75498 usertrap_amd64.go:122] [ 150: 150] Allocate a new trap: 0xc0004806c0 14 D0725 14:31:36.700020 75498 usertrap_amd64.go:225] [ 150: 150] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.720196 75498 task_signals.go:470] [ 151: 151] Notified of signal 56 D0725 14:31:36.720454 75498 task_signals.go:204] [ 151: 151] Signal 151, PID: 151, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.720555 75498 task_exit.go:204] [ 151: 151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.722386 75498 task_exit.go:204] [ 151: 151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.723183 75498 task_exit.go:204] [ 150: 150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.725143 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.725239 75498 task_exit.go:204] [ 150: 150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.725305 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.725405 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.725460 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.725907 75498 task_exit.go:204] [ 150: 150] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.728832 75498 usertrap_amd64.go:212] [ 152: 152] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.728911 75498 usertrap_amd64.go:122] [ 152: 152] Allocate a new trap: 0xc0002de1e0 9 D0725 14:31:36.729214 75498 usertrap_amd64.go:225] [ 152: 152] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.731369 75498 usertrap_amd64.go:212] [ 152: 152] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.731430 75498 usertrap_amd64.go:122] [ 152: 152] Allocate a new trap: 0xc0002de1e0 10 D0725 14:31:36.731474 75498 usertrap_amd64.go:225] [ 152: 152] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.732423 75498 usertrap_amd64.go:212] [ 152: 152] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.732467 75498 usertrap_amd64.go:122] [ 152: 152] Allocate a new trap: 0xc0002de1e0 11 D0725 14:31:36.732524 75498 usertrap_amd64.go:225] [ 152: 152] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.733649 75498 usertrap_amd64.go:212] [ 152: 152] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.733687 75498 usertrap_amd64.go:122] [ 152: 152] Allocate a new trap: 0xc0002de1e0 12 D0725 14:31:36.733734 75498 usertrap_amd64.go:225] [ 152: 152] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.735382 75498 usertrap_amd64.go:212] [ 152: 152] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.735423 75498 usertrap_amd64.go:122] [ 152: 152] Allocate a new trap: 0xc0002de1e0 13 D0725 14:31:36.735466 75498 usertrap_amd64.go:225] [ 152: 152] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.735664 75498 usertrap_amd64.go:212] [ 152: 152] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.735721 75498 usertrap_amd64.go:122] [ 152: 152] Allocate a new trap: 0xc0002de1e0 14 D0725 14:31:36.735774 75498 usertrap_amd64.go:225] [ 152: 152] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.756465 75498 task_signals.go:470] [ 153: 153] Notified of signal 56 D0725 14:31:36.756595 75498 task_signals.go:204] [ 153: 153] Signal 153, PID: 153, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.756677 75498 task_exit.go:204] [ 153: 153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.758666 75498 task_exit.go:204] [ 153: 153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.759263 75498 task_exit.go:204] [ 152: 152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.761226 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.761324 75498 task_exit.go:204] [ 152: 152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.761399 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.761398 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.761454 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.761468 75498 task_exit.go:204] [ 152: 152] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.764351 75498 usertrap_amd64.go:212] [ 154: 154] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.764415 75498 usertrap_amd64.go:122] [ 154: 154] Allocate a new trap: 0xc0002de7b0 9 D0725 14:31:36.764719 75498 usertrap_amd64.go:225] [ 154: 154] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.766789 75498 usertrap_amd64.go:212] [ 154: 154] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.766830 75498 usertrap_amd64.go:122] [ 154: 154] Allocate a new trap: 0xc0002de7b0 10 D0725 14:31:36.766884 75498 usertrap_amd64.go:225] [ 154: 154] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.767867 75498 usertrap_amd64.go:212] [ 154: 154] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.767915 75498 usertrap_amd64.go:122] [ 154: 154] Allocate a new trap: 0xc0002de7b0 11 D0725 14:31:36.767959 75498 usertrap_amd64.go:225] [ 154: 154] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.768962 75498 usertrap_amd64.go:212] [ 154: 154] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.769000 75498 usertrap_amd64.go:122] [ 154: 154] Allocate a new trap: 0xc0002de7b0 12 D0725 14:31:36.769040 75498 usertrap_amd64.go:225] [ 154: 154] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.770508 75498 usertrap_amd64.go:212] [ 154: 154] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.770548 75498 usertrap_amd64.go:122] [ 154: 154] Allocate a new trap: 0xc0002de7b0 13 D0725 14:31:36.770588 75498 usertrap_amd64.go:225] [ 154: 154] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.770723 75498 usertrap_amd64.go:212] [ 154: 154] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.770766 75498 usertrap_amd64.go:122] [ 154: 154] Allocate a new trap: 0xc0002de7b0 14 D0725 14:31:36.770813 75498 usertrap_amd64.go:225] [ 154: 154] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.791158 75498 task_signals.go:470] [ 155: 155] Notified of signal 56 D0725 14:31:36.791274 75498 task_signals.go:204] [ 155: 155] Signal 155, PID: 155, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.791370 75498 task_exit.go:204] [ 155: 155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.793042 75498 task_exit.go:204] [ 155: 155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.793584 75498 task_exit.go:204] [ 154: 154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.795792 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.795874 75498 task_exit.go:204] [ 154: 154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.795910 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.795935 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.795951 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.796313 75498 task_exit.go:204] [ 154: 154] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.798950 75498 usertrap_amd64.go:212] [ 156: 156] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.799015 75498 usertrap_amd64.go:122] [ 156: 156] Allocate a new trap: 0xc000480c60 9 D0725 14:31:36.799301 75498 usertrap_amd64.go:225] [ 156: 156] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.801228 75498 usertrap_amd64.go:212] [ 156: 156] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.801280 75498 usertrap_amd64.go:122] [ 156: 156] Allocate a new trap: 0xc000480c60 10 D0725 14:31:36.801336 75498 usertrap_amd64.go:225] [ 156: 156] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.802170 75498 usertrap_amd64.go:212] [ 156: 156] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.802211 75498 usertrap_amd64.go:122] [ 156: 156] Allocate a new trap: 0xc000480c60 11 D0725 14:31:36.802272 75498 usertrap_amd64.go:225] [ 156: 156] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.803339 75498 usertrap_amd64.go:212] [ 156: 156] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.803382 75498 usertrap_amd64.go:122] [ 156: 156] Allocate a new trap: 0xc000480c60 12 D0725 14:31:36.803422 75498 usertrap_amd64.go:225] [ 156: 156] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.805238 75498 usertrap_amd64.go:212] [ 156: 156] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.805283 75498 usertrap_amd64.go:122] [ 156: 156] Allocate a new trap: 0xc000480c60 13 D0725 14:31:36.805329 75498 usertrap_amd64.go:225] [ 156: 156] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.805478 75498 usertrap_amd64.go:212] [ 156: 156] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.805520 75498 usertrap_amd64.go:122] [ 156: 156] Allocate a new trap: 0xc000480c60 14 D0725 14:31:36.805573 75498 usertrap_amd64.go:225] [ 156: 156] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.828618 75498 task_signals.go:470] [ 157: 157] Notified of signal 56 D0725 14:31:36.828756 75498 task_signals.go:204] [ 157: 157] Signal 157, PID: 157, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.828864 75498 task_exit.go:204] [ 157: 157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.830254 75498 task_exit.go:204] [ 157: 157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.830894 75498 task_exit.go:204] [ 156: 156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.832855 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.832921 75498 task_exit.go:204] [ 156: 156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.832973 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.832968 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.833022 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.833865 75498 task_exit.go:204] [ 156: 156] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.836463 75498 usertrap_amd64.go:212] [ 158: 158] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.836524 75498 usertrap_amd64.go:122] [ 158: 158] Allocate a new trap: 0xc0015bd980 9 D0725 14:31:36.836818 75498 usertrap_amd64.go:225] [ 158: 158] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.838573 75498 usertrap_amd64.go:212] [ 158: 158] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.838623 75498 usertrap_amd64.go:122] [ 158: 158] Allocate a new trap: 0xc0015bd980 10 D0725 14:31:36.838673 75498 usertrap_amd64.go:225] [ 158: 158] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.839422 75498 usertrap_amd64.go:212] [ 158: 158] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.839462 75498 usertrap_amd64.go:122] [ 158: 158] Allocate a new trap: 0xc0015bd980 11 D0725 14:31:36.839502 75498 usertrap_amd64.go:225] [ 158: 158] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.840377 75498 usertrap_amd64.go:212] [ 158: 158] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.840427 75498 usertrap_amd64.go:122] [ 158: 158] Allocate a new trap: 0xc0015bd980 12 D0725 14:31:36.840486 75498 usertrap_amd64.go:225] [ 158: 158] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.841996 75498 usertrap_amd64.go:212] [ 158: 158] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.842050 75498 usertrap_amd64.go:122] [ 158: 158] Allocate a new trap: 0xc0015bd980 13 D0725 14:31:36.842105 75498 usertrap_amd64.go:225] [ 158: 158] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.842251 75498 usertrap_amd64.go:212] [ 158: 158] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.842292 75498 usertrap_amd64.go:122] [ 158: 158] Allocate a new trap: 0xc0015bd980 14 D0725 14:31:36.842336 75498 usertrap_amd64.go:225] [ 158: 158] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.862926 75498 task_signals.go:470] [ 159: 159] Notified of signal 56 D0725 14:31:36.863093 75498 task_signals.go:204] [ 159: 159] Signal 159, PID: 159, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.863190 75498 task_exit.go:204] [ 159: 159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.864642 75498 task_exit.go:204] [ 159: 159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.865376 75498 task_exit.go:204] [ 158: 158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.866994 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.867064 75498 task_exit.go:204] [ 158: 158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.867111 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.867171 75498 task_exit.go:204] [ 158: 158] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.867201 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.867249 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.869907 75498 usertrap_amd64.go:212] [ 160: 160] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.870005 75498 usertrap_amd64.go:122] [ 160: 160] Allocate a new trap: 0xc0003c94d0 9 D0725 14:31:36.870431 75498 usertrap_amd64.go:225] [ 160: 160] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.873141 75498 usertrap_amd64.go:212] [ 160: 160] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.873217 75498 usertrap_amd64.go:122] [ 160: 160] Allocate a new trap: 0xc0003c94d0 10 D0725 14:31:36.873271 75498 usertrap_amd64.go:225] [ 160: 160] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.874122 75498 usertrap_amd64.go:212] [ 160: 160] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.874164 75498 usertrap_amd64.go:122] [ 160: 160] Allocate a new trap: 0xc0003c94d0 11 D0725 14:31:36.874216 75498 usertrap_amd64.go:225] [ 160: 160] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.875228 75498 usertrap_amd64.go:212] [ 160: 160] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.875268 75498 usertrap_amd64.go:122] [ 160: 160] Allocate a new trap: 0xc0003c94d0 12 D0725 14:31:36.875318 75498 usertrap_amd64.go:225] [ 160: 160] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.877038 75498 usertrap_amd64.go:212] [ 160: 160] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.877098 75498 usertrap_amd64.go:122] [ 160: 160] Allocate a new trap: 0xc0003c94d0 13 D0725 14:31:36.877151 75498 usertrap_amd64.go:225] [ 160: 160] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.877311 75498 usertrap_amd64.go:212] [ 160: 160] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.877356 75498 usertrap_amd64.go:122] [ 160: 160] Allocate a new trap: 0xc0003c94d0 14 D0725 14:31:36.877402 75498 usertrap_amd64.go:225] [ 160: 160] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.898260 75498 task_signals.go:470] [ 161: 161] Notified of signal 56 D0725 14:31:36.898509 75498 task_signals.go:204] [ 161: 161] Signal 161, PID: 161, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.898614 75498 task_exit.go:204] [ 161: 161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.900202 75498 task_exit.go:204] [ 161: 161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.900689 75498 task_exit.go:204] [ 160: 160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.902423 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.902502 75498 task_exit.go:204] [ 160: 160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.902551 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.902657 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.902700 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.903550 75498 task_exit.go:204] [ 160: 160] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.906272 75498 usertrap_amd64.go:212] [ 162: 162] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.906333 75498 usertrap_amd64.go:122] [ 162: 162] Allocate a new trap: 0xc000bdcd50 9 D0725 14:31:36.906613 75498 usertrap_amd64.go:225] [ 162: 162] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.908429 75498 usertrap_amd64.go:212] [ 162: 162] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.908474 75498 usertrap_amd64.go:122] [ 162: 162] Allocate a new trap: 0xc000bdcd50 10 D0725 14:31:36.908520 75498 usertrap_amd64.go:225] [ 162: 162] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.909405 75498 usertrap_amd64.go:212] [ 162: 162] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.909450 75498 usertrap_amd64.go:122] [ 162: 162] Allocate a new trap: 0xc000bdcd50 11 D0725 14:31:36.909492 75498 usertrap_amd64.go:225] [ 162: 162] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.910402 75498 usertrap_amd64.go:212] [ 162: 162] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.910472 75498 usertrap_amd64.go:122] [ 162: 162] Allocate a new trap: 0xc000bdcd50 12 D0725 14:31:36.910538 75498 usertrap_amd64.go:225] [ 162: 162] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.912146 75498 usertrap_amd64.go:212] [ 162: 162] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.912217 75498 usertrap_amd64.go:122] [ 162: 162] Allocate a new trap: 0xc000bdcd50 13 D0725 14:31:36.912267 75498 usertrap_amd64.go:225] [ 162: 162] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.912455 75498 usertrap_amd64.go:212] [ 162: 162] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.912491 75498 usertrap_amd64.go:122] [ 162: 162] Allocate a new trap: 0xc000bdcd50 14 D0725 14:31:36.912551 75498 usertrap_amd64.go:225] [ 162: 162] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.933619 75498 task_signals.go:470] [ 163: 163] Notified of signal 56 D0725 14:31:36.933750 75498 task_signals.go:204] [ 163: 163] Signal 163, PID: 163, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.933883 75498 task_exit.go:204] [ 163: 163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.935705 75498 task_exit.go:204] [ 163: 163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.936518 75498 task_exit.go:204] [ 162: 162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.938280 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.938398 75498 task_exit.go:204] [ 162: 162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.938444 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.938472 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.938486 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.938559 75498 task_exit.go:204] [ 162: 162] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.941218 75498 usertrap_amd64.go:212] [ 164: 164] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.941284 75498 usertrap_amd64.go:122] [ 164: 164] Allocate a new trap: 0xc000bdd0e0 9 D0725 14:31:36.941600 75498 usertrap_amd64.go:225] [ 164: 164] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.943457 75498 usertrap_amd64.go:212] [ 164: 164] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.943513 75498 usertrap_amd64.go:122] [ 164: 164] Allocate a new trap: 0xc000bdd0e0 10 D0725 14:31:36.943562 75498 usertrap_amd64.go:225] [ 164: 164] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.944327 75498 usertrap_amd64.go:212] [ 164: 164] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.944376 75498 usertrap_amd64.go:122] [ 164: 164] Allocate a new trap: 0xc000bdd0e0 11 D0725 14:31:36.944418 75498 usertrap_amd64.go:225] [ 164: 164] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.945322 75498 usertrap_amd64.go:212] [ 164: 164] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.945381 75498 usertrap_amd64.go:122] [ 164: 164] Allocate a new trap: 0xc000bdd0e0 12 D0725 14:31:36.945442 75498 usertrap_amd64.go:225] [ 164: 164] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.946995 75498 usertrap_amd64.go:212] [ 164: 164] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.947050 75498 usertrap_amd64.go:122] [ 164: 164] Allocate a new trap: 0xc000bdd0e0 13 D0725 14:31:36.947125 75498 usertrap_amd64.go:225] [ 164: 164] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.947375 75498 usertrap_amd64.go:212] [ 164: 164] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.947451 75498 usertrap_amd64.go:122] [ 164: 164] Allocate a new trap: 0xc000bdd0e0 14 D0725 14:31:36.947523 75498 usertrap_amd64.go:225] [ 164: 164] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:36.970994 75498 task_signals.go:470] [ 165: 165] Notified of signal 56 D0725 14:31:36.971132 75498 task_signals.go:204] [ 165: 165] Signal 165, PID: 165, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:36.971236 75498 task_exit.go:204] [ 165: 165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.973086 75498 task_exit.go:204] [ 165: 165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.973471 75498 task_exit.go:204] [ 164: 164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:36.975302 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:36.975397 75498 task_exit.go:204] [ 164: 164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:36.975483 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:36.975576 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:36.975671 75498 task_exit.go:204] [ 164: 164] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:36.975688 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:36.978598 75498 usertrap_amd64.go:212] [ 166: 166] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:36.978665 75498 usertrap_amd64.go:122] [ 166: 166] Allocate a new trap: 0xc000bdd560 9 D0725 14:31:36.978994 75498 usertrap_amd64.go:225] [ 166: 166] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:36.980976 75498 usertrap_amd64.go:212] [ 166: 166] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:36.981022 75498 usertrap_amd64.go:122] [ 166: 166] Allocate a new trap: 0xc000bdd560 10 D0725 14:31:36.981085 75498 usertrap_amd64.go:225] [ 166: 166] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:36.982047 75498 usertrap_amd64.go:212] [ 166: 166] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:36.982106 75498 usertrap_amd64.go:122] [ 166: 166] Allocate a new trap: 0xc000bdd560 11 D0725 14:31:36.982169 75498 usertrap_amd64.go:225] [ 166: 166] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:36.983642 75498 usertrap_amd64.go:212] [ 166: 166] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:36.983709 75498 usertrap_amd64.go:122] [ 166: 166] Allocate a new trap: 0xc000bdd560 12 D0725 14:31:36.983804 75498 usertrap_amd64.go:225] [ 166: 166] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:36.985677 75498 usertrap_amd64.go:212] [ 166: 166] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:36.985757 75498 usertrap_amd64.go:122] [ 166: 166] Allocate a new trap: 0xc000bdd560 13 D0725 14:31:36.985809 75498 usertrap_amd64.go:225] [ 166: 166] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:36.986074 75498 usertrap_amd64.go:212] [ 166: 166] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:36.986140 75498 usertrap_amd64.go:122] [ 166: 166] Allocate a new trap: 0xc000bdd560 14 D0725 14:31:36.986229 75498 usertrap_amd64.go:225] [ 166: 166] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.011529 75498 task_signals.go:470] [ 167: 167] Notified of signal 56 D0725 14:31:37.011753 75498 task_signals.go:204] [ 167: 167] Signal 167, PID: 167, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.011824 75498 task_exit.go:204] [ 167: 167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.013887 75498 task_exit.go:204] [ 167: 167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.014378 75498 task_exit.go:204] [ 166: 166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.016548 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.016613 75498 task_exit.go:204] [ 166: 166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.016654 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.016744 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.016818 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.017402 75498 task_exit.go:204] [ 166: 166] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.020259 75498 usertrap_amd64.go:212] [ 168: 168] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.020327 75498 usertrap_amd64.go:122] [ 168: 168] Allocate a new trap: 0xc000048b10 9 D0725 14:31:37.020650 75498 usertrap_amd64.go:225] [ 168: 168] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.022554 75498 usertrap_amd64.go:212] [ 168: 168] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.022598 75498 usertrap_amd64.go:122] [ 168: 168] Allocate a new trap: 0xc000048b10 10 D0725 14:31:37.022642 75498 usertrap_amd64.go:225] [ 168: 168] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.023751 75498 usertrap_amd64.go:212] [ 168: 168] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.023795 75498 usertrap_amd64.go:122] [ 168: 168] Allocate a new trap: 0xc000048b10 11 D0725 14:31:37.023848 75498 usertrap_amd64.go:225] [ 168: 168] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.024888 75498 usertrap_amd64.go:212] [ 168: 168] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.024934 75498 usertrap_amd64.go:122] [ 168: 168] Allocate a new trap: 0xc000048b10 12 D0725 14:31:37.025007 75498 usertrap_amd64.go:225] [ 168: 168] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.026630 75498 usertrap_amd64.go:212] [ 168: 168] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.026691 75498 usertrap_amd64.go:122] [ 168: 168] Allocate a new trap: 0xc000048b10 13 D0725 14:31:37.026757 75498 usertrap_amd64.go:225] [ 168: 168] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.027016 75498 usertrap_amd64.go:212] [ 168: 168] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.027066 75498 usertrap_amd64.go:122] [ 168: 168] Allocate a new trap: 0xc000048b10 14 D0725 14:31:37.027121 75498 usertrap_amd64.go:225] [ 168: 168] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.049983 75498 task_signals.go:470] [ 169: 169] Notified of signal 56 D0725 14:31:37.050203 75498 task_signals.go:204] [ 169: 169] Signal 169, PID: 169, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.050330 75498 task_exit.go:204] [ 169: 169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.051778 75498 task_exit.go:204] [ 169: 169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.052381 75498 task_exit.go:204] [ 168: 168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.054290 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.054355 75498 task_exit.go:204] [ 168: 168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.054396 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.054495 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.054558 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.055328 75498 task_exit.go:204] [ 168: 168] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.057908 75498 usertrap_amd64.go:212] [ 170: 170] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.057978 75498 usertrap_amd64.go:122] [ 170: 170] Allocate a new trap: 0xc000bdd710 9 D0725 14:31:37.058369 75498 usertrap_amd64.go:225] [ 170: 170] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.060510 75498 usertrap_amd64.go:212] [ 170: 170] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.060562 75498 usertrap_amd64.go:122] [ 170: 170] Allocate a new trap: 0xc000bdd710 10 D0725 14:31:37.060608 75498 usertrap_amd64.go:225] [ 170: 170] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.061522 75498 usertrap_amd64.go:212] [ 170: 170] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.061573 75498 usertrap_amd64.go:122] [ 170: 170] Allocate a new trap: 0xc000bdd710 11 D0725 14:31:37.061615 75498 usertrap_amd64.go:225] [ 170: 170] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.062723 75498 usertrap_amd64.go:212] [ 170: 170] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.062775 75498 usertrap_amd64.go:122] [ 170: 170] Allocate a new trap: 0xc000bdd710 12 D0725 14:31:37.062832 75498 usertrap_amd64.go:225] [ 170: 170] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.064414 75498 usertrap_amd64.go:212] [ 170: 170] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.064457 75498 usertrap_amd64.go:122] [ 170: 170] Allocate a new trap: 0xc000bdd710 13 D0725 14:31:37.064500 75498 usertrap_amd64.go:225] [ 170: 170] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.064798 75498 usertrap_amd64.go:212] [ 170: 170] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.064853 75498 usertrap_amd64.go:122] [ 170: 170] Allocate a new trap: 0xc000bdd710 14 D0725 14:31:37.064952 75498 usertrap_amd64.go:225] [ 170: 170] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.086745 75498 task_signals.go:470] [ 171: 171] Notified of signal 56 D0725 14:31:37.086845 75498 task_signals.go:204] [ 171: 171] Signal 171, PID: 171, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.086946 75498 task_exit.go:204] [ 171: 171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.088290 75498 task_exit.go:204] [ 171: 171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.088949 75498 task_exit.go:204] [ 170: 170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.090923 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.090998 75498 task_exit.go:204] [ 170: 170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.091047 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.091080 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.091154 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.091652 75498 task_exit.go:204] [ 170: 170] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.094218 75498 usertrap_amd64.go:212] [ 172: 172] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.094278 75498 usertrap_amd64.go:122] [ 172: 172] Allocate a new trap: 0xc001898bd0 9 D0725 14:31:37.094583 75498 usertrap_amd64.go:225] [ 172: 172] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.096622 75498 usertrap_amd64.go:212] [ 172: 172] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.096670 75498 usertrap_amd64.go:122] [ 172: 172] Allocate a new trap: 0xc001898bd0 10 D0725 14:31:37.096712 75498 usertrap_amd64.go:225] [ 172: 172] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.097532 75498 usertrap_amd64.go:212] [ 172: 172] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.097585 75498 usertrap_amd64.go:122] [ 172: 172] Allocate a new trap: 0xc001898bd0 11 D0725 14:31:37.097634 75498 usertrap_amd64.go:225] [ 172: 172] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.098707 75498 usertrap_amd64.go:212] [ 172: 172] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.098749 75498 usertrap_amd64.go:122] [ 172: 172] Allocate a new trap: 0xc001898bd0 12 D0725 14:31:37.098808 75498 usertrap_amd64.go:225] [ 172: 172] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.100363 75498 usertrap_amd64.go:212] [ 172: 172] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.100435 75498 usertrap_amd64.go:122] [ 172: 172] Allocate a new trap: 0xc001898bd0 13 D0725 14:31:37.100522 75498 usertrap_amd64.go:225] [ 172: 172] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.100739 75498 usertrap_amd64.go:212] [ 172: 172] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.100799 75498 usertrap_amd64.go:122] [ 172: 172] Allocate a new trap: 0xc001898bd0 14 D0725 14:31:37.100863 75498 usertrap_amd64.go:225] [ 172: 172] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.126229 75498 task_signals.go:470] [ 173: 173] Notified of signal 56 D0725 14:31:37.126383 75498 task_signals.go:204] [ 173: 173] Signal 173, PID: 173, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.126492 75498 task_exit.go:204] [ 173: 173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.128016 75498 task_exit.go:204] [ 173: 173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.128659 75498 task_exit.go:204] [ 172: 172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.130846 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.130941 75498 task_exit.go:204] [ 172: 172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.131005 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.131031 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.131166 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.131895 75498 task_exit.go:204] [ 172: 172] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.134593 75498 usertrap_amd64.go:212] [ 174: 174] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.134689 75498 usertrap_amd64.go:122] [ 174: 174] Allocate a new trap: 0xc000048210 9 D0725 14:31:37.135022 75498 usertrap_amd64.go:225] [ 174: 174] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.136874 75498 usertrap_amd64.go:212] [ 174: 174] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.136918 75498 usertrap_amd64.go:122] [ 174: 174] Allocate a new trap: 0xc000048210 10 D0725 14:31:37.136972 75498 usertrap_amd64.go:225] [ 174: 174] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.137801 75498 usertrap_amd64.go:212] [ 174: 174] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.137842 75498 usertrap_amd64.go:122] [ 174: 174] Allocate a new trap: 0xc000048210 11 D0725 14:31:37.137894 75498 usertrap_amd64.go:225] [ 174: 174] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.139099 75498 usertrap_amd64.go:212] [ 174: 174] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.139142 75498 usertrap_amd64.go:122] [ 174: 174] Allocate a new trap: 0xc000048210 12 D0725 14:31:37.139184 75498 usertrap_amd64.go:225] [ 174: 174] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.140945 75498 usertrap_amd64.go:212] [ 174: 174] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.141001 75498 usertrap_amd64.go:122] [ 174: 174] Allocate a new trap: 0xc000048210 13 D0725 14:31:37.141056 75498 usertrap_amd64.go:225] [ 174: 174] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.141234 75498 usertrap_amd64.go:212] [ 174: 174] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.141270 75498 usertrap_amd64.go:122] [ 174: 174] Allocate a new trap: 0xc000048210 14 D0725 14:31:37.141322 75498 usertrap_amd64.go:225] [ 174: 174] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.163529 75498 task_signals.go:470] [ 175: 175] Notified of signal 56 D0725 14:31:37.163663 75498 task_signals.go:204] [ 175: 175] Signal 175, PID: 175, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.163742 75498 task_exit.go:204] [ 175: 175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.165113 75498 task_exit.go:204] [ 175: 175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.166151 75498 task_exit.go:204] [ 174: 174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.168360 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.168448 75498 task_exit.go:204] [ 174: 174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.168490 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.168537 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.168624 75498 task_exit.go:204] [ 174: 174] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.168548 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.171682 75498 usertrap_amd64.go:212] [ 176: 176] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.171786 75498 usertrap_amd64.go:122] [ 176: 176] Allocate a new trap: 0xc002ad80c0 9 D0725 14:31:37.172128 75498 usertrap_amd64.go:225] [ 176: 176] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.174453 75498 usertrap_amd64.go:212] [ 176: 176] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.174512 75498 usertrap_amd64.go:122] [ 176: 176] Allocate a new trap: 0xc002ad80c0 10 D0725 14:31:37.174569 75498 usertrap_amd64.go:225] [ 176: 176] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.175523 75498 usertrap_amd64.go:212] [ 176: 176] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.175565 75498 usertrap_amd64.go:122] [ 176: 176] Allocate a new trap: 0xc002ad80c0 11 D0725 14:31:37.175681 75498 usertrap_amd64.go:225] [ 176: 176] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.177094 75498 usertrap_amd64.go:212] [ 176: 176] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.177173 75498 usertrap_amd64.go:122] [ 176: 176] Allocate a new trap: 0xc002ad80c0 12 D0725 14:31:37.177246 75498 usertrap_amd64.go:225] [ 176: 176] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.179308 75498 usertrap_amd64.go:212] [ 176: 176] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.179359 75498 usertrap_amd64.go:122] [ 176: 176] Allocate a new trap: 0xc002ad80c0 13 D0725 14:31:37.179410 75498 usertrap_amd64.go:225] [ 176: 176] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.179564 75498 usertrap_amd64.go:212] [ 176: 176] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.179639 75498 usertrap_amd64.go:122] [ 176: 176] Allocate a new trap: 0xc002ad80c0 14 D0725 14:31:37.179700 75498 usertrap_amd64.go:225] [ 176: 176] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.201480 75498 task_signals.go:470] [ 177: 177] Notified of signal 56 D0725 14:31:37.201703 75498 task_signals.go:204] [ 177: 177] Signal 177, PID: 177, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.201777 75498 task_exit.go:204] [ 177: 177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.203313 75498 task_exit.go:204] [ 177: 177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.204213 75498 task_exit.go:204] [ 176: 176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.206617 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.206716 75498 task_exit.go:204] [ 176: 176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.206784 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.206798 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.206846 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.207750 75498 task_exit.go:204] [ 176: 176] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.210266 75498 usertrap_amd64.go:212] [ 178: 178] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.210326 75498 usertrap_amd64.go:122] [ 178: 178] Allocate a new trap: 0xc002ad8b10 9 D0725 14:31:37.210652 75498 usertrap_amd64.go:225] [ 178: 178] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.212723 75498 usertrap_amd64.go:212] [ 178: 178] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.212786 75498 usertrap_amd64.go:122] [ 178: 178] Allocate a new trap: 0xc002ad8b10 10 D0725 14:31:37.212873 75498 usertrap_amd64.go:225] [ 178: 178] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.213942 75498 usertrap_amd64.go:212] [ 178: 178] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.213999 75498 usertrap_amd64.go:122] [ 178: 178] Allocate a new trap: 0xc002ad8b10 11 D0725 14:31:37.214063 75498 usertrap_amd64.go:225] [ 178: 178] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.215394 75498 usertrap_amd64.go:212] [ 178: 178] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.215473 75498 usertrap_amd64.go:122] [ 178: 178] Allocate a new trap: 0xc002ad8b10 12 D0725 14:31:37.215534 75498 usertrap_amd64.go:225] [ 178: 178] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.217220 75498 usertrap_amd64.go:212] [ 178: 178] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.217264 75498 usertrap_amd64.go:122] [ 178: 178] Allocate a new trap: 0xc002ad8b10 13 D0725 14:31:37.217316 75498 usertrap_amd64.go:225] [ 178: 178] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.217512 75498 usertrap_amd64.go:212] [ 178: 178] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.217555 75498 usertrap_amd64.go:122] [ 178: 178] Allocate a new trap: 0xc002ad8b10 14 D0725 14:31:37.217600 75498 usertrap_amd64.go:225] [ 178: 178] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.239742 75498 task_signals.go:470] [ 179: 179] Notified of signal 56 D0725 14:31:37.239907 75498 task_signals.go:204] [ 179: 179] Signal 179, PID: 179, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.240006 75498 task_exit.go:204] [ 179: 179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.241585 75498 task_exit.go:204] [ 179: 179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.242345 75498 task_exit.go:204] [ 178: 178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.244611 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.244738 75498 task_exit.go:204] [ 178: 178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.244799 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.244920 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.245010 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.245725 75498 task_exit.go:204] [ 178: 178] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.248446 75498 usertrap_amd64.go:212] [ 180: 180] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.248554 75498 usertrap_amd64.go:122] [ 180: 180] Allocate a new trap: 0xc0002e4e70 9 D0725 14:31:37.249048 75498 usertrap_amd64.go:225] [ 180: 180] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.251646 75498 usertrap_amd64.go:212] [ 180: 180] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.251715 75498 usertrap_amd64.go:122] [ 180: 180] Allocate a new trap: 0xc0002e4e70 10 D0725 14:31:37.251769 75498 usertrap_amd64.go:225] [ 180: 180] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.252727 75498 usertrap_amd64.go:212] [ 180: 180] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.252768 75498 usertrap_amd64.go:122] [ 180: 180] Allocate a new trap: 0xc0002e4e70 11 D0725 14:31:37.252819 75498 usertrap_amd64.go:225] [ 180: 180] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.254078 75498 usertrap_amd64.go:212] [ 180: 180] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.254134 75498 usertrap_amd64.go:122] [ 180: 180] Allocate a new trap: 0xc0002e4e70 12 D0725 14:31:37.254236 75498 usertrap_amd64.go:225] [ 180: 180] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.255830 75498 usertrap_amd64.go:212] [ 180: 180] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.255899 75498 usertrap_amd64.go:122] [ 180: 180] Allocate a new trap: 0xc0002e4e70 13 D0725 14:31:37.255951 75498 usertrap_amd64.go:225] [ 180: 180] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.256176 75498 usertrap_amd64.go:212] [ 180: 180] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.256229 75498 usertrap_amd64.go:122] [ 180: 180] Allocate a new trap: 0xc0002e4e70 14 D0725 14:31:37.256293 75498 usertrap_amd64.go:225] [ 180: 180] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.278919 75498 task_signals.go:470] [ 181: 181] Notified of signal 56 D0725 14:31:37.279036 75498 task_signals.go:204] [ 181: 181] Signal 181, PID: 181, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.279149 75498 task_exit.go:204] [ 181: 181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.280822 75498 task_exit.go:204] [ 181: 181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.281603 75498 task_exit.go:204] [ 180: 180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.284396 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.284490 75498 task_exit.go:204] [ 180: 180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.284535 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.284634 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.284713 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.285236 75498 task_exit.go:204] [ 180: 180] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.287838 75498 usertrap_amd64.go:212] [ 182: 182] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.287909 75498 usertrap_amd64.go:122] [ 182: 182] Allocate a new trap: 0xc000048c90 9 D0725 14:31:37.288209 75498 usertrap_amd64.go:225] [ 182: 182] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.290771 75498 usertrap_amd64.go:212] [ 182: 182] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.290824 75498 usertrap_amd64.go:122] [ 182: 182] Allocate a new trap: 0xc000048c90 10 D0725 14:31:37.290874 75498 usertrap_amd64.go:225] [ 182: 182] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.291900 75498 usertrap_amd64.go:212] [ 182: 182] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.291951 75498 usertrap_amd64.go:122] [ 182: 182] Allocate a new trap: 0xc000048c90 11 D0725 14:31:37.292017 75498 usertrap_amd64.go:225] [ 182: 182] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.293158 75498 usertrap_amd64.go:212] [ 182: 182] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.293203 75498 usertrap_amd64.go:122] [ 182: 182] Allocate a new trap: 0xc000048c90 12 D0725 14:31:37.293246 75498 usertrap_amd64.go:225] [ 182: 182] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.294761 75498 usertrap_amd64.go:212] [ 182: 182] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.294813 75498 usertrap_amd64.go:122] [ 182: 182] Allocate a new trap: 0xc000048c90 13 D0725 14:31:37.294869 75498 usertrap_amd64.go:225] [ 182: 182] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.295066 75498 usertrap_amd64.go:212] [ 182: 182] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.295100 75498 usertrap_amd64.go:122] [ 182: 182] Allocate a new trap: 0xc000048c90 14 D0725 14:31:37.295140 75498 usertrap_amd64.go:225] [ 182: 182] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.316561 75498 task_signals.go:470] [ 183: 183] Notified of signal 56 D0725 14:31:37.316679 75498 task_signals.go:204] [ 183: 183] Signal 183, PID: 183, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.316748 75498 task_exit.go:204] [ 183: 183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.318209 75498 task_exit.go:204] [ 183: 183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.318648 75498 task_exit.go:204] [ 182: 182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.320366 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.320427 75498 task_exit.go:204] [ 182: 182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.320459 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.320468 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.320499 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.321749 75498 task_exit.go:204] [ 182: 182] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.324677 75498 usertrap_amd64.go:212] [ 184: 184] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.324742 75498 usertrap_amd64.go:122] [ 184: 184] Allocate a new trap: 0xc002ad9f80 9 D0725 14:31:37.325275 75498 usertrap_amd64.go:225] [ 184: 184] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.327853 75498 usertrap_amd64.go:212] [ 184: 184] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.327913 75498 usertrap_amd64.go:122] [ 184: 184] Allocate a new trap: 0xc002ad9f80 10 D0725 14:31:37.327991 75498 usertrap_amd64.go:225] [ 184: 184] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.329282 75498 usertrap_amd64.go:212] [ 184: 184] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.329341 75498 usertrap_amd64.go:122] [ 184: 184] Allocate a new trap: 0xc002ad9f80 11 D0725 14:31:37.329434 75498 usertrap_amd64.go:225] [ 184: 184] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.330744 75498 usertrap_amd64.go:212] [ 184: 184] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.330790 75498 usertrap_amd64.go:122] [ 184: 184] Allocate a new trap: 0xc002ad9f80 12 D0725 14:31:37.330841 75498 usertrap_amd64.go:225] [ 184: 184] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.332362 75498 usertrap_amd64.go:212] [ 184: 184] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.332413 75498 usertrap_amd64.go:122] [ 184: 184] Allocate a new trap: 0xc002ad9f80 13 D0725 14:31:37.332456 75498 usertrap_amd64.go:225] [ 184: 184] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.332633 75498 usertrap_amd64.go:212] [ 184: 184] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.332686 75498 usertrap_amd64.go:122] [ 184: 184] Allocate a new trap: 0xc002ad9f80 14 D0725 14:31:37.332739 75498 usertrap_amd64.go:225] [ 184: 184] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.354580 75498 task_signals.go:470] [ 185: 185] Notified of signal 56 D0725 14:31:37.354719 75498 task_signals.go:204] [ 185: 185] Signal 185, PID: 185, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.354834 75498 task_exit.go:204] [ 185: 185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.356313 75498 task_exit.go:204] [ 185: 185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.356827 75498 task_exit.go:204] [ 184: 184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.358551 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.358611 75498 task_exit.go:204] [ 184: 184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.358650 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.358668 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.358715 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.359386 75498 task_exit.go:204] [ 184: 184] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.362149 75498 usertrap_amd64.go:212] [ 186: 186] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.362225 75498 usertrap_amd64.go:122] [ 186: 186] Allocate a new trap: 0xc000bdd1a0 9 D0725 14:31:37.362560 75498 usertrap_amd64.go:225] [ 186: 186] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.364594 75498 usertrap_amd64.go:212] [ 186: 186] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.364639 75498 usertrap_amd64.go:122] [ 186: 186] Allocate a new trap: 0xc000bdd1a0 10 D0725 14:31:37.364696 75498 usertrap_amd64.go:225] [ 186: 186] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.365614 75498 usertrap_amd64.go:212] [ 186: 186] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.365659 75498 usertrap_amd64.go:122] [ 186: 186] Allocate a new trap: 0xc000bdd1a0 11 D0725 14:31:37.365702 75498 usertrap_amd64.go:225] [ 186: 186] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.366909 75498 usertrap_amd64.go:212] [ 186: 186] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.366954 75498 usertrap_amd64.go:122] [ 186: 186] Allocate a new trap: 0xc000bdd1a0 12 D0725 14:31:37.367006 75498 usertrap_amd64.go:225] [ 186: 186] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.368673 75498 usertrap_amd64.go:212] [ 186: 186] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.368733 75498 usertrap_amd64.go:122] [ 186: 186] Allocate a new trap: 0xc000bdd1a0 13 D0725 14:31:37.368776 75498 usertrap_amd64.go:225] [ 186: 186] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.369030 75498 usertrap_amd64.go:212] [ 186: 186] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.369067 75498 usertrap_amd64.go:122] [ 186: 186] Allocate a new trap: 0xc000bdd1a0 14 D0725 14:31:37.369110 75498 usertrap_amd64.go:225] [ 186: 186] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.390263 75498 task_signals.go:470] [ 187: 187] Notified of signal 56 D0725 14:31:37.390499 75498 task_signals.go:204] [ 187: 187] Signal 187, PID: 187, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.390606 75498 task_exit.go:204] [ 187: 187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.392407 75498 task_exit.go:204] [ 187: 187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.393091 75498 task_exit.go:204] [ 186: 186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.395000 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.395103 75498 task_exit.go:204] [ 186: 186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.395167 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.395240 75498 task_exit.go:204] [ 186: 186] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.395256 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.395309 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.397906 75498 usertrap_amd64.go:212] [ 188: 188] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.397995 75498 usertrap_amd64.go:122] [ 188: 188] Allocate a new trap: 0xc0002e52f0 9 D0725 14:31:37.398350 75498 usertrap_amd64.go:225] [ 188: 188] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.400885 75498 usertrap_amd64.go:212] [ 188: 188] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.400943 75498 usertrap_amd64.go:122] [ 188: 188] Allocate a new trap: 0xc0002e52f0 10 D0725 14:31:37.400997 75498 usertrap_amd64.go:225] [ 188: 188] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.402148 75498 usertrap_amd64.go:212] [ 188: 188] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.402219 75498 usertrap_amd64.go:122] [ 188: 188] Allocate a new trap: 0xc0002e52f0 11 D0725 14:31:37.402292 75498 usertrap_amd64.go:225] [ 188: 188] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.403577 75498 usertrap_amd64.go:212] [ 188: 188] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.403654 75498 usertrap_amd64.go:122] [ 188: 188] Allocate a new trap: 0xc0002e52f0 12 D0725 14:31:37.403712 75498 usertrap_amd64.go:225] [ 188: 188] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.405256 75498 usertrap_amd64.go:212] [ 188: 188] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.405304 75498 usertrap_amd64.go:122] [ 188: 188] Allocate a new trap: 0xc0002e52f0 13 D0725 14:31:37.405348 75498 usertrap_amd64.go:225] [ 188: 188] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.405515 75498 usertrap_amd64.go:212] [ 188: 188] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.405550 75498 usertrap_amd64.go:122] [ 188: 188] Allocate a new trap: 0xc0002e52f0 14 D0725 14:31:37.405587 75498 usertrap_amd64.go:225] [ 188: 188] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.426080 75498 task_signals.go:470] [ 189: 189] Notified of signal 56 D0725 14:31:37.426177 75498 task_signals.go:204] [ 189: 189] Signal 189, PID: 189, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.426252 75498 task_exit.go:204] [ 189: 189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.427728 75498 task_exit.go:204] [ 189: 189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.428509 75498 task_exit.go:204] [ 188: 188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.430251 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.430340 75498 task_exit.go:204] [ 188: 188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.430408 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.430480 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.430539 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.431070 75498 task_exit.go:204] [ 188: 188] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.433901 75498 usertrap_amd64.go:212] [ 190: 190] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.433988 75498 usertrap_amd64.go:122] [ 190: 190] Allocate a new trap: 0xc0003c89f0 9 D0725 14:31:37.434414 75498 usertrap_amd64.go:225] [ 190: 190] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.437072 75498 usertrap_amd64.go:212] [ 190: 190] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.437124 75498 usertrap_amd64.go:122] [ 190: 190] Allocate a new trap: 0xc0003c89f0 10 D0725 14:31:37.437178 75498 usertrap_amd64.go:225] [ 190: 190] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.438670 75498 usertrap_amd64.go:212] [ 190: 190] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.438733 75498 usertrap_amd64.go:122] [ 190: 190] Allocate a new trap: 0xc0003c89f0 11 D0725 14:31:37.438790 75498 usertrap_amd64.go:225] [ 190: 190] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.440023 75498 usertrap_amd64.go:212] [ 190: 190] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.440072 75498 usertrap_amd64.go:122] [ 190: 190] Allocate a new trap: 0xc0003c89f0 12 D0725 14:31:37.440124 75498 usertrap_amd64.go:225] [ 190: 190] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.441920 75498 usertrap_amd64.go:212] [ 190: 190] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.441962 75498 usertrap_amd64.go:122] [ 190: 190] Allocate a new trap: 0xc0003c89f0 13 D0725 14:31:37.442011 75498 usertrap_amd64.go:225] [ 190: 190] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.442160 75498 usertrap_amd64.go:212] [ 190: 190] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.442194 75498 usertrap_amd64.go:122] [ 190: 190] Allocate a new trap: 0xc0003c89f0 14 D0725 14:31:37.442233 75498 usertrap_amd64.go:225] [ 190: 190] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.463418 75498 task_signals.go:470] [ 191: 191] Notified of signal 56 D0725 14:31:37.463653 75498 task_signals.go:204] [ 191: 191] Signal 191, PID: 191, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.463751 75498 task_exit.go:204] [ 191: 191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.465187 75498 task_exit.go:204] [ 191: 191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.465899 75498 task_exit.go:204] [ 190: 190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.467846 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.467920 75498 task_exit.go:204] [ 190: 190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.467959 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.468039 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.468097 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.468822 75498 task_exit.go:204] [ 190: 190] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.471262 75498 usertrap_amd64.go:212] [ 192: 192] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.471344 75498 usertrap_amd64.go:122] [ 192: 192] Allocate a new trap: 0xc000bddda0 9 D0725 14:31:37.471741 75498 usertrap_amd64.go:225] [ 192: 192] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.473592 75498 usertrap_amd64.go:212] [ 192: 192] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.473635 75498 usertrap_amd64.go:122] [ 192: 192] Allocate a new trap: 0xc000bddda0 10 D0725 14:31:37.473694 75498 usertrap_amd64.go:225] [ 192: 192] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.474692 75498 usertrap_amd64.go:212] [ 192: 192] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.474755 75498 usertrap_amd64.go:122] [ 192: 192] Allocate a new trap: 0xc000bddda0 11 D0725 14:31:37.474813 75498 usertrap_amd64.go:225] [ 192: 192] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.476096 75498 usertrap_amd64.go:212] [ 192: 192] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.476152 75498 usertrap_amd64.go:122] [ 192: 192] Allocate a new trap: 0xc000bddda0 12 D0725 14:31:37.476205 75498 usertrap_amd64.go:225] [ 192: 192] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.477746 75498 usertrap_amd64.go:212] [ 192: 192] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.477802 75498 usertrap_amd64.go:122] [ 192: 192] Allocate a new trap: 0xc000bddda0 13 D0725 14:31:37.477854 75498 usertrap_amd64.go:225] [ 192: 192] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.478040 75498 usertrap_amd64.go:212] [ 192: 192] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.478077 75498 usertrap_amd64.go:122] [ 192: 192] Allocate a new trap: 0xc000bddda0 14 D0725 14:31:37.478115 75498 usertrap_amd64.go:225] [ 192: 192] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.498852 75498 task_signals.go:470] [ 193: 193] Notified of signal 56 D0725 14:31:37.499010 75498 task_signals.go:204] [ 193: 193] Signal 193, PID: 193, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.499122 75498 task_exit.go:204] [ 193: 193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.500662 75498 task_exit.go:204] [ 193: 193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.501148 75498 task_exit.go:204] [ 192: 192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.503246 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.503341 75498 task_exit.go:204] [ 192: 192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.503389 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.503397 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.503441 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.504287 75498 task_exit.go:204] [ 192: 192] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.507019 75498 usertrap_amd64.go:212] [ 194: 194] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.507086 75498 usertrap_amd64.go:122] [ 194: 194] Allocate a new trap: 0xc000480d80 9 D0725 14:31:37.507437 75498 usertrap_amd64.go:225] [ 194: 194] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.509724 75498 usertrap_amd64.go:212] [ 194: 194] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.509772 75498 usertrap_amd64.go:122] [ 194: 194] Allocate a new trap: 0xc000480d80 10 D0725 14:31:37.509843 75498 usertrap_amd64.go:225] [ 194: 194] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.510608 75498 usertrap_amd64.go:212] [ 194: 194] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.510647 75498 usertrap_amd64.go:122] [ 194: 194] Allocate a new trap: 0xc000480d80 11 D0725 14:31:37.510699 75498 usertrap_amd64.go:225] [ 194: 194] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.511908 75498 usertrap_amd64.go:212] [ 194: 194] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.511955 75498 usertrap_amd64.go:122] [ 194: 194] Allocate a new trap: 0xc000480d80 12 D0725 14:31:37.512009 75498 usertrap_amd64.go:225] [ 194: 194] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.513424 75498 usertrap_amd64.go:212] [ 194: 194] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.513465 75498 usertrap_amd64.go:122] [ 194: 194] Allocate a new trap: 0xc000480d80 13 D0725 14:31:37.513507 75498 usertrap_amd64.go:225] [ 194: 194] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.513661 75498 usertrap_amd64.go:212] [ 194: 194] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.513695 75498 usertrap_amd64.go:122] [ 194: 194] Allocate a new trap: 0xc000480d80 14 D0725 14:31:37.513733 75498 usertrap_amd64.go:225] [ 194: 194] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.535966 75498 task_signals.go:470] [ 195: 195] Notified of signal 56 D0725 14:31:37.536121 75498 task_signals.go:204] [ 195: 195] Signal 195, PID: 195, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.536184 75498 task_exit.go:204] [ 195: 195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.537598 75498 task_exit.go:204] [ 195: 195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.538569 75498 task_exit.go:204] [ 194: 194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.540240 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.540315 75498 task_exit.go:204] [ 194: 194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.540355 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.540432 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.540493 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.541236 75498 task_exit.go:204] [ 194: 194] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.544147 75498 usertrap_amd64.go:212] [ 196: 196] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.544232 75498 usertrap_amd64.go:122] [ 196: 196] Allocate a new trap: 0xc000049350 9 D0725 14:31:37.544502 75498 usertrap_amd64.go:225] [ 196: 196] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.546970 75498 usertrap_amd64.go:212] [ 196: 196] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.547026 75498 usertrap_amd64.go:122] [ 196: 196] Allocate a new trap: 0xc000049350 10 D0725 14:31:37.547089 75498 usertrap_amd64.go:225] [ 196: 196] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.548283 75498 usertrap_amd64.go:212] [ 196: 196] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.548337 75498 usertrap_amd64.go:122] [ 196: 196] Allocate a new trap: 0xc000049350 11 D0725 14:31:37.548380 75498 usertrap_amd64.go:225] [ 196: 196] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.549620 75498 usertrap_amd64.go:212] [ 196: 196] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.549667 75498 usertrap_amd64.go:122] [ 196: 196] Allocate a new trap: 0xc000049350 12 D0725 14:31:37.549727 75498 usertrap_amd64.go:225] [ 196: 196] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.551662 75498 usertrap_amd64.go:212] [ 196: 196] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.551732 75498 usertrap_amd64.go:122] [ 196: 196] Allocate a new trap: 0xc000049350 13 D0725 14:31:37.551783 75498 usertrap_amd64.go:225] [ 196: 196] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.551983 75498 usertrap_amd64.go:212] [ 196: 196] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.552026 75498 usertrap_amd64.go:122] [ 196: 196] Allocate a new trap: 0xc000049350 14 D0725 14:31:37.552065 75498 usertrap_amd64.go:225] [ 196: 196] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.574359 75498 task_signals.go:470] [ 197: 197] Notified of signal 56 D0725 14:31:37.574503 75498 task_signals.go:204] [ 197: 197] Signal 197, PID: 197, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.574803 75498 task_exit.go:204] [ 197: 197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.576378 75498 task_exit.go:204] [ 197: 197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.577003 75498 task_exit.go:204] [ 196: 196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.579181 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.579248 75498 task_exit.go:204] [ 196: 196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.579307 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.579298 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.579363 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.580360 75498 task_exit.go:204] [ 196: 196] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.583371 75498 usertrap_amd64.go:212] [ 198: 198] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.583478 75498 usertrap_amd64.go:122] [ 198: 198] Allocate a new trap: 0xc001899e90 9 D0725 14:31:37.583875 75498 usertrap_amd64.go:225] [ 198: 198] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.586136 75498 usertrap_amd64.go:212] [ 198: 198] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.586186 75498 usertrap_amd64.go:122] [ 198: 198] Allocate a new trap: 0xc001899e90 10 D0725 14:31:37.586231 75498 usertrap_amd64.go:225] [ 198: 198] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.587345 75498 usertrap_amd64.go:212] [ 198: 198] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.587411 75498 usertrap_amd64.go:122] [ 198: 198] Allocate a new trap: 0xc001899e90 11 D0725 14:31:37.587473 75498 usertrap_amd64.go:225] [ 198: 198] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.588791 75498 usertrap_amd64.go:212] [ 198: 198] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.588834 75498 usertrap_amd64.go:122] [ 198: 198] Allocate a new trap: 0xc001899e90 12 D0725 14:31:37.588878 75498 usertrap_amd64.go:225] [ 198: 198] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.590601 75498 usertrap_amd64.go:212] [ 198: 198] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.590655 75498 usertrap_amd64.go:122] [ 198: 198] Allocate a new trap: 0xc001899e90 13 D0725 14:31:37.590710 75498 usertrap_amd64.go:225] [ 198: 198] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.590954 75498 usertrap_amd64.go:212] [ 198: 198] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.590994 75498 usertrap_amd64.go:122] [ 198: 198] Allocate a new trap: 0xc001899e90 14 D0725 14:31:37.591066 75498 usertrap_amd64.go:225] [ 198: 198] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.614032 75498 task_signals.go:470] [ 199: 199] Notified of signal 56 D0725 14:31:37.614224 75498 task_signals.go:204] [ 199: 199] Signal 199, PID: 199, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.614382 75498 task_exit.go:204] [ 199: 199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.615952 75498 task_exit.go:204] [ 199: 199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.616640 75498 task_exit.go:204] [ 198: 198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.618526 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.618611 75498 task_exit.go:204] [ 198: 198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.618658 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.618808 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.618886 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.619199 75498 task_exit.go:204] [ 198: 198] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.622006 75498 usertrap_amd64.go:212] [ 200: 200] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.622083 75498 usertrap_amd64.go:122] [ 200: 200] Allocate a new trap: 0xc0002dea20 9 D0725 14:31:37.622512 75498 usertrap_amd64.go:225] [ 200: 200] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.624543 75498 usertrap_amd64.go:212] [ 200: 200] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.624587 75498 usertrap_amd64.go:122] [ 200: 200] Allocate a new trap: 0xc0002dea20 10 D0725 14:31:37.624638 75498 usertrap_amd64.go:225] [ 200: 200] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.625608 75498 usertrap_amd64.go:212] [ 200: 200] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.625649 75498 usertrap_amd64.go:122] [ 200: 200] Allocate a new trap: 0xc0002dea20 11 D0725 14:31:37.625692 75498 usertrap_amd64.go:225] [ 200: 200] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.626816 75498 usertrap_amd64.go:212] [ 200: 200] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.626859 75498 usertrap_amd64.go:122] [ 200: 200] Allocate a new trap: 0xc0002dea20 12 D0725 14:31:37.626902 75498 usertrap_amd64.go:225] [ 200: 200] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.628679 75498 usertrap_amd64.go:212] [ 200: 200] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.628746 75498 usertrap_amd64.go:122] [ 200: 200] Allocate a new trap: 0xc0002dea20 13 D0725 14:31:37.628806 75498 usertrap_amd64.go:225] [ 200: 200] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.629093 75498 usertrap_amd64.go:212] [ 200: 200] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.629146 75498 usertrap_amd64.go:122] [ 200: 200] Allocate a new trap: 0xc0002dea20 14 D0725 14:31:37.629195 75498 usertrap_amd64.go:225] [ 200: 200] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.655114 75498 task_signals.go:470] [ 201: 201] Notified of signal 56 D0725 14:31:37.655277 75498 task_signals.go:204] [ 201: 201] Signal 201, PID: 201, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.655402 75498 task_exit.go:204] [ 201: 201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.657026 75498 task_exit.go:204] [ 201: 201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.658029 75498 task_exit.go:204] [ 200: 200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.660008 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.660091 75498 task_exit.go:204] [ 200: 200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.660146 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.660144 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.660187 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.660706 75498 task_exit.go:204] [ 200: 200] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.663304 75498 usertrap_amd64.go:212] [ 202: 202] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.663506 75498 usertrap_amd64.go:122] [ 202: 202] Allocate a new trap: 0xc003e0c2a0 9 D0725 14:31:37.663950 75498 usertrap_amd64.go:225] [ 202: 202] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.666753 75498 usertrap_amd64.go:212] [ 202: 202] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.666832 75498 usertrap_amd64.go:122] [ 202: 202] Allocate a new trap: 0xc003e0c2a0 10 D0725 14:31:37.666919 75498 usertrap_amd64.go:225] [ 202: 202] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.668004 75498 usertrap_amd64.go:212] [ 202: 202] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.668058 75498 usertrap_amd64.go:122] [ 202: 202] Allocate a new trap: 0xc003e0c2a0 11 D0725 14:31:37.668118 75498 usertrap_amd64.go:225] [ 202: 202] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.669264 75498 usertrap_amd64.go:212] [ 202: 202] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.669316 75498 usertrap_amd64.go:122] [ 202: 202] Allocate a new trap: 0xc003e0c2a0 12 D0725 14:31:37.669374 75498 usertrap_amd64.go:225] [ 202: 202] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.671229 75498 usertrap_amd64.go:212] [ 202: 202] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.671285 75498 usertrap_amd64.go:122] [ 202: 202] Allocate a new trap: 0xc003e0c2a0 13 D0725 14:31:37.671328 75498 usertrap_amd64.go:225] [ 202: 202] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.671556 75498 usertrap_amd64.go:212] [ 202: 202] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.671640 75498 usertrap_amd64.go:122] [ 202: 202] Allocate a new trap: 0xc003e0c2a0 14 D0725 14:31:37.671704 75498 usertrap_amd64.go:225] [ 202: 202] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.696853 75498 task_signals.go:470] [ 203: 203] Notified of signal 56 D0725 14:31:37.697054 75498 task_signals.go:204] [ 203: 203] Signal 203, PID: 203, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.697197 75498 task_exit.go:204] [ 203: 203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.699163 75498 task_exit.go:204] [ 203: 203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.700159 75498 task_exit.go:204] [ 202: 202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.702227 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.702321 75498 task_exit.go:204] [ 202: 202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.702378 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.702438 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.702493 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.702532 75498 task_exit.go:204] [ 202: 202] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.705216 75498 usertrap_amd64.go:212] [ 204: 204] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.705294 75498 usertrap_amd64.go:122] [ 204: 204] Allocate a new trap: 0xc0036ae2a0 9 D0725 14:31:37.705691 75498 usertrap_amd64.go:225] [ 204: 204] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.707821 75498 usertrap_amd64.go:212] [ 204: 204] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.707882 75498 usertrap_amd64.go:122] [ 204: 204] Allocate a new trap: 0xc0036ae2a0 10 D0725 14:31:37.707960 75498 usertrap_amd64.go:225] [ 204: 204] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.708960 75498 usertrap_amd64.go:212] [ 204: 204] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.709009 75498 usertrap_amd64.go:122] [ 204: 204] Allocate a new trap: 0xc0036ae2a0 11 D0725 14:31:37.709054 75498 usertrap_amd64.go:225] [ 204: 204] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.710298 75498 usertrap_amd64.go:212] [ 204: 204] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.710351 75498 usertrap_amd64.go:122] [ 204: 204] Allocate a new trap: 0xc0036ae2a0 12 D0725 14:31:37.710408 75498 usertrap_amd64.go:225] [ 204: 204] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.711986 75498 usertrap_amd64.go:212] [ 204: 204] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.712033 75498 usertrap_amd64.go:122] [ 204: 204] Allocate a new trap: 0xc0036ae2a0 13 D0725 14:31:37.712092 75498 usertrap_amd64.go:225] [ 204: 204] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.712249 75498 usertrap_amd64.go:212] [ 204: 204] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.712289 75498 usertrap_amd64.go:122] [ 204: 204] Allocate a new trap: 0xc0036ae2a0 14 D0725 14:31:37.712328 75498 usertrap_amd64.go:225] [ 204: 204] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.740649 75498 task_signals.go:470] [ 205: 205] Notified of signal 56 D0725 14:31:37.740801 75498 task_signals.go:204] [ 205: 205] Signal 205, PID: 205, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.740900 75498 task_exit.go:204] [ 205: 205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.742322 75498 task_exit.go:204] [ 205: 205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.743472 75498 task_exit.go:204] [ 204: 204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.745636 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.745713 75498 task_exit.go:204] [ 204: 204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.745773 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.745781 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.745859 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.750633 75498 task_exit.go:204] [ 204: 204] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.753387 75498 usertrap_amd64.go:212] [ 206: 206] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.753468 75498 usertrap_amd64.go:122] [ 206: 206] Allocate a new trap: 0xc0036ae090 9 D0725 14:31:37.753869 75498 usertrap_amd64.go:225] [ 206: 206] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.755817 75498 usertrap_amd64.go:212] [ 206: 206] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.755861 75498 usertrap_amd64.go:122] [ 206: 206] Allocate a new trap: 0xc0036ae090 10 D0725 14:31:37.755920 75498 usertrap_amd64.go:225] [ 206: 206] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.756738 75498 usertrap_amd64.go:212] [ 206: 206] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.756779 75498 usertrap_amd64.go:122] [ 206: 206] Allocate a new trap: 0xc0036ae090 11 D0725 14:31:37.756834 75498 usertrap_amd64.go:225] [ 206: 206] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.757865 75498 usertrap_amd64.go:212] [ 206: 206] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.757906 75498 usertrap_amd64.go:122] [ 206: 206] Allocate a new trap: 0xc0036ae090 12 D0725 14:31:37.757946 75498 usertrap_amd64.go:225] [ 206: 206] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.759506 75498 usertrap_amd64.go:212] [ 206: 206] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.759555 75498 usertrap_amd64.go:122] [ 206: 206] Allocate a new trap: 0xc0036ae090 13 D0725 14:31:37.759629 75498 usertrap_amd64.go:225] [ 206: 206] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.759779 75498 usertrap_amd64.go:212] [ 206: 206] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.759818 75498 usertrap_amd64.go:122] [ 206: 206] Allocate a new trap: 0xc0036ae090 14 D0725 14:31:37.759857 75498 usertrap_amd64.go:225] [ 206: 206] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.781987 75498 task_signals.go:470] [ 207: 207] Notified of signal 56 D0725 14:31:37.782158 75498 task_signals.go:204] [ 207: 207] Signal 207, PID: 207, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.782241 75498 task_exit.go:204] [ 207: 207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.783735 75498 task_exit.go:204] [ 207: 207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.784925 75498 task_exit.go:204] [ 206: 206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.786993 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.787058 75498 task_exit.go:204] [ 206: 206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.787122 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.787182 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.787243 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.788058 75498 task_exit.go:204] [ 206: 206] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.791522 75498 usertrap_amd64.go:212] [ 208: 208] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.791588 75498 usertrap_amd64.go:122] [ 208: 208] Allocate a new trap: 0xc0004805a0 9 D0725 14:31:37.791987 75498 usertrap_amd64.go:225] [ 208: 208] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.794647 75498 usertrap_amd64.go:212] [ 208: 208] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.794708 75498 usertrap_amd64.go:122] [ 208: 208] Allocate a new trap: 0xc0004805a0 10 D0725 14:31:37.794780 75498 usertrap_amd64.go:225] [ 208: 208] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.796353 75498 usertrap_amd64.go:212] [ 208: 208] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.796409 75498 usertrap_amd64.go:122] [ 208: 208] Allocate a new trap: 0xc0004805a0 11 D0725 14:31:37.796455 75498 usertrap_amd64.go:225] [ 208: 208] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.797635 75498 usertrap_amd64.go:212] [ 208: 208] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.797685 75498 usertrap_amd64.go:122] [ 208: 208] Allocate a new trap: 0xc0004805a0 12 D0725 14:31:37.797734 75498 usertrap_amd64.go:225] [ 208: 208] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.799458 75498 usertrap_amd64.go:212] [ 208: 208] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.799502 75498 usertrap_amd64.go:122] [ 208: 208] Allocate a new trap: 0xc0004805a0 13 D0725 14:31:37.799553 75498 usertrap_amd64.go:225] [ 208: 208] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.799779 75498 usertrap_amd64.go:212] [ 208: 208] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.799817 75498 usertrap_amd64.go:122] [ 208: 208] Allocate a new trap: 0xc0004805a0 14 D0725 14:31:37.799865 75498 usertrap_amd64.go:225] [ 208: 208] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.823722 75498 task_signals.go:470] [ 209: 209] Notified of signal 56 D0725 14:31:37.823888 75498 task_signals.go:204] [ 209: 209] Signal 209, PID: 209, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.823978 75498 task_exit.go:204] [ 209: 209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.826072 75498 task_exit.go:204] [ 209: 209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.826695 75498 task_exit.go:204] [ 208: 208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.828489 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.828570 75498 task_exit.go:204] [ 208: 208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.828613 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.828706 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.828773 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.828810 75498 task_exit.go:204] [ 208: 208] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.831426 75498 usertrap_amd64.go:212] [ 210: 210] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.831499 75498 usertrap_amd64.go:122] [ 210: 210] Allocate a new trap: 0xc0004807b0 9 D0725 14:31:37.831870 75498 usertrap_amd64.go:225] [ 210: 210] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.833923 75498 usertrap_amd64.go:212] [ 210: 210] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.833968 75498 usertrap_amd64.go:122] [ 210: 210] Allocate a new trap: 0xc0004807b0 10 D0725 14:31:37.834031 75498 usertrap_amd64.go:225] [ 210: 210] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.834923 75498 usertrap_amd64.go:212] [ 210: 210] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.834965 75498 usertrap_amd64.go:122] [ 210: 210] Allocate a new trap: 0xc0004807b0 11 D0725 14:31:37.835018 75498 usertrap_amd64.go:225] [ 210: 210] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.836064 75498 usertrap_amd64.go:212] [ 210: 210] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.836113 75498 usertrap_amd64.go:122] [ 210: 210] Allocate a new trap: 0xc0004807b0 12 D0725 14:31:37.836155 75498 usertrap_amd64.go:225] [ 210: 210] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.837699 75498 usertrap_amd64.go:212] [ 210: 210] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.837748 75498 usertrap_amd64.go:122] [ 210: 210] Allocate a new trap: 0xc0004807b0 13 D0725 14:31:37.837797 75498 usertrap_amd64.go:225] [ 210: 210] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.837944 75498 usertrap_amd64.go:212] [ 210: 210] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.837977 75498 usertrap_amd64.go:122] [ 210: 210] Allocate a new trap: 0xc0004807b0 14 D0725 14:31:37.838015 75498 usertrap_amd64.go:225] [ 210: 210] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.859893 75498 task_signals.go:470] [ 211: 211] Notified of signal 56 D0725 14:31:37.860005 75498 task_signals.go:204] [ 211: 211] Signal 211, PID: 211, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.860087 75498 task_exit.go:204] [ 211: 211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.861634 75498 task_exit.go:204] [ 211: 211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.862452 75498 task_exit.go:204] [ 210: 210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.864221 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.864304 75498 task_exit.go:204] [ 210: 210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.864377 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.864430 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.864490 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.865169 75498 task_exit.go:204] [ 210: 210] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.867720 75498 usertrap_amd64.go:212] [ 212: 212] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.867797 75498 usertrap_amd64.go:122] [ 212: 212] Allocate a new trap: 0xc0002e5050 9 D0725 14:31:37.868091 75498 usertrap_amd64.go:225] [ 212: 212] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.869984 75498 usertrap_amd64.go:212] [ 212: 212] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.870057 75498 usertrap_amd64.go:122] [ 212: 212] Allocate a new trap: 0xc0002e5050 10 D0725 14:31:37.870138 75498 usertrap_amd64.go:225] [ 212: 212] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.871181 75498 usertrap_amd64.go:212] [ 212: 212] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.871236 75498 usertrap_amd64.go:122] [ 212: 212] Allocate a new trap: 0xc0002e5050 11 D0725 14:31:37.871308 75498 usertrap_amd64.go:225] [ 212: 212] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.872630 75498 usertrap_amd64.go:212] [ 212: 212] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.872682 75498 usertrap_amd64.go:122] [ 212: 212] Allocate a new trap: 0xc0002e5050 12 D0725 14:31:37.872756 75498 usertrap_amd64.go:225] [ 212: 212] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.874127 75498 usertrap_amd64.go:212] [ 212: 212] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.874168 75498 usertrap_amd64.go:122] [ 212: 212] Allocate a new trap: 0xc0002e5050 13 D0725 14:31:37.874219 75498 usertrap_amd64.go:225] [ 212: 212] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.874393 75498 usertrap_amd64.go:212] [ 212: 212] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.874444 75498 usertrap_amd64.go:122] [ 212: 212] Allocate a new trap: 0xc0002e5050 14 D0725 14:31:37.874496 75498 usertrap_amd64.go:225] [ 212: 212] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.895526 75498 task_signals.go:470] [ 213: 213] Notified of signal 56 D0725 14:31:37.895787 75498 task_signals.go:204] [ 213: 213] Signal 213, PID: 213, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.895864 75498 task_exit.go:204] [ 213: 213] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.897347 75498 task_exit.go:204] [ 213: 213] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.897743 75498 task_exit.go:204] [ 212: 212] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.899867 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.899979 75498 task_exit.go:204] [ 212: 212] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.900035 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.900038 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.900092 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.900466 75498 task_exit.go:204] [ 212: 212] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.902972 75498 usertrap_amd64.go:212] [ 214: 214] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.903043 75498 usertrap_amd64.go:122] [ 214: 214] Allocate a new trap: 0xc0036aed80 9 D0725 14:31:37.903360 75498 usertrap_amd64.go:225] [ 214: 214] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.905380 75498 usertrap_amd64.go:212] [ 214: 214] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.905428 75498 usertrap_amd64.go:122] [ 214: 214] Allocate a new trap: 0xc0036aed80 10 D0725 14:31:37.905473 75498 usertrap_amd64.go:225] [ 214: 214] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.906392 75498 usertrap_amd64.go:212] [ 214: 214] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.906441 75498 usertrap_amd64.go:122] [ 214: 214] Allocate a new trap: 0xc0036aed80 11 D0725 14:31:37.906495 75498 usertrap_amd64.go:225] [ 214: 214] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.907539 75498 usertrap_amd64.go:212] [ 214: 214] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.907579 75498 usertrap_amd64.go:122] [ 214: 214] Allocate a new trap: 0xc0036aed80 12 D0725 14:31:37.907653 75498 usertrap_amd64.go:225] [ 214: 214] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.909509 75498 usertrap_amd64.go:212] [ 214: 214] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.909561 75498 usertrap_amd64.go:122] [ 214: 214] Allocate a new trap: 0xc0036aed80 13 D0725 14:31:37.909614 75498 usertrap_amd64.go:225] [ 214: 214] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.909821 75498 usertrap_amd64.go:212] [ 214: 214] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.909866 75498 usertrap_amd64.go:122] [ 214: 214] Allocate a new trap: 0xc0036aed80 14 D0725 14:31:37.909918 75498 usertrap_amd64.go:225] [ 214: 214] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.931594 75498 task_signals.go:470] [ 215: 215] Notified of signal 56 D0725 14:31:37.931758 75498 task_signals.go:204] [ 215: 215] Signal 215, PID: 215, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.931837 75498 task_exit.go:204] [ 215: 215] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.933372 75498 task_exit.go:204] [ 215: 215] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.934033 75498 task_exit.go:204] [ 214: 214] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.936321 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.936412 75498 task_exit.go:204] [ 214: 214] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.936469 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.936566 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.936625 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.937572 75498 task_exit.go:204] [ 214: 214] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.940286 75498 usertrap_amd64.go:212] [ 216: 216] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.940367 75498 usertrap_amd64.go:122] [ 216: 216] Allocate a new trap: 0xc0002de300 9 D0725 14:31:37.940813 75498 usertrap_amd64.go:225] [ 216: 216] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.943754 75498 usertrap_amd64.go:212] [ 216: 216] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.943814 75498 usertrap_amd64.go:122] [ 216: 216] Allocate a new trap: 0xc0002de300 10 D0725 14:31:37.943880 75498 usertrap_amd64.go:225] [ 216: 216] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.945218 75498 usertrap_amd64.go:212] [ 216: 216] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.945294 75498 usertrap_amd64.go:122] [ 216: 216] Allocate a new trap: 0xc0002de300 11 D0725 14:31:37.945369 75498 usertrap_amd64.go:225] [ 216: 216] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.946882 75498 usertrap_amd64.go:212] [ 216: 216] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.946957 75498 usertrap_amd64.go:122] [ 216: 216] Allocate a new trap: 0xc0002de300 12 D0725 14:31:37.947004 75498 usertrap_amd64.go:225] [ 216: 216] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.948560 75498 usertrap_amd64.go:212] [ 216: 216] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.948604 75498 usertrap_amd64.go:122] [ 216: 216] Allocate a new trap: 0xc0002de300 13 D0725 14:31:37.948651 75498 usertrap_amd64.go:225] [ 216: 216] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.948817 75498 usertrap_amd64.go:212] [ 216: 216] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.948854 75498 usertrap_amd64.go:122] [ 216: 216] Allocate a new trap: 0xc0002de300 14 D0725 14:31:37.948901 75498 usertrap_amd64.go:225] [ 216: 216] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:37.970307 75498 task_signals.go:470] [ 217: 217] Notified of signal 56 D0725 14:31:37.970434 75498 task_signals.go:204] [ 217: 217] Signal 217, PID: 217, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:37.970516 75498 task_exit.go:204] [ 217: 217] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.972340 75498 task_exit.go:204] [ 217: 217] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.972934 75498 task_exit.go:204] [ 216: 216] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:37.974878 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:37.974968 75498 task_exit.go:204] [ 216: 216] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:37.975033 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:37.975104 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:37.975160 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:37.975171 75498 task_exit.go:204] [ 216: 216] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:37.978206 75498 usertrap_amd64.go:212] [ 218: 218] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:37.978294 75498 usertrap_amd64.go:122] [ 218: 218] Allocate a new trap: 0xc0015bc180 9 D0725 14:31:37.978694 75498 usertrap_amd64.go:225] [ 218: 218] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:37.980914 75498 usertrap_amd64.go:212] [ 218: 218] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:37.980969 75498 usertrap_amd64.go:122] [ 218: 218] Allocate a new trap: 0xc0015bc180 10 D0725 14:31:37.981054 75498 usertrap_amd64.go:225] [ 218: 218] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:37.982029 75498 usertrap_amd64.go:212] [ 218: 218] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:37.982079 75498 usertrap_amd64.go:122] [ 218: 218] Allocate a new trap: 0xc0015bc180 11 D0725 14:31:37.982136 75498 usertrap_amd64.go:225] [ 218: 218] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:37.983355 75498 usertrap_amd64.go:212] [ 218: 218] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:37.983416 75498 usertrap_amd64.go:122] [ 218: 218] Allocate a new trap: 0xc0015bc180 12 D0725 14:31:37.983465 75498 usertrap_amd64.go:225] [ 218: 218] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:37.984889 75498 usertrap_amd64.go:212] [ 218: 218] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:37.984935 75498 usertrap_amd64.go:122] [ 218: 218] Allocate a new trap: 0xc0015bc180 13 D0725 14:31:37.984999 75498 usertrap_amd64.go:225] [ 218: 218] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:37.985189 75498 usertrap_amd64.go:212] [ 218: 218] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:37.985231 75498 usertrap_amd64.go:122] [ 218: 218] Allocate a new trap: 0xc0015bc180 14 D0725 14:31:37.985278 75498 usertrap_amd64.go:225] [ 218: 218] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.005999 75498 task_signals.go:470] [ 219: 219] Notified of signal 56 D0725 14:31:38.006150 75498 task_signals.go:204] [ 219: 219] Signal 219, PID: 219, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.006235 75498 task_exit.go:204] [ 219: 219] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.008032 75498 task_exit.go:204] [ 219: 219] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.008703 75498 task_exit.go:204] [ 218: 218] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.010341 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.010416 75498 task_exit.go:204] [ 218: 218] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.010485 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.010515 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.010555 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.010951 75498 task_exit.go:204] [ 218: 218] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.013458 75498 usertrap_amd64.go:212] [ 220: 220] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.013530 75498 usertrap_amd64.go:122] [ 220: 220] Allocate a new trap: 0xc003e0c4e0 9 D0725 14:31:38.013821 75498 usertrap_amd64.go:225] [ 220: 220] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.015732 75498 usertrap_amd64.go:212] [ 220: 220] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.015772 75498 usertrap_amd64.go:122] [ 220: 220] Allocate a new trap: 0xc003e0c4e0 10 D0725 14:31:38.015825 75498 usertrap_amd64.go:225] [ 220: 220] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.016725 75498 usertrap_amd64.go:212] [ 220: 220] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.016775 75498 usertrap_amd64.go:122] [ 220: 220] Allocate a new trap: 0xc003e0c4e0 11 D0725 14:31:38.016822 75498 usertrap_amd64.go:225] [ 220: 220] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.017846 75498 usertrap_amd64.go:212] [ 220: 220] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.017915 75498 usertrap_amd64.go:122] [ 220: 220] Allocate a new trap: 0xc003e0c4e0 12 D0725 14:31:38.017968 75498 usertrap_amd64.go:225] [ 220: 220] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.019328 75498 usertrap_amd64.go:212] [ 220: 220] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.019369 75498 usertrap_amd64.go:122] [ 220: 220] Allocate a new trap: 0xc003e0c4e0 13 D0725 14:31:38.019417 75498 usertrap_amd64.go:225] [ 220: 220] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.019562 75498 usertrap_amd64.go:212] [ 220: 220] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.019594 75498 usertrap_amd64.go:122] [ 220: 220] Allocate a new trap: 0xc003e0c4e0 14 D0725 14:31:38.019650 75498 usertrap_amd64.go:225] [ 220: 220] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.042252 75498 task_signals.go:470] [ 221: 221] Notified of signal 56 D0725 14:31:38.042422 75498 task_signals.go:204] [ 221: 221] Signal 221, PID: 221, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.042498 75498 task_exit.go:204] [ 221: 221] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.044041 75498 task_exit.go:204] [ 221: 221] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.044992 75498 task_exit.go:204] [ 220: 220] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.046636 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.046695 75498 task_exit.go:204] [ 220: 220] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.046733 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.046816 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.046864 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.047197 75498 task_exit.go:204] [ 220: 220] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.049711 75498 usertrap_amd64.go:212] [ 222: 222] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.049778 75498 usertrap_amd64.go:122] [ 222: 222] Allocate a new trap: 0xc003240d50 9 D0725 14:31:38.050062 75498 usertrap_amd64.go:225] [ 222: 222] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.052127 75498 usertrap_amd64.go:212] [ 222: 222] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.052170 75498 usertrap_amd64.go:122] [ 222: 222] Allocate a new trap: 0xc003240d50 10 D0725 14:31:38.052211 75498 usertrap_amd64.go:225] [ 222: 222] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.053166 75498 usertrap_amd64.go:212] [ 222: 222] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.053224 75498 usertrap_amd64.go:122] [ 222: 222] Allocate a new trap: 0xc003240d50 11 D0725 14:31:38.053280 75498 usertrap_amd64.go:225] [ 222: 222] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.054775 75498 usertrap_amd64.go:212] [ 222: 222] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.054839 75498 usertrap_amd64.go:122] [ 222: 222] Allocate a new trap: 0xc003240d50 12 D0725 14:31:38.054904 75498 usertrap_amd64.go:225] [ 222: 222] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.056724 75498 usertrap_amd64.go:212] [ 222: 222] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.056804 75498 usertrap_amd64.go:122] [ 222: 222] Allocate a new trap: 0xc003240d50 13 D0725 14:31:38.056921 75498 usertrap_amd64.go:225] [ 222: 222] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.057170 75498 usertrap_amd64.go:212] [ 222: 222] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.057227 75498 usertrap_amd64.go:122] [ 222: 222] Allocate a new trap: 0xc003240d50 14 D0725 14:31:38.057305 75498 usertrap_amd64.go:225] [ 222: 222] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.080529 75498 task_signals.go:470] [ 223: 223] Notified of signal 56 D0725 14:31:38.080639 75498 task_signals.go:204] [ 223: 223] Signal 223, PID: 223, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.080706 75498 task_exit.go:204] [ 223: 223] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.082298 75498 task_exit.go:204] [ 223: 223] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.082862 75498 task_exit.go:204] [ 222: 222] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.084694 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.084761 75498 task_exit.go:204] [ 222: 222] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.084800 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.084888 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.084950 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.085381 75498 task_exit.go:204] [ 222: 222] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.087911 75498 usertrap_amd64.go:212] [ 224: 224] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.087986 75498 usertrap_amd64.go:122] [ 224: 224] Allocate a new trap: 0xc003241680 9 D0725 14:31:38.088346 75498 usertrap_amd64.go:225] [ 224: 224] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.090210 75498 usertrap_amd64.go:212] [ 224: 224] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.090262 75498 usertrap_amd64.go:122] [ 224: 224] Allocate a new trap: 0xc003241680 10 D0725 14:31:38.090312 75498 usertrap_amd64.go:225] [ 224: 224] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.091137 75498 usertrap_amd64.go:212] [ 224: 224] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.091180 75498 usertrap_amd64.go:122] [ 224: 224] Allocate a new trap: 0xc003241680 11 D0725 14:31:38.091233 75498 usertrap_amd64.go:225] [ 224: 224] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.092329 75498 usertrap_amd64.go:212] [ 224: 224] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.092377 75498 usertrap_amd64.go:122] [ 224: 224] Allocate a new trap: 0xc003241680 12 D0725 14:31:38.092452 75498 usertrap_amd64.go:225] [ 224: 224] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.093916 75498 usertrap_amd64.go:212] [ 224: 224] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.093968 75498 usertrap_amd64.go:122] [ 224: 224] Allocate a new trap: 0xc003241680 13 D0725 14:31:38.094025 75498 usertrap_amd64.go:225] [ 224: 224] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.094224 75498 usertrap_amd64.go:212] [ 224: 224] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.094282 75498 usertrap_amd64.go:122] [ 224: 224] Allocate a new trap: 0xc003241680 14 D0725 14:31:38.094381 75498 usertrap_amd64.go:225] [ 224: 224] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.116657 75498 task_signals.go:470] [ 225: 225] Notified of signal 56 D0725 14:31:38.116802 75498 task_signals.go:204] [ 225: 225] Signal 225, PID: 225, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.116923 75498 task_exit.go:204] [ 225: 225] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.119017 75498 task_exit.go:204] [ 225: 225] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.119553 75498 task_exit.go:204] [ 224: 224] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.121219 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.121284 75498 task_exit.go:204] [ 224: 224] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.121333 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.121460 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.121516 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.121846 75498 task_exit.go:204] [ 224: 224] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.124340 75498 usertrap_amd64.go:212] [ 226: 226] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.124435 75498 usertrap_amd64.go:122] [ 226: 226] Allocate a new trap: 0xc0015bdaa0 9 D0725 14:31:38.124760 75498 usertrap_amd64.go:225] [ 226: 226] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.126635 75498 usertrap_amd64.go:212] [ 226: 226] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.126686 75498 usertrap_amd64.go:122] [ 226: 226] Allocate a new trap: 0xc0015bdaa0 10 D0725 14:31:38.126730 75498 usertrap_amd64.go:225] [ 226: 226] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.127799 75498 usertrap_amd64.go:212] [ 226: 226] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.127849 75498 usertrap_amd64.go:122] [ 226: 226] Allocate a new trap: 0xc0015bdaa0 11 D0725 14:31:38.127896 75498 usertrap_amd64.go:225] [ 226: 226] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.128984 75498 usertrap_amd64.go:212] [ 226: 226] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.129026 75498 usertrap_amd64.go:122] [ 226: 226] Allocate a new trap: 0xc0015bdaa0 12 D0725 14:31:38.129068 75498 usertrap_amd64.go:225] [ 226: 226] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.130776 75498 usertrap_amd64.go:212] [ 226: 226] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.130819 75498 usertrap_amd64.go:122] [ 226: 226] Allocate a new trap: 0xc0015bdaa0 13 D0725 14:31:38.130875 75498 usertrap_amd64.go:225] [ 226: 226] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.131052 75498 usertrap_amd64.go:212] [ 226: 226] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.131085 75498 usertrap_amd64.go:122] [ 226: 226] Allocate a new trap: 0xc0015bdaa0 14 D0725 14:31:38.131132 75498 usertrap_amd64.go:225] [ 226: 226] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.153737 75498 task_signals.go:470] [ 227: 227] Notified of signal 56 D0725 14:31:38.153823 75498 task_signals.go:204] [ 227: 227] Signal 227, PID: 227, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.153895 75498 task_exit.go:204] [ 227: 227] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.155245 75498 task_exit.go:204] [ 227: 227] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.155966 75498 task_exit.go:204] [ 226: 226] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.157662 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.157728 75498 task_exit.go:204] [ 226: 226] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.157765 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.157859 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.157908 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.158559 75498 task_exit.go:204] [ 226: 226] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.161223 75498 usertrap_amd64.go:212] [ 228: 228] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.161294 75498 usertrap_amd64.go:122] [ 228: 228] Allocate a new trap: 0xc002ad8240 9 D0725 14:31:38.161580 75498 usertrap_amd64.go:225] [ 228: 228] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.163756 75498 usertrap_amd64.go:212] [ 228: 228] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.163810 75498 usertrap_amd64.go:122] [ 228: 228] Allocate a new trap: 0xc002ad8240 10 D0725 14:31:38.163862 75498 usertrap_amd64.go:225] [ 228: 228] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.164765 75498 usertrap_amd64.go:212] [ 228: 228] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.164812 75498 usertrap_amd64.go:122] [ 228: 228] Allocate a new trap: 0xc002ad8240 11 D0725 14:31:38.164870 75498 usertrap_amd64.go:225] [ 228: 228] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.165981 75498 usertrap_amd64.go:212] [ 228: 228] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.166025 75498 usertrap_amd64.go:122] [ 228: 228] Allocate a new trap: 0xc002ad8240 12 D0725 14:31:38.166070 75498 usertrap_amd64.go:225] [ 228: 228] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.167471 75498 usertrap_amd64.go:212] [ 228: 228] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.167515 75498 usertrap_amd64.go:122] [ 228: 228] Allocate a new trap: 0xc002ad8240 13 D0725 14:31:38.167556 75498 usertrap_amd64.go:225] [ 228: 228] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.167743 75498 usertrap_amd64.go:212] [ 228: 228] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.167789 75498 usertrap_amd64.go:122] [ 228: 228] Allocate a new trap: 0xc002ad8240 14 D0725 14:31:38.167833 75498 usertrap_amd64.go:225] [ 228: 228] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.188424 75498 task_signals.go:470] [ 229: 229] Notified of signal 56 D0725 14:31:38.188574 75498 task_signals.go:204] [ 229: 229] Signal 229, PID: 229, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.188664 75498 task_exit.go:204] [ 229: 229] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.190481 75498 task_exit.go:204] [ 229: 229] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.190985 75498 task_exit.go:204] [ 228: 228] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.192777 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.192854 75498 task_exit.go:204] [ 228: 228] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.192881 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.192923 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.192934 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.194105 75498 task_exit.go:204] [ 228: 228] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.196887 75498 usertrap_amd64.go:212] [ 230: 230] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.196972 75498 usertrap_amd64.go:122] [ 230: 230] Allocate a new trap: 0xc002ad8d50 9 D0725 14:31:38.197259 75498 usertrap_amd64.go:225] [ 230: 230] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.199513 75498 usertrap_amd64.go:212] [ 230: 230] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.199570 75498 usertrap_amd64.go:122] [ 230: 230] Allocate a new trap: 0xc002ad8d50 10 D0725 14:31:38.199641 75498 usertrap_amd64.go:225] [ 230: 230] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.200590 75498 usertrap_amd64.go:212] [ 230: 230] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.200632 75498 usertrap_amd64.go:122] [ 230: 230] Allocate a new trap: 0xc002ad8d50 11 D0725 14:31:38.200674 75498 usertrap_amd64.go:225] [ 230: 230] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.202077 75498 usertrap_amd64.go:212] [ 230: 230] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.202123 75498 usertrap_amd64.go:122] [ 230: 230] Allocate a new trap: 0xc002ad8d50 12 D0725 14:31:38.202165 75498 usertrap_amd64.go:225] [ 230: 230] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.203931 75498 usertrap_amd64.go:212] [ 230: 230] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.203980 75498 usertrap_amd64.go:122] [ 230: 230] Allocate a new trap: 0xc002ad8d50 13 D0725 14:31:38.204035 75498 usertrap_amd64.go:225] [ 230: 230] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.204201 75498 usertrap_amd64.go:212] [ 230: 230] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.204244 75498 usertrap_amd64.go:122] [ 230: 230] Allocate a new trap: 0xc002ad8d50 14 D0725 14:31:38.204301 75498 usertrap_amd64.go:225] [ 230: 230] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.227773 75498 task_signals.go:470] [ 231: 231] Notified of signal 56 D0725 14:31:38.227937 75498 task_signals.go:204] [ 231: 231] Signal 231, PID: 231, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.228051 75498 task_exit.go:204] [ 231: 231] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.230043 75498 task_exit.go:204] [ 231: 231] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.231214 75498 task_exit.go:204] [ 230: 230] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.233816 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.233934 75498 task_exit.go:204] [ 230: 230] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.233992 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.234068 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.234139 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.234253 75498 task_exit.go:204] [ 230: 230] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.237106 75498 usertrap_amd64.go:212] [ 232: 232] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.237171 75498 usertrap_amd64.go:122] [ 232: 232] Allocate a new trap: 0xc0036af950 9 D0725 14:31:38.237493 75498 usertrap_amd64.go:225] [ 232: 232] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.239594 75498 usertrap_amd64.go:212] [ 232: 232] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.239663 75498 usertrap_amd64.go:122] [ 232: 232] Allocate a new trap: 0xc0036af950 10 D0725 14:31:38.239750 75498 usertrap_amd64.go:225] [ 232: 232] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.240763 75498 usertrap_amd64.go:212] [ 232: 232] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.240820 75498 usertrap_amd64.go:122] [ 232: 232] Allocate a new trap: 0xc0036af950 11 D0725 14:31:38.240882 75498 usertrap_amd64.go:225] [ 232: 232] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.242120 75498 usertrap_amd64.go:212] [ 232: 232] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.242162 75498 usertrap_amd64.go:122] [ 232: 232] Allocate a new trap: 0xc0036af950 12 D0725 14:31:38.242235 75498 usertrap_amd64.go:225] [ 232: 232] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.243814 75498 usertrap_amd64.go:212] [ 232: 232] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.243884 75498 usertrap_amd64.go:122] [ 232: 232] Allocate a new trap: 0xc0036af950 13 D0725 14:31:38.243954 75498 usertrap_amd64.go:225] [ 232: 232] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.244186 75498 usertrap_amd64.go:212] [ 232: 232] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.244226 75498 usertrap_amd64.go:122] [ 232: 232] Allocate a new trap: 0xc0036af950 14 D0725 14:31:38.244317 75498 usertrap_amd64.go:225] [ 232: 232] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.267939 75498 task_signals.go:470] [ 233: 233] Notified of signal 56 D0725 14:31:38.268080 75498 task_signals.go:204] [ 233: 233] Signal 233, PID: 233, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.268176 75498 task_exit.go:204] [ 233: 233] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.269931 75498 task_exit.go:204] [ 233: 233] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.270647 75498 task_exit.go:204] [ 232: 232] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.272630 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.272719 75498 task_exit.go:204] [ 232: 232] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.272763 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.272844 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.272899 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.273811 75498 task_exit.go:204] [ 232: 232] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.276484 75498 usertrap_amd64.go:212] [ 234: 234] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.276568 75498 usertrap_amd64.go:122] [ 234: 234] Allocate a new trap: 0xc0003c8ea0 9 D0725 14:31:38.276982 75498 usertrap_amd64.go:225] [ 234: 234] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.279520 75498 usertrap_amd64.go:212] [ 234: 234] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.279573 75498 usertrap_amd64.go:122] [ 234: 234] Allocate a new trap: 0xc0003c8ea0 10 D0725 14:31:38.279675 75498 usertrap_amd64.go:225] [ 234: 234] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.280761 75498 usertrap_amd64.go:212] [ 234: 234] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.280822 75498 usertrap_amd64.go:122] [ 234: 234] Allocate a new trap: 0xc0003c8ea0 11 D0725 14:31:38.280915 75498 usertrap_amd64.go:225] [ 234: 234] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.281962 75498 usertrap_amd64.go:212] [ 234: 234] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.282012 75498 usertrap_amd64.go:122] [ 234: 234] Allocate a new trap: 0xc0003c8ea0 12 D0725 14:31:38.282072 75498 usertrap_amd64.go:225] [ 234: 234] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.283718 75498 usertrap_amd64.go:212] [ 234: 234] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.283765 75498 usertrap_amd64.go:122] [ 234: 234] Allocate a new trap: 0xc0003c8ea0 13 D0725 14:31:38.283834 75498 usertrap_amd64.go:225] [ 234: 234] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.284080 75498 usertrap_amd64.go:212] [ 234: 234] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.284120 75498 usertrap_amd64.go:122] [ 234: 234] Allocate a new trap: 0xc0003c8ea0 14 D0725 14:31:38.284179 75498 usertrap_amd64.go:225] [ 234: 234] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.306177 75498 task_signals.go:470] [ 235: 235] Notified of signal 56 D0725 14:31:38.306400 75498 task_signals.go:204] [ 235: 235] Signal 235, PID: 235, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.306495 75498 task_exit.go:204] [ 235: 235] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.308389 75498 task_exit.go:204] [ 235: 235] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.308621 75498 task_exit.go:204] [ 234: 234] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.310435 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.310506 75498 task_exit.go:204] [ 234: 234] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.310562 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.310621 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.310675 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.311136 75498 task_exit.go:204] [ 234: 234] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.313854 75498 usertrap_amd64.go:212] [ 236: 236] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.313952 75498 usertrap_amd64.go:122] [ 236: 236] Allocate a new trap: 0xc003241a40 9 D0725 14:31:38.314258 75498 usertrap_amd64.go:225] [ 236: 236] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.316589 75498 usertrap_amd64.go:212] [ 236: 236] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.316649 75498 usertrap_amd64.go:122] [ 236: 236] Allocate a new trap: 0xc003241a40 10 D0725 14:31:38.316715 75498 usertrap_amd64.go:225] [ 236: 236] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.317554 75498 usertrap_amd64.go:212] [ 236: 236] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.317601 75498 usertrap_amd64.go:122] [ 236: 236] Allocate a new trap: 0xc003241a40 11 D0725 14:31:38.317688 75498 usertrap_amd64.go:225] [ 236: 236] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.319041 75498 usertrap_amd64.go:212] [ 236: 236] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.319080 75498 usertrap_amd64.go:122] [ 236: 236] Allocate a new trap: 0xc003241a40 12 D0725 14:31:38.319139 75498 usertrap_amd64.go:225] [ 236: 236] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.320859 75498 usertrap_amd64.go:212] [ 236: 236] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.320912 75498 usertrap_amd64.go:122] [ 236: 236] Allocate a new trap: 0xc003241a40 13 D0725 14:31:38.320955 75498 usertrap_amd64.go:225] [ 236: 236] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.321143 75498 usertrap_amd64.go:212] [ 236: 236] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.321186 75498 usertrap_amd64.go:122] [ 236: 236] Allocate a new trap: 0xc003241a40 14 D0725 14:31:38.321232 75498 usertrap_amd64.go:225] [ 236: 236] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.344720 75498 task_signals.go:470] [ 237: 237] Notified of signal 56 D0725 14:31:38.344863 75498 task_signals.go:204] [ 237: 237] Signal 237, PID: 237, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.344943 75498 task_exit.go:204] [ 237: 237] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.346476 75498 task_exit.go:204] [ 237: 237] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.347208 75498 task_exit.go:204] [ 236: 236] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.349693 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.349810 75498 task_exit.go:204] [ 236: 236] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.349882 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.349903 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.349925 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.350280 75498 task_exit.go:204] [ 236: 236] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.353076 75498 usertrap_amd64.go:212] [ 238: 238] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.353142 75498 usertrap_amd64.go:122] [ 238: 238] Allocate a new trap: 0xc003e0d5f0 9 D0725 14:31:38.353478 75498 usertrap_amd64.go:225] [ 238: 238] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.355729 75498 usertrap_amd64.go:212] [ 238: 238] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.355776 75498 usertrap_amd64.go:122] [ 238: 238] Allocate a new trap: 0xc003e0d5f0 10 D0725 14:31:38.355829 75498 usertrap_amd64.go:225] [ 238: 238] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.356754 75498 usertrap_amd64.go:212] [ 238: 238] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.356793 75498 usertrap_amd64.go:122] [ 238: 238] Allocate a new trap: 0xc003e0d5f0 11 D0725 14:31:38.356851 75498 usertrap_amd64.go:225] [ 238: 238] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.358102 75498 usertrap_amd64.go:212] [ 238: 238] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.358146 75498 usertrap_amd64.go:122] [ 238: 238] Allocate a new trap: 0xc003e0d5f0 12 D0725 14:31:38.358229 75498 usertrap_amd64.go:225] [ 238: 238] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.360166 75498 usertrap_amd64.go:212] [ 238: 238] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.360212 75498 usertrap_amd64.go:122] [ 238: 238] Allocate a new trap: 0xc003e0d5f0 13 D0725 14:31:38.360258 75498 usertrap_amd64.go:225] [ 238: 238] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.360449 75498 usertrap_amd64.go:212] [ 238: 238] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.360485 75498 usertrap_amd64.go:122] [ 238: 238] Allocate a new trap: 0xc003e0d5f0 14 D0725 14:31:38.360530 75498 usertrap_amd64.go:225] [ 238: 238] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.383969 75498 task_signals.go:470] [ 239: 239] Notified of signal 56 D0725 14:31:38.384062 75498 task_signals.go:204] [ 239: 239] Signal 239, PID: 239, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.384135 75498 task_exit.go:204] [ 239: 239] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.385495 75498 task_exit.go:204] [ 239: 239] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.386610 75498 task_exit.go:204] [ 238: 238] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.388518 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.388607 75498 task_exit.go:204] [ 238: 238] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.388663 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.388664 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.388741 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.389653 75498 task_exit.go:204] [ 238: 238] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.392652 75498 usertrap_amd64.go:212] [ 240: 240] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.392733 75498 usertrap_amd64.go:122] [ 240: 240] Allocate a new trap: 0xc000bdd0e0 9 D0725 14:31:38.393045 75498 usertrap_amd64.go:225] [ 240: 240] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.395590 75498 usertrap_amd64.go:212] [ 240: 240] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.395679 75498 usertrap_amd64.go:122] [ 240: 240] Allocate a new trap: 0xc000bdd0e0 10 D0725 14:31:38.395756 75498 usertrap_amd64.go:225] [ 240: 240] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.396953 75498 usertrap_amd64.go:212] [ 240: 240] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.397007 75498 usertrap_amd64.go:122] [ 240: 240] Allocate a new trap: 0xc000bdd0e0 11 D0725 14:31:38.397112 75498 usertrap_amd64.go:225] [ 240: 240] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.398787 75498 usertrap_amd64.go:212] [ 240: 240] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.398881 75498 usertrap_amd64.go:122] [ 240: 240] Allocate a new trap: 0xc000bdd0e0 12 D0725 14:31:38.398946 75498 usertrap_amd64.go:225] [ 240: 240] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.400887 75498 usertrap_amd64.go:212] [ 240: 240] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.400929 75498 usertrap_amd64.go:122] [ 240: 240] Allocate a new trap: 0xc000bdd0e0 13 D0725 14:31:38.400988 75498 usertrap_amd64.go:225] [ 240: 240] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.401148 75498 usertrap_amd64.go:212] [ 240: 240] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.401190 75498 usertrap_amd64.go:122] [ 240: 240] Allocate a new trap: 0xc000bdd0e0 14 D0725 14:31:38.401236 75498 usertrap_amd64.go:225] [ 240: 240] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.424242 75498 task_signals.go:470] [ 241: 241] Notified of signal 56 D0725 14:31:38.424375 75498 task_signals.go:204] [ 241: 241] Signal 241, PID: 241, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.424456 75498 task_exit.go:204] [ 241: 241] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.425887 75498 task_exit.go:204] [ 241: 241] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.426478 75498 task_exit.go:204] [ 240: 240] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.428314 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.428407 75498 task_exit.go:204] [ 240: 240] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.428493 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.428548 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.428609 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.429080 75498 task_exit.go:204] [ 240: 240] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.431692 75498 usertrap_amd64.go:212] [ 242: 242] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.431766 75498 usertrap_amd64.go:122] [ 242: 242] Allocate a new trap: 0xc000048b10 9 D0725 14:31:38.432107 75498 usertrap_amd64.go:225] [ 242: 242] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.434211 75498 usertrap_amd64.go:212] [ 242: 242] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.434253 75498 usertrap_amd64.go:122] [ 242: 242] Allocate a new trap: 0xc000048b10 10 D0725 14:31:38.434298 75498 usertrap_amd64.go:225] [ 242: 242] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.435103 75498 usertrap_amd64.go:212] [ 242: 242] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.435149 75498 usertrap_amd64.go:122] [ 242: 242] Allocate a new trap: 0xc000048b10 11 D0725 14:31:38.435190 75498 usertrap_amd64.go:225] [ 242: 242] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.436295 75498 usertrap_amd64.go:212] [ 242: 242] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.436337 75498 usertrap_amd64.go:122] [ 242: 242] Allocate a new trap: 0xc000048b10 12 D0725 14:31:38.436377 75498 usertrap_amd64.go:225] [ 242: 242] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.438008 75498 usertrap_amd64.go:212] [ 242: 242] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.438058 75498 usertrap_amd64.go:122] [ 242: 242] Allocate a new trap: 0xc000048b10 13 D0725 14:31:38.438098 75498 usertrap_amd64.go:225] [ 242: 242] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.438295 75498 usertrap_amd64.go:212] [ 242: 242] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.438344 75498 usertrap_amd64.go:122] [ 242: 242] Allocate a new trap: 0xc000048b10 14 D0725 14:31:38.438396 75498 usertrap_amd64.go:225] [ 242: 242] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.465631 75498 task_signals.go:470] [ 243: 243] Notified of signal 56 D0725 14:31:38.465823 75498 task_signals.go:204] [ 243: 243] Signal 243, PID: 243, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.465929 75498 task_exit.go:204] [ 243: 243] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.467826 75498 task_exit.go:204] [ 242: 242] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.468007 75498 task_exit.go:204] [ 243: 243] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.469563 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.469650 75498 task_exit.go:204] [ 242: 242] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.469727 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.469776 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.469833 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.470232 75498 task_exit.go:204] [ 242: 242] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.472997 75498 usertrap_amd64.go:212] [ 244: 244] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.473076 75498 usertrap_amd64.go:122] [ 244: 244] Allocate a new trap: 0xc000bdc030 9 D0725 14:31:38.473394 75498 usertrap_amd64.go:225] [ 244: 244] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.475333 75498 usertrap_amd64.go:212] [ 244: 244] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.475392 75498 usertrap_amd64.go:122] [ 244: 244] Allocate a new trap: 0xc000bdc030 10 D0725 14:31:38.475445 75498 usertrap_amd64.go:225] [ 244: 244] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.476184 75498 usertrap_amd64.go:212] [ 244: 244] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.476229 75498 usertrap_amd64.go:122] [ 244: 244] Allocate a new trap: 0xc000bdc030 11 D0725 14:31:38.476270 75498 usertrap_amd64.go:225] [ 244: 244] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.477137 75498 usertrap_amd64.go:212] [ 244: 244] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.477174 75498 usertrap_amd64.go:122] [ 244: 244] Allocate a new trap: 0xc000bdc030 12 D0725 14:31:38.477214 75498 usertrap_amd64.go:225] [ 244: 244] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.478805 75498 usertrap_amd64.go:212] [ 244: 244] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.478862 75498 usertrap_amd64.go:122] [ 244: 244] Allocate a new trap: 0xc000bdc030 13 D0725 14:31:38.478913 75498 usertrap_amd64.go:225] [ 244: 244] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.479068 75498 usertrap_amd64.go:212] [ 244: 244] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.479101 75498 usertrap_amd64.go:122] [ 244: 244] Allocate a new trap: 0xc000bdc030 14 D0725 14:31:38.479159 75498 usertrap_amd64.go:225] [ 244: 244] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.501666 75498 task_signals.go:470] [ 245: 245] Notified of signal 56 D0725 14:31:38.501816 75498 task_signals.go:204] [ 245: 245] Signal 245, PID: 245, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.501931 75498 task_exit.go:204] [ 245: 245] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.503354 75498 task_exit.go:204] [ 245: 245] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.504223 75498 task_exit.go:204] [ 244: 244] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.505958 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.506030 75498 task_exit.go:204] [ 244: 244] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.506084 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.506096 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.506160 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.506484 75498 task_exit.go:204] [ 244: 244] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.509353 75498 usertrap_amd64.go:212] [ 246: 246] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.509434 75498 usertrap_amd64.go:122] [ 246: 246] Allocate a new trap: 0xc000048180 9 D0725 14:31:38.509749 75498 usertrap_amd64.go:225] [ 246: 246] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.511828 75498 usertrap_amd64.go:212] [ 246: 246] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.511902 75498 usertrap_amd64.go:122] [ 246: 246] Allocate a new trap: 0xc000048180 10 D0725 14:31:38.511961 75498 usertrap_amd64.go:225] [ 246: 246] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.512699 75498 usertrap_amd64.go:212] [ 246: 246] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.512740 75498 usertrap_amd64.go:122] [ 246: 246] Allocate a new trap: 0xc000048180 11 D0725 14:31:38.512796 75498 usertrap_amd64.go:225] [ 246: 246] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.513795 75498 usertrap_amd64.go:212] [ 246: 246] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.513838 75498 usertrap_amd64.go:122] [ 246: 246] Allocate a new trap: 0xc000048180 12 D0725 14:31:38.513891 75498 usertrap_amd64.go:225] [ 246: 246] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.515474 75498 usertrap_amd64.go:212] [ 246: 246] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.515530 75498 usertrap_amd64.go:122] [ 246: 246] Allocate a new trap: 0xc000048180 13 D0725 14:31:38.515573 75498 usertrap_amd64.go:225] [ 246: 246] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.515748 75498 usertrap_amd64.go:212] [ 246: 246] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.515797 75498 usertrap_amd64.go:122] [ 246: 246] Allocate a new trap: 0xc000048180 14 D0725 14:31:38.515867 75498 usertrap_amd64.go:225] [ 246: 246] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.538756 75498 task_signals.go:470] [ 247: 247] Notified of signal 56 D0725 14:31:38.538904 75498 task_signals.go:204] [ 247: 247] Signal 247, PID: 247, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.539023 75498 task_exit.go:204] [ 247: 247] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.540587 75498 task_exit.go:204] [ 247: 247] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.541322 75498 task_exit.go:204] [ 246: 246] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.543151 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.543216 75498 task_exit.go:204] [ 246: 246] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.543267 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.543289 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.543355 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.543367 75498 task_exit.go:204] [ 246: 246] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.546126 75498 usertrap_amd64.go:212] [ 248: 248] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.546207 75498 usertrap_amd64.go:122] [ 248: 248] Allocate a new trap: 0xc000bdcea0 9 D0725 14:31:38.546521 75498 usertrap_amd64.go:225] [ 248: 248] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.548503 75498 usertrap_amd64.go:212] [ 248: 248] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.548567 75498 usertrap_amd64.go:122] [ 248: 248] Allocate a new trap: 0xc000bdcea0 10 D0725 14:31:38.548624 75498 usertrap_amd64.go:225] [ 248: 248] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.549558 75498 usertrap_amd64.go:212] [ 248: 248] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.549613 75498 usertrap_amd64.go:122] [ 248: 248] Allocate a new trap: 0xc000bdcea0 11 D0725 14:31:38.549658 75498 usertrap_amd64.go:225] [ 248: 248] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.550940 75498 usertrap_amd64.go:212] [ 248: 248] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.551011 75498 usertrap_amd64.go:122] [ 248: 248] Allocate a new trap: 0xc000bdcea0 12 D0725 14:31:38.551065 75498 usertrap_amd64.go:225] [ 248: 248] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.552719 75498 usertrap_amd64.go:212] [ 248: 248] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.552772 75498 usertrap_amd64.go:122] [ 248: 248] Allocate a new trap: 0xc000bdcea0 13 D0725 14:31:38.552819 75498 usertrap_amd64.go:225] [ 248: 248] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.552995 75498 usertrap_amd64.go:212] [ 248: 248] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.553030 75498 usertrap_amd64.go:122] [ 248: 248] Allocate a new trap: 0xc000bdcea0 14 D0725 14:31:38.553074 75498 usertrap_amd64.go:225] [ 248: 248] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.573777 75498 task_signals.go:470] [ 249: 249] Notified of signal 56 D0725 14:31:38.573997 75498 task_signals.go:204] [ 249: 249] Signal 249, PID: 249, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.574090 75498 task_exit.go:204] [ 249: 249] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.575583 75498 task_exit.go:204] [ 249: 249] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.576368 75498 task_exit.go:204] [ 248: 248] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.578155 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.578223 75498 task_exit.go:204] [ 248: 248] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.578267 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.578291 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.578348 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.578859 75498 task_exit.go:204] [ 248: 248] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.581400 75498 usertrap_amd64.go:212] [ 250: 250] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.581458 75498 usertrap_amd64.go:122] [ 250: 250] Allocate a new trap: 0xc001898300 9 D0725 14:31:38.581729 75498 usertrap_amd64.go:225] [ 250: 250] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.583541 75498 usertrap_amd64.go:212] [ 250: 250] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.583589 75498 usertrap_amd64.go:122] [ 250: 250] Allocate a new trap: 0xc001898300 10 D0725 14:31:38.583654 75498 usertrap_amd64.go:225] [ 250: 250] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.584472 75498 usertrap_amd64.go:212] [ 250: 250] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.584522 75498 usertrap_amd64.go:122] [ 250: 250] Allocate a new trap: 0xc001898300 11 D0725 14:31:38.584589 75498 usertrap_amd64.go:225] [ 250: 250] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.585864 75498 usertrap_amd64.go:212] [ 250: 250] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.585930 75498 usertrap_amd64.go:122] [ 250: 250] Allocate a new trap: 0xc001898300 12 D0725 14:31:38.585992 75498 usertrap_amd64.go:225] [ 250: 250] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.587431 75498 usertrap_amd64.go:212] [ 250: 250] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.587481 75498 usertrap_amd64.go:122] [ 250: 250] Allocate a new trap: 0xc001898300 13 D0725 14:31:38.587530 75498 usertrap_amd64.go:225] [ 250: 250] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.587840 75498 usertrap_amd64.go:212] [ 250: 250] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.587919 75498 usertrap_amd64.go:122] [ 250: 250] Allocate a new trap: 0xc001898300 14 D0725 14:31:38.588034 75498 usertrap_amd64.go:225] [ 250: 250] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.611940 75498 task_signals.go:470] [ 251: 251] Notified of signal 56 D0725 14:31:38.612142 75498 task_signals.go:204] [ 251: 251] Signal 251, PID: 251, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.612245 75498 task_exit.go:204] [ 251: 251] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.614034 75498 task_exit.go:204] [ 251: 251] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.614463 75498 task_exit.go:204] [ 250: 250] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.616683 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.616801 75498 task_exit.go:204] [ 250: 250] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.616875 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.616983 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.617065 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.617848 75498 task_exit.go:204] [ 250: 250] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.620746 75498 usertrap_amd64.go:212] [ 252: 252] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.620848 75498 usertrap_amd64.go:122] [ 252: 252] Allocate a new trap: 0xc0002e4210 9 D0725 14:31:38.621223 75498 usertrap_amd64.go:225] [ 252: 252] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.623673 75498 usertrap_amd64.go:212] [ 252: 252] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.623741 75498 usertrap_amd64.go:122] [ 252: 252] Allocate a new trap: 0xc0002e4210 10 D0725 14:31:38.623811 75498 usertrap_amd64.go:225] [ 252: 252] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.624789 75498 usertrap_amd64.go:212] [ 252: 252] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.624836 75498 usertrap_amd64.go:122] [ 252: 252] Allocate a new trap: 0xc0002e4210 11 D0725 14:31:38.624889 75498 usertrap_amd64.go:225] [ 252: 252] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.626219 75498 usertrap_amd64.go:212] [ 252: 252] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.626265 75498 usertrap_amd64.go:122] [ 252: 252] Allocate a new trap: 0xc0002e4210 12 D0725 14:31:38.626323 75498 usertrap_amd64.go:225] [ 252: 252] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.627850 75498 usertrap_amd64.go:212] [ 252: 252] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.627903 75498 usertrap_amd64.go:122] [ 252: 252] Allocate a new trap: 0xc0002e4210 13 D0725 14:31:38.627953 75498 usertrap_amd64.go:225] [ 252: 252] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.628151 75498 usertrap_amd64.go:212] [ 252: 252] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.628202 75498 usertrap_amd64.go:122] [ 252: 252] Allocate a new trap: 0xc0002e4210 14 D0725 14:31:38.628251 75498 usertrap_amd64.go:225] [ 252: 252] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.651538 75498 task_signals.go:470] [ 253: 253] Notified of signal 56 D0725 14:31:38.651720 75498 task_signals.go:204] [ 253: 253] Signal 253, PID: 253, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.651832 75498 task_exit.go:204] [ 253: 253] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.653161 75498 task_exit.go:204] [ 253: 253] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.653795 75498 task_exit.go:204] [ 252: 252] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.655834 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.655935 75498 task_exit.go:204] [ 252: 252] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.656010 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.656007 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.656093 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.656249 75498 task_exit.go:204] [ 252: 252] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.659031 75498 usertrap_amd64.go:212] [ 254: 254] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.659092 75498 usertrap_amd64.go:122] [ 254: 254] Allocate a new trap: 0xc0002e4540 9 D0725 14:31:38.659373 75498 usertrap_amd64.go:225] [ 254: 254] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.661523 75498 usertrap_amd64.go:212] [ 254: 254] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.661585 75498 usertrap_amd64.go:122] [ 254: 254] Allocate a new trap: 0xc0002e4540 10 D0725 14:31:38.661641 75498 usertrap_amd64.go:225] [ 254: 254] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.662653 75498 usertrap_amd64.go:212] [ 254: 254] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.662709 75498 usertrap_amd64.go:122] [ 254: 254] Allocate a new trap: 0xc0002e4540 11 D0725 14:31:38.662777 75498 usertrap_amd64.go:225] [ 254: 254] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.664188 75498 usertrap_amd64.go:212] [ 254: 254] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.664239 75498 usertrap_amd64.go:122] [ 254: 254] Allocate a new trap: 0xc0002e4540 12 D0725 14:31:38.664299 75498 usertrap_amd64.go:225] [ 254: 254] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.665927 75498 usertrap_amd64.go:212] [ 254: 254] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.665972 75498 usertrap_amd64.go:122] [ 254: 254] Allocate a new trap: 0xc0002e4540 13 D0725 14:31:38.666039 75498 usertrap_amd64.go:225] [ 254: 254] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.666249 75498 usertrap_amd64.go:212] [ 254: 254] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.666310 75498 usertrap_amd64.go:122] [ 254: 254] Allocate a new trap: 0xc0002e4540 14 D0725 14:31:38.666399 75498 usertrap_amd64.go:225] [ 254: 254] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.689141 75498 task_signals.go:470] [ 255: 255] Notified of signal 56 D0725 14:31:38.689340 75498 task_signals.go:204] [ 255: 255] Signal 255, PID: 255, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.689454 75498 task_exit.go:204] [ 255: 255] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.690966 75498 task_exit.go:204] [ 255: 255] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.691796 75498 task_exit.go:204] [ 254: 254] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.693718 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.693827 75498 task_exit.go:204] [ 254: 254] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.693874 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.693897 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.693958 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.695171 75498 task_exit.go:204] [ 254: 254] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.698211 75498 usertrap_amd64.go:212] [ 256: 256] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.698281 75498 usertrap_amd64.go:122] [ 256: 256] Allocate a new trap: 0xc002ad90e0 9 D0725 14:31:38.698575 75498 usertrap_amd64.go:225] [ 256: 256] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.700801 75498 usertrap_amd64.go:212] [ 256: 256] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.700855 75498 usertrap_amd64.go:122] [ 256: 256] Allocate a new trap: 0xc002ad90e0 10 D0725 14:31:38.700908 75498 usertrap_amd64.go:225] [ 256: 256] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.701766 75498 usertrap_amd64.go:212] [ 256: 256] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.701809 75498 usertrap_amd64.go:122] [ 256: 256] Allocate a new trap: 0xc002ad90e0 11 D0725 14:31:38.701850 75498 usertrap_amd64.go:225] [ 256: 256] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.703015 75498 usertrap_amd64.go:212] [ 256: 256] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.703066 75498 usertrap_amd64.go:122] [ 256: 256] Allocate a new trap: 0xc002ad90e0 12 D0725 14:31:38.703114 75498 usertrap_amd64.go:225] [ 256: 256] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.704995 75498 usertrap_amd64.go:212] [ 256: 256] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.705053 75498 usertrap_amd64.go:122] [ 256: 256] Allocate a new trap: 0xc002ad90e0 13 D0725 14:31:38.705121 75498 usertrap_amd64.go:225] [ 256: 256] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.705296 75498 usertrap_amd64.go:212] [ 256: 256] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.705342 75498 usertrap_amd64.go:122] [ 256: 256] Allocate a new trap: 0xc002ad90e0 14 D0725 14:31:38.705392 75498 usertrap_amd64.go:225] [ 256: 256] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.728502 75498 task_signals.go:470] [ 257: 257] Notified of signal 56 D0725 14:31:38.728681 75498 task_signals.go:204] [ 257: 257] Signal 257, PID: 257, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.728783 75498 task_exit.go:204] [ 257: 257] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.730126 75498 task_exit.go:204] [ 257: 257] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.730897 75498 task_exit.go:204] [ 256: 256] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.732978 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.733039 75498 task_exit.go:204] [ 256: 256] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.733118 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.733147 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.733200 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.733658 75498 task_exit.go:204] [ 256: 256] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.736748 75498 usertrap_amd64.go:212] [ 258: 258] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.736850 75498 usertrap_amd64.go:122] [ 258: 258] Allocate a new trap: 0xc0002e51a0 9 D0725 14:31:38.737321 75498 usertrap_amd64.go:225] [ 258: 258] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.739899 75498 usertrap_amd64.go:212] [ 258: 258] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.739949 75498 usertrap_amd64.go:122] [ 258: 258] Allocate a new trap: 0xc0002e51a0 10 D0725 14:31:38.740023 75498 usertrap_amd64.go:225] [ 258: 258] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.740915 75498 usertrap_amd64.go:212] [ 258: 258] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.740965 75498 usertrap_amd64.go:122] [ 258: 258] Allocate a new trap: 0xc0002e51a0 11 D0725 14:31:38.741027 75498 usertrap_amd64.go:225] [ 258: 258] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.742136 75498 usertrap_amd64.go:212] [ 258: 258] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.742176 75498 usertrap_amd64.go:122] [ 258: 258] Allocate a new trap: 0xc0002e51a0 12 D0725 14:31:38.742233 75498 usertrap_amd64.go:225] [ 258: 258] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.743878 75498 usertrap_amd64.go:212] [ 258: 258] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.743937 75498 usertrap_amd64.go:122] [ 258: 258] Allocate a new trap: 0xc0002e51a0 13 D0725 14:31:38.743982 75498 usertrap_amd64.go:225] [ 258: 258] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.744147 75498 usertrap_amd64.go:212] [ 258: 258] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.744181 75498 usertrap_amd64.go:122] [ 258: 258] Allocate a new trap: 0xc0002e51a0 14 D0725 14:31:38.744234 75498 usertrap_amd64.go:225] [ 258: 258] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.767116 75498 task_signals.go:470] [ 259: 259] Notified of signal 56 D0725 14:31:38.767278 75498 task_signals.go:204] [ 259: 259] Signal 259, PID: 259, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.767381 75498 task_exit.go:204] [ 259: 259] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.769043 75498 task_exit.go:204] [ 259: 259] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.769599 75498 task_exit.go:204] [ 258: 258] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.771500 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.771565 75498 task_exit.go:204] [ 258: 258] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.771633 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.771715 75498 task_exit.go:204] [ 258: 258] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.771756 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.771812 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.774211 75498 usertrap_amd64.go:212] [ 260: 260] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.774276 75498 usertrap_amd64.go:122] [ 260: 260] Allocate a new trap: 0xc0002df470 9 D0725 14:31:38.774556 75498 usertrap_amd64.go:225] [ 260: 260] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.776475 75498 usertrap_amd64.go:212] [ 260: 260] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.776519 75498 usertrap_amd64.go:122] [ 260: 260] Allocate a new trap: 0xc0002df470 10 D0725 14:31:38.776588 75498 usertrap_amd64.go:225] [ 260: 260] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.777473 75498 usertrap_amd64.go:212] [ 260: 260] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.777515 75498 usertrap_amd64.go:122] [ 260: 260] Allocate a new trap: 0xc0002df470 11 D0725 14:31:38.777570 75498 usertrap_amd64.go:225] [ 260: 260] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.778516 75498 usertrap_amd64.go:212] [ 260: 260] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.778558 75498 usertrap_amd64.go:122] [ 260: 260] Allocate a new trap: 0xc0002df470 12 D0725 14:31:38.778612 75498 usertrap_amd64.go:225] [ 260: 260] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.780032 75498 usertrap_amd64.go:212] [ 260: 260] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.780076 75498 usertrap_amd64.go:122] [ 260: 260] Allocate a new trap: 0xc0002df470 13 D0725 14:31:38.780119 75498 usertrap_amd64.go:225] [ 260: 260] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.780280 75498 usertrap_amd64.go:212] [ 260: 260] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.780323 75498 usertrap_amd64.go:122] [ 260: 260] Allocate a new trap: 0xc0002df470 14 D0725 14:31:38.780376 75498 usertrap_amd64.go:225] [ 260: 260] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.800545 75498 task_signals.go:470] [ 261: 261] Notified of signal 56 D0725 14:31:38.800679 75498 task_signals.go:204] [ 261: 261] Signal 261, PID: 261, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.800788 75498 task_exit.go:204] [ 261: 261] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.802233 75498 task_exit.go:204] [ 261: 261] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.803205 75498 task_exit.go:204] [ 260: 260] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.805008 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.805092 75498 task_exit.go:204] [ 260: 260] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.805134 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.805183 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.805182 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.806127 75498 task_exit.go:204] [ 260: 260] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.808903 75498 usertrap_amd64.go:212] [ 262: 262] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.808978 75498 usertrap_amd64.go:122] [ 262: 262] Allocate a new trap: 0xc000480540 9 D0725 14:31:38.809339 75498 usertrap_amd64.go:225] [ 262: 262] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.811489 75498 usertrap_amd64.go:212] [ 262: 262] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.811543 75498 usertrap_amd64.go:122] [ 262: 262] Allocate a new trap: 0xc000480540 10 D0725 14:31:38.811586 75498 usertrap_amd64.go:225] [ 262: 262] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.812627 75498 usertrap_amd64.go:212] [ 262: 262] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.812678 75498 usertrap_amd64.go:122] [ 262: 262] Allocate a new trap: 0xc000480540 11 D0725 14:31:38.812720 75498 usertrap_amd64.go:225] [ 262: 262] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.813906 75498 usertrap_amd64.go:212] [ 262: 262] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.813952 75498 usertrap_amd64.go:122] [ 262: 262] Allocate a new trap: 0xc000480540 12 D0725 14:31:38.813995 75498 usertrap_amd64.go:225] [ 262: 262] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.815461 75498 usertrap_amd64.go:212] [ 262: 262] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.815512 75498 usertrap_amd64.go:122] [ 262: 262] Allocate a new trap: 0xc000480540 13 D0725 14:31:38.815560 75498 usertrap_amd64.go:225] [ 262: 262] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.815754 75498 usertrap_amd64.go:212] [ 262: 262] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.815798 75498 usertrap_amd64.go:122] [ 262: 262] Allocate a new trap: 0xc000480540 14 D0725 14:31:38.815845 75498 usertrap_amd64.go:225] [ 262: 262] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.837786 75498 task_signals.go:470] [ 263: 263] Notified of signal 56 D0725 14:31:38.837932 75498 task_signals.go:204] [ 263: 263] Signal 263, PID: 263, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.838006 75498 task_exit.go:204] [ 263: 263] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.839481 75498 task_exit.go:204] [ 263: 263] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.840366 75498 task_exit.go:204] [ 262: 262] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.842056 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.842170 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.842202 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.842204 75498 task_exit.go:204] [ 262: 262] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.842268 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.843429 75498 task_exit.go:204] [ 262: 262] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.846027 75498 usertrap_amd64.go:212] [ 264: 264] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.846100 75498 usertrap_amd64.go:122] [ 264: 264] Allocate a new trap: 0xc001899200 9 D0725 14:31:38.846432 75498 usertrap_amd64.go:225] [ 264: 264] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.848909 75498 usertrap_amd64.go:212] [ 264: 264] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.848967 75498 usertrap_amd64.go:122] [ 264: 264] Allocate a new trap: 0xc001899200 10 D0725 14:31:38.849043 75498 usertrap_amd64.go:225] [ 264: 264] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.850113 75498 usertrap_amd64.go:212] [ 264: 264] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.850172 75498 usertrap_amd64.go:122] [ 264: 264] Allocate a new trap: 0xc001899200 11 D0725 14:31:38.850235 75498 usertrap_amd64.go:225] [ 264: 264] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.851308 75498 usertrap_amd64.go:212] [ 264: 264] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.851351 75498 usertrap_amd64.go:122] [ 264: 264] Allocate a new trap: 0xc001899200 12 D0725 14:31:38.851392 75498 usertrap_amd64.go:225] [ 264: 264] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.853097 75498 usertrap_amd64.go:212] [ 264: 264] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.853145 75498 usertrap_amd64.go:122] [ 264: 264] Allocate a new trap: 0xc001899200 13 D0725 14:31:38.853198 75498 usertrap_amd64.go:225] [ 264: 264] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.853410 75498 usertrap_amd64.go:212] [ 264: 264] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.853448 75498 usertrap_amd64.go:122] [ 264: 264] Allocate a new trap: 0xc001899200 14 D0725 14:31:38.853489 75498 usertrap_amd64.go:225] [ 264: 264] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.875733 75498 task_signals.go:470] [ 265: 265] Notified of signal 56 D0725 14:31:38.875913 75498 task_signals.go:204] [ 265: 265] Signal 265, PID: 265, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.876012 75498 task_exit.go:204] [ 265: 265] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.877591 75498 task_exit.go:204] [ 265: 265] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.877679 75498 task_exit.go:204] [ 264: 264] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.879283 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.879351 75498 task_exit.go:204] [ 264: 264] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.879406 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.879506 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.879574 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.879788 75498 task_exit.go:204] [ 264: 264] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.882760 75498 usertrap_amd64.go:212] [ 266: 266] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.882837 75498 usertrap_amd64.go:122] [ 266: 266] Allocate a new trap: 0xc001899530 9 D0725 14:31:38.883140 75498 usertrap_amd64.go:225] [ 266: 266] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.885359 75498 usertrap_amd64.go:212] [ 266: 266] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.885405 75498 usertrap_amd64.go:122] [ 266: 266] Allocate a new trap: 0xc001899530 10 D0725 14:31:38.885462 75498 usertrap_amd64.go:225] [ 266: 266] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.886592 75498 usertrap_amd64.go:212] [ 266: 266] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.886652 75498 usertrap_amd64.go:122] [ 266: 266] Allocate a new trap: 0xc001899530 11 D0725 14:31:38.886699 75498 usertrap_amd64.go:225] [ 266: 266] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.887993 75498 usertrap_amd64.go:212] [ 266: 266] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.888045 75498 usertrap_amd64.go:122] [ 266: 266] Allocate a new trap: 0xc001899530 12 D0725 14:31:38.888103 75498 usertrap_amd64.go:225] [ 266: 266] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.889891 75498 usertrap_amd64.go:212] [ 266: 266] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.889933 75498 usertrap_amd64.go:122] [ 266: 266] Allocate a new trap: 0xc001899530 13 D0725 14:31:38.889976 75498 usertrap_amd64.go:225] [ 266: 266] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.890139 75498 usertrap_amd64.go:212] [ 266: 266] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.890183 75498 usertrap_amd64.go:122] [ 266: 266] Allocate a new trap: 0xc001899530 14 D0725 14:31:38.890222 75498 usertrap_amd64.go:225] [ 266: 266] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.912109 75498 task_signals.go:470] [ 267: 267] Notified of signal 56 D0725 14:31:38.912238 75498 task_signals.go:204] [ 267: 267] Signal 267, PID: 267, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.912380 75498 task_exit.go:204] [ 267: 267] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.914378 75498 task_exit.go:204] [ 267: 267] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.914900 75498 task_exit.go:204] [ 266: 266] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.916948 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.917037 75498 task_exit.go:204] [ 266: 266] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.917099 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.917105 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.917167 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.917962 75498 task_exit.go:204] [ 266: 266] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.920886 75498 usertrap_amd64.go:212] [ 268: 268] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.920951 75498 usertrap_amd64.go:122] [ 268: 268] Allocate a new trap: 0xc000bddc20 9 D0725 14:31:38.921248 75498 usertrap_amd64.go:225] [ 268: 268] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.923517 75498 usertrap_amd64.go:212] [ 268: 268] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.923578 75498 usertrap_amd64.go:122] [ 268: 268] Allocate a new trap: 0xc000bddc20 10 D0725 14:31:38.923641 75498 usertrap_amd64.go:225] [ 268: 268] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.924582 75498 usertrap_amd64.go:212] [ 268: 268] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.924627 75498 usertrap_amd64.go:122] [ 268: 268] Allocate a new trap: 0xc000bddc20 11 D0725 14:31:38.924671 75498 usertrap_amd64.go:225] [ 268: 268] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.925866 75498 usertrap_amd64.go:212] [ 268: 268] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.925935 75498 usertrap_amd64.go:122] [ 268: 268] Allocate a new trap: 0xc000bddc20 12 D0725 14:31:38.925977 75498 usertrap_amd64.go:225] [ 268: 268] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.927659 75498 usertrap_amd64.go:212] [ 268: 268] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.927717 75498 usertrap_amd64.go:122] [ 268: 268] Allocate a new trap: 0xc000bddc20 13 D0725 14:31:38.927781 75498 usertrap_amd64.go:225] [ 268: 268] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.928098 75498 usertrap_amd64.go:212] [ 268: 268] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.928164 75498 usertrap_amd64.go:122] [ 268: 268] Allocate a new trap: 0xc000bddc20 14 D0725 14:31:38.928256 75498 usertrap_amd64.go:225] [ 268: 268] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.950504 75498 task_signals.go:470] [ 269: 269] Notified of signal 56 D0725 14:31:38.950627 75498 task_signals.go:204] [ 269: 269] Signal 269, PID: 269, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.950720 75498 task_exit.go:204] [ 269: 269] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.952263 75498 task_exit.go:204] [ 269: 269] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.953091 75498 task_exit.go:204] [ 268: 268] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.955439 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.955556 75498 task_exit.go:204] [ 268: 268] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.955671 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.955690 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.955796 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.955833 75498 task_exit.go:204] [ 268: 268] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:38.958362 75498 usertrap_amd64.go:212] [ 270: 270] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:38.958422 75498 usertrap_amd64.go:122] [ 270: 270] Allocate a new trap: 0xc0015bc420 9 D0725 14:31:38.958769 75498 usertrap_amd64.go:225] [ 270: 270] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:38.961037 75498 usertrap_amd64.go:212] [ 270: 270] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:38.961096 75498 usertrap_amd64.go:122] [ 270: 270] Allocate a new trap: 0xc0015bc420 10 D0725 14:31:38.961173 75498 usertrap_amd64.go:225] [ 270: 270] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:38.962287 75498 usertrap_amd64.go:212] [ 270: 270] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:38.962353 75498 usertrap_amd64.go:122] [ 270: 270] Allocate a new trap: 0xc0015bc420 11 D0725 14:31:38.962441 75498 usertrap_amd64.go:225] [ 270: 270] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:38.963886 75498 usertrap_amd64.go:212] [ 270: 270] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:38.963954 75498 usertrap_amd64.go:122] [ 270: 270] Allocate a new trap: 0xc0015bc420 12 D0725 14:31:38.964013 75498 usertrap_amd64.go:225] [ 270: 270] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:38.965846 75498 usertrap_amd64.go:212] [ 270: 270] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:38.965919 75498 usertrap_amd64.go:122] [ 270: 270] Allocate a new trap: 0xc0015bc420 13 D0725 14:31:38.966005 75498 usertrap_amd64.go:225] [ 270: 270] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:38.966238 75498 usertrap_amd64.go:212] [ 270: 270] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:38.966285 75498 usertrap_amd64.go:122] [ 270: 270] Allocate a new trap: 0xc0015bc420 14 D0725 14:31:38.966371 75498 usertrap_amd64.go:225] [ 270: 270] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:38.993465 75498 task_signals.go:470] [ 271: 271] Notified of signal 56 D0725 14:31:38.993621 75498 task_signals.go:204] [ 271: 271] Signal 271, PID: 271, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:38.993723 75498 task_exit.go:204] [ 271: 271] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.995216 75498 task_exit.go:204] [ 271: 271] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.995972 75498 task_exit.go:204] [ 270: 270] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:38.997720 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:38.997794 75498 task_exit.go:204] [ 270: 270] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:38.997841 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:38.997897 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:38.997952 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:38.998040 75498 task_exit.go:204] [ 270: 270] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.000554 75498 usertrap_amd64.go:212] [ 272: 272] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.000650 75498 usertrap_amd64.go:122] [ 272: 272] Allocate a new trap: 0xc000481aa0 9 D0725 14:31:39.000974 75498 usertrap_amd64.go:225] [ 272: 272] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.002822 75498 usertrap_amd64.go:212] [ 272: 272] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.002874 75498 usertrap_amd64.go:122] [ 272: 272] Allocate a new trap: 0xc000481aa0 10 D0725 14:31:39.002922 75498 usertrap_amd64.go:225] [ 272: 272] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.003844 75498 usertrap_amd64.go:212] [ 272: 272] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.003893 75498 usertrap_amd64.go:122] [ 272: 272] Allocate a new trap: 0xc000481aa0 11 D0725 14:31:39.003942 75498 usertrap_amd64.go:225] [ 272: 272] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.005118 75498 usertrap_amd64.go:212] [ 272: 272] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.005174 75498 usertrap_amd64.go:122] [ 272: 272] Allocate a new trap: 0xc000481aa0 12 D0725 14:31:39.005215 75498 usertrap_amd64.go:225] [ 272: 272] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.006619 75498 usertrap_amd64.go:212] [ 272: 272] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.006683 75498 usertrap_amd64.go:122] [ 272: 272] Allocate a new trap: 0xc000481aa0 13 D0725 14:31:39.006754 75498 usertrap_amd64.go:225] [ 272: 272] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.006916 75498 usertrap_amd64.go:212] [ 272: 272] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.006961 75498 usertrap_amd64.go:122] [ 272: 272] Allocate a new trap: 0xc000481aa0 14 D0725 14:31:39.007011 75498 usertrap_amd64.go:225] [ 272: 272] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.029041 75498 task_signals.go:470] [ 273: 273] Notified of signal 56 D0725 14:31:39.029281 75498 task_signals.go:204] [ 273: 273] Signal 273, PID: 273, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.029381 75498 task_exit.go:204] [ 273: 273] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.031243 75498 task_exit.go:204] [ 273: 273] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.031852 75498 task_exit.go:204] [ 272: 272] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.033601 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.033676 75498 task_exit.go:204] [ 272: 272] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.033716 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.033804 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.033850 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.034256 75498 task_exit.go:204] [ 272: 272] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.036958 75498 usertrap_amd64.go:212] [ 274: 274] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.037053 75498 usertrap_amd64.go:122] [ 274: 274] Allocate a new trap: 0xc0036ae150 9 D0725 14:31:39.037426 75498 usertrap_amd64.go:225] [ 274: 274] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.039431 75498 usertrap_amd64.go:212] [ 274: 274] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.039489 75498 usertrap_amd64.go:122] [ 274: 274] Allocate a new trap: 0xc0036ae150 10 D0725 14:31:39.039567 75498 usertrap_amd64.go:225] [ 274: 274] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.040552 75498 usertrap_amd64.go:212] [ 274: 274] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.040596 75498 usertrap_amd64.go:122] [ 274: 274] Allocate a new trap: 0xc0036ae150 11 D0725 14:31:39.040650 75498 usertrap_amd64.go:225] [ 274: 274] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.042198 75498 usertrap_amd64.go:212] [ 274: 274] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.042263 75498 usertrap_amd64.go:122] [ 274: 274] Allocate a new trap: 0xc0036ae150 12 D0725 14:31:39.042326 75498 usertrap_amd64.go:225] [ 274: 274] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.044339 75498 usertrap_amd64.go:212] [ 274: 274] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.044396 75498 usertrap_amd64.go:122] [ 274: 274] Allocate a new trap: 0xc0036ae150 13 D0725 14:31:39.044460 75498 usertrap_amd64.go:225] [ 274: 274] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.044718 75498 usertrap_amd64.go:212] [ 274: 274] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.044773 75498 usertrap_amd64.go:122] [ 274: 274] Allocate a new trap: 0xc0036ae150 14 D0725 14:31:39.044865 75498 usertrap_amd64.go:225] [ 274: 274] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.070507 75498 task_signals.go:470] [ 275: 275] Notified of signal 56 D0725 14:31:39.070627 75498 task_signals.go:204] [ 275: 275] Signal 275, PID: 275, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.070703 75498 task_exit.go:204] [ 275: 275] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.072140 75498 task_exit.go:204] [ 275: 275] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.072820 75498 task_exit.go:204] [ 274: 274] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.074477 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.074557 75498 task_exit.go:204] [ 274: 274] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.074613 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.074642 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.074712 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.074777 75498 task_exit.go:204] [ 274: 274] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.077346 75498 usertrap_amd64.go:212] [ 276: 276] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.077424 75498 usertrap_amd64.go:122] [ 276: 276] Allocate a new trap: 0xc0015bc780 9 D0725 14:31:39.077792 75498 usertrap_amd64.go:225] [ 276: 276] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.079986 75498 usertrap_amd64.go:212] [ 276: 276] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.080029 75498 usertrap_amd64.go:122] [ 276: 276] Allocate a new trap: 0xc0015bc780 10 D0725 14:31:39.080087 75498 usertrap_amd64.go:225] [ 276: 276] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.081092 75498 usertrap_amd64.go:212] [ 276: 276] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.081132 75498 usertrap_amd64.go:122] [ 276: 276] Allocate a new trap: 0xc0015bc780 11 D0725 14:31:39.081186 75498 usertrap_amd64.go:225] [ 276: 276] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.082359 75498 usertrap_amd64.go:212] [ 276: 276] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.082400 75498 usertrap_amd64.go:122] [ 276: 276] Allocate a new trap: 0xc0015bc780 12 D0725 14:31:39.082459 75498 usertrap_amd64.go:225] [ 276: 276] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.084148 75498 usertrap_amd64.go:212] [ 276: 276] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.084200 75498 usertrap_amd64.go:122] [ 276: 276] Allocate a new trap: 0xc0015bc780 13 D0725 14:31:39.084269 75498 usertrap_amd64.go:225] [ 276: 276] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.084509 75498 usertrap_amd64.go:212] [ 276: 276] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.084555 75498 usertrap_amd64.go:122] [ 276: 276] Allocate a new trap: 0xc0015bc780 14 D0725 14:31:39.084635 75498 usertrap_amd64.go:225] [ 276: 276] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.106081 75498 task_signals.go:470] [ 277: 277] Notified of signal 56 D0725 14:31:39.106198 75498 task_signals.go:204] [ 277: 277] Signal 277, PID: 277, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.106292 75498 task_exit.go:204] [ 277: 277] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.107758 75498 task_exit.go:204] [ 277: 277] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.108285 75498 task_exit.go:204] [ 276: 276] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.110165 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.110260 75498 task_exit.go:204] [ 276: 276] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.110341 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.110415 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.110498 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.111262 75498 task_exit.go:204] [ 276: 276] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.114074 75498 usertrap_amd64.go:212] [ 278: 278] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.114156 75498 usertrap_amd64.go:122] [ 278: 278] Allocate a new trap: 0xc0032402a0 9 D0725 14:31:39.114512 75498 usertrap_amd64.go:225] [ 278: 278] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.116765 75498 usertrap_amd64.go:212] [ 278: 278] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.116818 75498 usertrap_amd64.go:122] [ 278: 278] Allocate a new trap: 0xc0032402a0 10 D0725 14:31:39.116894 75498 usertrap_amd64.go:225] [ 278: 278] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.117887 75498 usertrap_amd64.go:212] [ 278: 278] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.117932 75498 usertrap_amd64.go:122] [ 278: 278] Allocate a new trap: 0xc0032402a0 11 D0725 14:31:39.117979 75498 usertrap_amd64.go:225] [ 278: 278] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.119252 75498 usertrap_amd64.go:212] [ 278: 278] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.119297 75498 usertrap_amd64.go:122] [ 278: 278] Allocate a new trap: 0xc0032402a0 12 D0725 14:31:39.119395 75498 usertrap_amd64.go:225] [ 278: 278] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.120991 75498 usertrap_amd64.go:212] [ 278: 278] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.121043 75498 usertrap_amd64.go:122] [ 278: 278] Allocate a new trap: 0xc0032402a0 13 D0725 14:31:39.121101 75498 usertrap_amd64.go:225] [ 278: 278] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.121346 75498 usertrap_amd64.go:212] [ 278: 278] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.121393 75498 usertrap_amd64.go:122] [ 278: 278] Allocate a new trap: 0xc0032402a0 14 D0725 14:31:39.121450 75498 usertrap_amd64.go:225] [ 278: 278] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.144442 75498 task_signals.go:470] [ 279: 279] Notified of signal 56 D0725 14:31:39.144575 75498 task_signals.go:204] [ 279: 279] Signal 279, PID: 279, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.144669 75498 task_exit.go:204] [ 279: 279] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.146416 75498 task_exit.go:204] [ 279: 279] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.147338 75498 task_exit.go:204] [ 278: 278] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.149738 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.149828 75498 task_exit.go:204] [ 278: 278] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.149909 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.149987 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.150083 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.150654 75498 task_exit.go:204] [ 278: 278] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.153759 75498 usertrap_amd64.go:212] [ 280: 280] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.153867 75498 usertrap_amd64.go:122] [ 280: 280] Allocate a new trap: 0xc003e0c4b0 9 D0725 14:31:39.154234 75498 usertrap_amd64.go:225] [ 280: 280] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.156343 75498 usertrap_amd64.go:212] [ 280: 280] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.156390 75498 usertrap_amd64.go:122] [ 280: 280] Allocate a new trap: 0xc003e0c4b0 10 D0725 14:31:39.156444 75498 usertrap_amd64.go:225] [ 280: 280] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.157585 75498 usertrap_amd64.go:212] [ 280: 280] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.157653 75498 usertrap_amd64.go:122] [ 280: 280] Allocate a new trap: 0xc003e0c4b0 11 D0725 14:31:39.157780 75498 usertrap_amd64.go:225] [ 280: 280] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.159264 75498 usertrap_amd64.go:212] [ 280: 280] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.159374 75498 usertrap_amd64.go:122] [ 280: 280] Allocate a new trap: 0xc003e0c4b0 12 D0725 14:31:39.159470 75498 usertrap_amd64.go:225] [ 280: 280] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.161678 75498 usertrap_amd64.go:212] [ 280: 280] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.161734 75498 usertrap_amd64.go:122] [ 280: 280] Allocate a new trap: 0xc003e0c4b0 13 D0725 14:31:39.161789 75498 usertrap_amd64.go:225] [ 280: 280] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.162037 75498 usertrap_amd64.go:212] [ 280: 280] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.162084 75498 usertrap_amd64.go:122] [ 280: 280] Allocate a new trap: 0xc003e0c4b0 14 D0725 14:31:39.162143 75498 usertrap_amd64.go:225] [ 280: 280] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.185172 75498 task_signals.go:470] [ 281: 281] Notified of signal 56 D0725 14:31:39.185400 75498 task_signals.go:204] [ 281: 281] Signal 281, PID: 281, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.185515 75498 task_exit.go:204] [ 281: 281] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.187370 75498 task_exit.go:204] [ 281: 281] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.188014 75498 task_exit.go:204] [ 280: 280] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.190025 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.190166 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.190217 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.190235 75498 task_exit.go:204] [ 280: 280] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.190334 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.190774 75498 task_exit.go:204] [ 280: 280] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.194195 75498 usertrap_amd64.go:212] [ 282: 282] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.194259 75498 usertrap_amd64.go:122] [ 282: 282] Allocate a new trap: 0xc000049d70 9 D0725 14:31:39.194554 75498 usertrap_amd64.go:225] [ 282: 282] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.196467 75498 usertrap_amd64.go:212] [ 282: 282] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.196510 75498 usertrap_amd64.go:122] [ 282: 282] Allocate a new trap: 0xc000049d70 10 D0725 14:31:39.196565 75498 usertrap_amd64.go:225] [ 282: 282] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.197613 75498 usertrap_amd64.go:212] [ 282: 282] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.197670 75498 usertrap_amd64.go:122] [ 282: 282] Allocate a new trap: 0xc000049d70 11 D0725 14:31:39.197740 75498 usertrap_amd64.go:225] [ 282: 282] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.199029 75498 usertrap_amd64.go:212] [ 282: 282] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.199073 75498 usertrap_amd64.go:122] [ 282: 282] Allocate a new trap: 0xc000049d70 12 D0725 14:31:39.199126 75498 usertrap_amd64.go:225] [ 282: 282] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.200845 75498 usertrap_amd64.go:212] [ 282: 282] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.200897 75498 usertrap_amd64.go:122] [ 282: 282] Allocate a new trap: 0xc000049d70 13 D0725 14:31:39.200963 75498 usertrap_amd64.go:225] [ 282: 282] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.201214 75498 usertrap_amd64.go:212] [ 282: 282] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.201579 75498 usertrap_amd64.go:122] [ 282: 282] Allocate a new trap: 0xc000049d70 14 D0725 14:31:39.201633 75498 usertrap_amd64.go:225] [ 282: 282] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.223780 75498 task_signals.go:470] [ 283: 283] Notified of signal 56 D0725 14:31:39.223963 75498 task_signals.go:204] [ 283: 283] Signal 283, PID: 283, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.224092 75498 task_exit.go:204] [ 283: 283] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.225826 75498 task_exit.go:204] [ 283: 283] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.226520 75498 task_exit.go:204] [ 282: 282] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.228561 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.228649 75498 task_exit.go:204] [ 282: 282] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.228696 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.228817 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.228900 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.229820 75498 task_exit.go:204] [ 282: 282] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.232624 75498 usertrap_amd64.go:212] [ 284: 284] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.232706 75498 usertrap_amd64.go:122] [ 284: 284] Allocate a new trap: 0xc0032411d0 9 D0725 14:31:39.233049 75498 usertrap_amd64.go:225] [ 284: 284] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.235349 75498 usertrap_amd64.go:212] [ 284: 284] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.235397 75498 usertrap_amd64.go:122] [ 284: 284] Allocate a new trap: 0xc0032411d0 10 D0725 14:31:39.235449 75498 usertrap_amd64.go:225] [ 284: 284] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.236342 75498 usertrap_amd64.go:212] [ 284: 284] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.236387 75498 usertrap_amd64.go:122] [ 284: 284] Allocate a new trap: 0xc0032411d0 11 D0725 14:31:39.236449 75498 usertrap_amd64.go:225] [ 284: 284] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.237554 75498 usertrap_amd64.go:212] [ 284: 284] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.237596 75498 usertrap_amd64.go:122] [ 284: 284] Allocate a new trap: 0xc0032411d0 12 D0725 14:31:39.237640 75498 usertrap_amd64.go:225] [ 284: 284] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.239598 75498 usertrap_amd64.go:212] [ 284: 284] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.239686 75498 usertrap_amd64.go:122] [ 284: 284] Allocate a new trap: 0xc0032411d0 13 D0725 14:31:39.239777 75498 usertrap_amd64.go:225] [ 284: 284] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.240029 75498 usertrap_amd64.go:212] [ 284: 284] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.240079 75498 usertrap_amd64.go:122] [ 284: 284] Allocate a new trap: 0xc0032411d0 14 D0725 14:31:39.240166 75498 usertrap_amd64.go:225] [ 284: 284] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.263690 75498 task_signals.go:470] [ 285: 285] Notified of signal 56 D0725 14:31:39.263860 75498 task_signals.go:204] [ 285: 285] Signal 285, PID: 285, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.263976 75498 task_exit.go:204] [ 285: 285] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.265549 75498 task_exit.go:204] [ 285: 285] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.266219 75498 task_exit.go:204] [ 284: 284] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.268123 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.268217 75498 task_exit.go:204] [ 284: 284] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.268277 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.268357 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.268425 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.268951 75498 task_exit.go:204] [ 284: 284] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.271481 75498 usertrap_amd64.go:212] [ 286: 286] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.271545 75498 usertrap_amd64.go:122] [ 286: 286] Allocate a new trap: 0xc003241bf0 9 D0725 14:31:39.271936 75498 usertrap_amd64.go:225] [ 286: 286] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.274145 75498 usertrap_amd64.go:212] [ 286: 286] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.274192 75498 usertrap_amd64.go:122] [ 286: 286] Allocate a new trap: 0xc003241bf0 10 D0725 14:31:39.274255 75498 usertrap_amd64.go:225] [ 286: 286] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.275167 75498 usertrap_amd64.go:212] [ 286: 286] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.275218 75498 usertrap_amd64.go:122] [ 286: 286] Allocate a new trap: 0xc003241bf0 11 D0725 14:31:39.275266 75498 usertrap_amd64.go:225] [ 286: 286] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.276357 75498 usertrap_amd64.go:212] [ 286: 286] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.276416 75498 usertrap_amd64.go:122] [ 286: 286] Allocate a new trap: 0xc003241bf0 12 D0725 14:31:39.276461 75498 usertrap_amd64.go:225] [ 286: 286] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.277976 75498 usertrap_amd64.go:212] [ 286: 286] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.278017 75498 usertrap_amd64.go:122] [ 286: 286] Allocate a new trap: 0xc003241bf0 13 D0725 14:31:39.278057 75498 usertrap_amd64.go:225] [ 286: 286] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.278226 75498 usertrap_amd64.go:212] [ 286: 286] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.278282 75498 usertrap_amd64.go:122] [ 286: 286] Allocate a new trap: 0xc003241bf0 14 D0725 14:31:39.278355 75498 usertrap_amd64.go:225] [ 286: 286] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.300330 75498 task_signals.go:470] [ 287: 287] Notified of signal 56 D0725 14:31:39.300447 75498 task_signals.go:204] [ 287: 287] Signal 287, PID: 287, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.300535 75498 task_exit.go:204] [ 287: 287] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.305516 75498 task_exit.go:204] [ 287: 287] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.306380 75498 task_exit.go:204] [ 286: 286] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.306911 75498 sampler.go:191] Time: Adjusting syscall overhead down to 671 D0725 14:31:39.308373 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.308470 75498 task_exit.go:204] [ 286: 286] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.308557 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.308583 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.308647 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.309676 75498 task_exit.go:204] [ 286: 286] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.313076 75498 usertrap_amd64.go:212] [ 288: 288] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.313157 75498 usertrap_amd64.go:122] [ 288: 288] Allocate a new trap: 0xc004bcc0f0 9 D0725 14:31:39.313483 75498 usertrap_amd64.go:225] [ 288: 288] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.315539 75498 usertrap_amd64.go:212] [ 288: 288] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.315582 75498 usertrap_amd64.go:122] [ 288: 288] Allocate a new trap: 0xc004bcc0f0 10 D0725 14:31:39.315665 75498 usertrap_amd64.go:225] [ 288: 288] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.316727 75498 usertrap_amd64.go:212] [ 288: 288] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.316799 75498 usertrap_amd64.go:122] [ 288: 288] Allocate a new trap: 0xc004bcc0f0 11 D0725 14:31:39.316862 75498 usertrap_amd64.go:225] [ 288: 288] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.327026 75498 usertrap_amd64.go:212] [ 288: 288] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.327073 75498 usertrap_amd64.go:122] [ 288: 288] Allocate a new trap: 0xc004bcc0f0 12 D0725 14:31:39.327130 75498 usertrap_amd64.go:225] [ 288: 288] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.328857 75498 usertrap_amd64.go:212] [ 288: 288] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.328908 75498 usertrap_amd64.go:122] [ 288: 288] Allocate a new trap: 0xc004bcc0f0 13 D0725 14:31:39.328960 75498 usertrap_amd64.go:225] [ 288: 288] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.329142 75498 usertrap_amd64.go:212] [ 288: 288] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.329177 75498 usertrap_amd64.go:122] [ 288: 288] Allocate a new trap: 0xc004bcc0f0 14 D0725 14:31:39.329218 75498 usertrap_amd64.go:225] [ 288: 288] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.352782 75498 task_signals.go:470] [ 289: 289] Notified of signal 56 D0725 14:31:39.352994 75498 task_signals.go:204] [ 289: 289] Signal 289, PID: 289, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.353119 75498 task_exit.go:204] [ 289: 289] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.354904 75498 task_exit.go:204] [ 289: 289] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.355371 75498 task_exit.go:204] [ 288: 288] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.357525 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.357611 75498 task_exit.go:204] [ 288: 288] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.357653 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.357671 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.357728 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.358380 75498 task_exit.go:204] [ 288: 288] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.361013 75498 usertrap_amd64.go:212] [ 290: 290] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.361081 75498 usertrap_amd64.go:122] [ 290: 290] Allocate a new trap: 0xc00476a180 9 D0725 14:31:39.361374 75498 usertrap_amd64.go:225] [ 290: 290] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.363358 75498 usertrap_amd64.go:212] [ 290: 290] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.363400 75498 usertrap_amd64.go:122] [ 290: 290] Allocate a new trap: 0xc00476a180 10 D0725 14:31:39.363443 75498 usertrap_amd64.go:225] [ 290: 290] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.364433 75498 usertrap_amd64.go:212] [ 290: 290] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.364489 75498 usertrap_amd64.go:122] [ 290: 290] Allocate a new trap: 0xc00476a180 11 D0725 14:31:39.364553 75498 usertrap_amd64.go:225] [ 290: 290] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.366074 75498 usertrap_amd64.go:212] [ 290: 290] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.366121 75498 usertrap_amd64.go:122] [ 290: 290] Allocate a new trap: 0xc00476a180 12 D0725 14:31:39.366184 75498 usertrap_amd64.go:225] [ 290: 290] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.367586 75498 usertrap_amd64.go:212] [ 290: 290] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.367752 75498 usertrap_amd64.go:122] [ 290: 290] Allocate a new trap: 0xc00476a180 13 D0725 14:31:39.367801 75498 usertrap_amd64.go:225] [ 290: 290] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.367958 75498 usertrap_amd64.go:212] [ 290: 290] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.368000 75498 usertrap_amd64.go:122] [ 290: 290] Allocate a new trap: 0xc00476a180 14 D0725 14:31:39.368047 75498 usertrap_amd64.go:225] [ 290: 290] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.390222 75498 task_signals.go:470] [ 291: 291] Notified of signal 56 D0725 14:31:39.390580 75498 task_signals.go:204] [ 291: 291] Signal 291, PID: 291, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.390700 75498 task_exit.go:204] [ 291: 291] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.392698 75498 task_exit.go:204] [ 291: 291] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.393224 75498 task_exit.go:204] [ 290: 290] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.394908 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.394984 75498 task_exit.go:204] [ 290: 290] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.395024 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.395024 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.395090 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.395842 75498 task_exit.go:204] [ 290: 290] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.398324 75498 usertrap_amd64.go:212] [ 292: 292] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.398383 75498 usertrap_amd64.go:122] [ 292: 292] Allocate a new trap: 0xc003240750 9 D0725 14:31:39.398787 75498 usertrap_amd64.go:225] [ 292: 292] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.400828 75498 usertrap_amd64.go:212] [ 292: 292] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.400884 75498 usertrap_amd64.go:122] [ 292: 292] Allocate a new trap: 0xc003240750 10 D0725 14:31:39.400963 75498 usertrap_amd64.go:225] [ 292: 292] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.401816 75498 usertrap_amd64.go:212] [ 292: 292] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.401871 75498 usertrap_amd64.go:122] [ 292: 292] Allocate a new trap: 0xc003240750 11 D0725 14:31:39.401914 75498 usertrap_amd64.go:225] [ 292: 292] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.402926 75498 usertrap_amd64.go:212] [ 292: 292] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.402966 75498 usertrap_amd64.go:122] [ 292: 292] Allocate a new trap: 0xc003240750 12 D0725 14:31:39.403026 75498 usertrap_amd64.go:225] [ 292: 292] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.404671 75498 usertrap_amd64.go:212] [ 292: 292] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.404718 75498 usertrap_amd64.go:122] [ 292: 292] Allocate a new trap: 0xc003240750 13 D0725 14:31:39.404776 75498 usertrap_amd64.go:225] [ 292: 292] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.404938 75498 usertrap_amd64.go:212] [ 292: 292] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.404994 75498 usertrap_amd64.go:122] [ 292: 292] Allocate a new trap: 0xc003240750 14 D0725 14:31:39.405061 75498 usertrap_amd64.go:225] [ 292: 292] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.426135 75498 task_signals.go:470] [ 293: 293] Notified of signal 56 D0725 14:31:39.426258 75498 task_signals.go:204] [ 293: 293] Signal 293, PID: 293, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.426361 75498 task_exit.go:204] [ 293: 293] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.428146 75498 task_exit.go:204] [ 293: 293] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.428885 75498 task_exit.go:204] [ 292: 292] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.430807 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.430898 75498 task_exit.go:204] [ 292: 292] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.430944 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.430968 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.430994 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.431881 75498 task_exit.go:204] [ 292: 292] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.434836 75498 usertrap_amd64.go:212] [ 294: 294] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.434922 75498 usertrap_amd64.go:122] [ 294: 294] Allocate a new trap: 0xc003241050 9 D0725 14:31:39.435235 75498 usertrap_amd64.go:225] [ 294: 294] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.437150 75498 usertrap_amd64.go:212] [ 294: 294] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.437195 75498 usertrap_amd64.go:122] [ 294: 294] Allocate a new trap: 0xc003241050 10 D0725 14:31:39.437241 75498 usertrap_amd64.go:225] [ 294: 294] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.438152 75498 usertrap_amd64.go:212] [ 294: 294] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.438195 75498 usertrap_amd64.go:122] [ 294: 294] Allocate a new trap: 0xc003241050 11 D0725 14:31:39.438250 75498 usertrap_amd64.go:225] [ 294: 294] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.439410 75498 usertrap_amd64.go:212] [ 294: 294] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.439459 75498 usertrap_amd64.go:122] [ 294: 294] Allocate a new trap: 0xc003241050 12 D0725 14:31:39.439501 75498 usertrap_amd64.go:225] [ 294: 294] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.440960 75498 usertrap_amd64.go:212] [ 294: 294] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.441012 75498 usertrap_amd64.go:122] [ 294: 294] Allocate a new trap: 0xc003241050 13 D0725 14:31:39.441055 75498 usertrap_amd64.go:225] [ 294: 294] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.441207 75498 usertrap_amd64.go:212] [ 294: 294] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.441258 75498 usertrap_amd64.go:122] [ 294: 294] Allocate a new trap: 0xc003241050 14 D0725 14:31:39.441328 75498 usertrap_amd64.go:225] [ 294: 294] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.465030 75498 task_signals.go:470] [ 295: 295] Notified of signal 56 D0725 14:31:39.465203 75498 task_signals.go:204] [ 295: 295] Signal 295, PID: 295, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.465294 75498 task_exit.go:204] [ 295: 295] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.466776 75498 task_exit.go:204] [ 295: 295] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.467703 75498 task_exit.go:204] [ 294: 294] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.469373 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.469436 75498 task_exit.go:204] [ 294: 294] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.469489 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.469538 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.469577 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.470479 75498 task_exit.go:204] [ 294: 294] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.473231 75498 usertrap_amd64.go:212] [ 296: 296] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.473308 75498 usertrap_amd64.go:122] [ 296: 296] Allocate a new trap: 0xc00476ae40 9 D0725 14:31:39.473630 75498 usertrap_amd64.go:225] [ 296: 296] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.475823 75498 usertrap_amd64.go:212] [ 296: 296] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.475869 75498 usertrap_amd64.go:122] [ 296: 296] Allocate a new trap: 0xc00476ae40 10 D0725 14:31:39.475942 75498 usertrap_amd64.go:225] [ 296: 296] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.476761 75498 usertrap_amd64.go:212] [ 296: 296] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.476800 75498 usertrap_amd64.go:122] [ 296: 296] Allocate a new trap: 0xc00476ae40 11 D0725 14:31:39.476840 75498 usertrap_amd64.go:225] [ 296: 296] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.477847 75498 usertrap_amd64.go:212] [ 296: 296] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.477903 75498 usertrap_amd64.go:122] [ 296: 296] Allocate a new trap: 0xc00476ae40 12 D0725 14:31:39.477944 75498 usertrap_amd64.go:225] [ 296: 296] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.479428 75498 usertrap_amd64.go:212] [ 296: 296] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.479480 75498 usertrap_amd64.go:122] [ 296: 296] Allocate a new trap: 0xc00476ae40 13 D0725 14:31:39.479521 75498 usertrap_amd64.go:225] [ 296: 296] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.479732 75498 usertrap_amd64.go:212] [ 296: 296] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.479767 75498 usertrap_amd64.go:122] [ 296: 296] Allocate a new trap: 0xc00476ae40 14 D0725 14:31:39.479814 75498 usertrap_amd64.go:225] [ 296: 296] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.499944 75498 task_signals.go:470] [ 297: 297] Notified of signal 56 D0725 14:31:39.500096 75498 task_signals.go:204] [ 297: 297] Signal 297, PID: 297, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.500168 75498 task_exit.go:204] [ 297: 297] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.501471 75498 task_exit.go:204] [ 297: 297] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.501906 75498 task_exit.go:204] [ 296: 296] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.503529 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.503646 75498 task_exit.go:204] [ 296: 296] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.503712 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.503754 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.503811 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.504057 75498 task_exit.go:204] [ 296: 296] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.506591 75498 usertrap_amd64.go:212] [ 298: 298] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.506700 75498 usertrap_amd64.go:122] [ 298: 298] Allocate a new trap: 0xc003241dd0 9 D0725 14:31:39.507000 75498 usertrap_amd64.go:225] [ 298: 298] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.509185 75498 usertrap_amd64.go:212] [ 298: 298] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.509233 75498 usertrap_amd64.go:122] [ 298: 298] Allocate a new trap: 0xc003241dd0 10 D0725 14:31:39.509277 75498 usertrap_amd64.go:225] [ 298: 298] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.510089 75498 usertrap_amd64.go:212] [ 298: 298] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.510138 75498 usertrap_amd64.go:122] [ 298: 298] Allocate a new trap: 0xc003241dd0 11 D0725 14:31:39.510187 75498 usertrap_amd64.go:225] [ 298: 298] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.511226 75498 usertrap_amd64.go:212] [ 298: 298] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.511268 75498 usertrap_amd64.go:122] [ 298: 298] Allocate a new trap: 0xc003241dd0 12 D0725 14:31:39.511309 75498 usertrap_amd64.go:225] [ 298: 298] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.512805 75498 usertrap_amd64.go:212] [ 298: 298] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.512855 75498 usertrap_amd64.go:122] [ 298: 298] Allocate a new trap: 0xc003241dd0 13 D0725 14:31:39.512900 75498 usertrap_amd64.go:225] [ 298: 298] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.513060 75498 usertrap_amd64.go:212] [ 298: 298] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.513102 75498 usertrap_amd64.go:122] [ 298: 298] Allocate a new trap: 0xc003241dd0 14 D0725 14:31:39.513148 75498 usertrap_amd64.go:225] [ 298: 298] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.533777 75498 task_signals.go:470] [ 299: 299] Notified of signal 56 D0725 14:31:39.533888 75498 task_signals.go:204] [ 299: 299] Signal 299, PID: 299, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.533965 75498 task_exit.go:204] [ 299: 299] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.535294 75498 task_exit.go:204] [ 299: 299] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.535818 75498 task_exit.go:204] [ 298: 298] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.537936 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.538026 75498 task_exit.go:204] [ 298: 298] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.538111 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.538162 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.538227 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.539034 75498 task_exit.go:204] [ 298: 298] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.541666 75498 usertrap_amd64.go:212] [ 300: 300] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.541733 75498 usertrap_amd64.go:122] [ 300: 300] Allocate a new trap: 0xc00476aff0 9 D0725 14:31:39.542030 75498 usertrap_amd64.go:225] [ 300: 300] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.543984 75498 usertrap_amd64.go:212] [ 300: 300] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.544029 75498 usertrap_amd64.go:122] [ 300: 300] Allocate a new trap: 0xc00476aff0 10 D0725 14:31:39.544072 75498 usertrap_amd64.go:225] [ 300: 300] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.545073 75498 usertrap_amd64.go:212] [ 300: 300] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.545119 75498 usertrap_amd64.go:122] [ 300: 300] Allocate a new trap: 0xc00476aff0 11 D0725 14:31:39.545170 75498 usertrap_amd64.go:225] [ 300: 300] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.546394 75498 usertrap_amd64.go:212] [ 300: 300] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.546455 75498 usertrap_amd64.go:122] [ 300: 300] Allocate a new trap: 0xc00476aff0 12 D0725 14:31:39.546507 75498 usertrap_amd64.go:225] [ 300: 300] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.548018 75498 usertrap_amd64.go:212] [ 300: 300] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.548067 75498 usertrap_amd64.go:122] [ 300: 300] Allocate a new trap: 0xc00476aff0 13 D0725 14:31:39.548112 75498 usertrap_amd64.go:225] [ 300: 300] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.548287 75498 usertrap_amd64.go:212] [ 300: 300] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.548324 75498 usertrap_amd64.go:122] [ 300: 300] Allocate a new trap: 0xc00476aff0 14 D0725 14:31:39.548369 75498 usertrap_amd64.go:225] [ 300: 300] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.569890 75498 task_signals.go:470] [ 301: 301] Notified of signal 56 D0725 14:31:39.570030 75498 task_signals.go:204] [ 301: 301] Signal 301, PID: 301, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.570104 75498 task_exit.go:204] [ 301: 301] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.571519 75498 task_exit.go:204] [ 301: 301] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.572019 75498 task_exit.go:204] [ 300: 300] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.573645 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.573724 75498 task_exit.go:204] [ 300: 300] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.573807 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.573834 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.573882 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.574536 75498 task_exit.go:204] [ 300: 300] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.577047 75498 usertrap_amd64.go:212] [ 302: 302] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.577106 75498 usertrap_amd64.go:122] [ 302: 302] Allocate a new trap: 0xc0015bd1d0 9 D0725 14:31:39.577359 75498 usertrap_amd64.go:225] [ 302: 302] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.579142 75498 usertrap_amd64.go:212] [ 302: 302] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.579182 75498 usertrap_amd64.go:122] [ 302: 302] Allocate a new trap: 0xc0015bd1d0 10 D0725 14:31:39.579224 75498 usertrap_amd64.go:225] [ 302: 302] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.580019 75498 usertrap_amd64.go:212] [ 302: 302] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.580062 75498 usertrap_amd64.go:122] [ 302: 302] Allocate a new trap: 0xc0015bd1d0 11 D0725 14:31:39.580103 75498 usertrap_amd64.go:225] [ 302: 302] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.581023 75498 usertrap_amd64.go:212] [ 302: 302] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.581075 75498 usertrap_amd64.go:122] [ 302: 302] Allocate a new trap: 0xc0015bd1d0 12 D0725 14:31:39.581126 75498 usertrap_amd64.go:225] [ 302: 302] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.582459 75498 usertrap_amd64.go:212] [ 302: 302] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.582517 75498 usertrap_amd64.go:122] [ 302: 302] Allocate a new trap: 0xc0015bd1d0 13 D0725 14:31:39.582585 75498 usertrap_amd64.go:225] [ 302: 302] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.582766 75498 usertrap_amd64.go:212] [ 302: 302] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.582811 75498 usertrap_amd64.go:122] [ 302: 302] Allocate a new trap: 0xc0015bd1d0 14 D0725 14:31:39.582850 75498 usertrap_amd64.go:225] [ 302: 302] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.604162 75498 task_signals.go:470] [ 303: 303] Notified of signal 56 D0725 14:31:39.604371 75498 task_signals.go:204] [ 303: 303] Signal 303, PID: 303, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.604470 75498 task_exit.go:204] [ 303: 303] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.605971 75498 task_exit.go:204] [ 303: 303] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.606721 75498 task_exit.go:204] [ 302: 302] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.608426 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.608510 75498 task_exit.go:204] [ 302: 302] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.608567 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.608575 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.608618 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.609376 75498 task_exit.go:204] [ 302: 302] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.612051 75498 usertrap_amd64.go:212] [ 304: 304] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.612135 75498 usertrap_amd64.go:122] [ 304: 304] Allocate a new trap: 0xc0015bdc80 9 D0725 14:31:39.612469 75498 usertrap_amd64.go:225] [ 304: 304] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.614408 75498 usertrap_amd64.go:212] [ 304: 304] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.614459 75498 usertrap_amd64.go:122] [ 304: 304] Allocate a new trap: 0xc0015bdc80 10 D0725 14:31:39.614503 75498 usertrap_amd64.go:225] [ 304: 304] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.615565 75498 usertrap_amd64.go:212] [ 304: 304] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.615640 75498 usertrap_amd64.go:122] [ 304: 304] Allocate a new trap: 0xc0015bdc80 11 D0725 14:31:39.615717 75498 usertrap_amd64.go:225] [ 304: 304] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.616992 75498 usertrap_amd64.go:212] [ 304: 304] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.617035 75498 usertrap_amd64.go:122] [ 304: 304] Allocate a new trap: 0xc0015bdc80 12 D0725 14:31:39.617088 75498 usertrap_amd64.go:225] [ 304: 304] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.618601 75498 usertrap_amd64.go:212] [ 304: 304] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.618658 75498 usertrap_amd64.go:122] [ 304: 304] Allocate a new trap: 0xc0015bdc80 13 D0725 14:31:39.618733 75498 usertrap_amd64.go:225] [ 304: 304] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.619001 75498 usertrap_amd64.go:212] [ 304: 304] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.619043 75498 usertrap_amd64.go:122] [ 304: 304] Allocate a new trap: 0xc0015bdc80 14 D0725 14:31:39.619095 75498 usertrap_amd64.go:225] [ 304: 304] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.641635 75498 task_signals.go:470] [ 305: 305] Notified of signal 56 D0725 14:31:39.641878 75498 task_signals.go:204] [ 305: 305] Signal 305, PID: 305, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.642022 75498 task_exit.go:204] [ 305: 305] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.643473 75498 task_exit.go:204] [ 305: 305] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.644002 75498 task_exit.go:204] [ 304: 304] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.645655 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.645724 75498 task_exit.go:204] [ 304: 304] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.645772 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.645766 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.645862 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.645863 75498 task_exit.go:204] [ 304: 304] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.648475 75498 usertrap_amd64.go:212] [ 306: 306] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.648543 75498 usertrap_amd64.go:122] [ 306: 306] Allocate a new trap: 0xc0002df350 9 D0725 14:31:39.648890 75498 usertrap_amd64.go:225] [ 306: 306] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.650720 75498 usertrap_amd64.go:212] [ 306: 306] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.650778 75498 usertrap_amd64.go:122] [ 306: 306] Allocate a new trap: 0xc0002df350 10 D0725 14:31:39.650823 75498 usertrap_amd64.go:225] [ 306: 306] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.651719 75498 usertrap_amd64.go:212] [ 306: 306] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.651764 75498 usertrap_amd64.go:122] [ 306: 306] Allocate a new trap: 0xc0002df350 11 D0725 14:31:39.651816 75498 usertrap_amd64.go:225] [ 306: 306] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.652992 75498 usertrap_amd64.go:212] [ 306: 306] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.653040 75498 usertrap_amd64.go:122] [ 306: 306] Allocate a new trap: 0xc0002df350 12 D0725 14:31:39.653095 75498 usertrap_amd64.go:225] [ 306: 306] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.654639 75498 usertrap_amd64.go:212] [ 306: 306] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.654682 75498 usertrap_amd64.go:122] [ 306: 306] Allocate a new trap: 0xc0002df350 13 D0725 14:31:39.654751 75498 usertrap_amd64.go:225] [ 306: 306] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.654922 75498 usertrap_amd64.go:212] [ 306: 306] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.654958 75498 usertrap_amd64.go:122] [ 306: 306] Allocate a new trap: 0xc0002df350 14 D0725 14:31:39.654998 75498 usertrap_amd64.go:225] [ 306: 306] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.675202 75498 task_signals.go:470] [ 307: 307] Notified of signal 56 D0725 14:31:39.675378 75498 task_signals.go:204] [ 307: 307] Signal 307, PID: 307, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.675451 75498 task_exit.go:204] [ 307: 307] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.676927 75498 task_exit.go:204] [ 307: 307] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.677501 75498 task_exit.go:204] [ 306: 306] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.679359 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.679430 75498 task_exit.go:204] [ 306: 306] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.679493 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.679521 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.679632 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.680484 75498 task_exit.go:204] [ 306: 306] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.683194 75498 usertrap_amd64.go:212] [ 308: 308] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.683277 75498 usertrap_amd64.go:122] [ 308: 308] Allocate a new trap: 0xc003e0ca50 9 D0725 14:31:39.683736 75498 usertrap_amd64.go:225] [ 308: 308] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.685862 75498 usertrap_amd64.go:212] [ 308: 308] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.685952 75498 usertrap_amd64.go:122] [ 308: 308] Allocate a new trap: 0xc003e0ca50 10 D0725 14:31:39.686063 75498 usertrap_amd64.go:225] [ 308: 308] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.687092 75498 usertrap_amd64.go:212] [ 308: 308] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.687152 75498 usertrap_amd64.go:122] [ 308: 308] Allocate a new trap: 0xc003e0ca50 11 D0725 14:31:39.687204 75498 usertrap_amd64.go:225] [ 308: 308] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.688370 75498 usertrap_amd64.go:212] [ 308: 308] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.688436 75498 usertrap_amd64.go:122] [ 308: 308] Allocate a new trap: 0xc003e0ca50 12 D0725 14:31:39.688534 75498 usertrap_amd64.go:225] [ 308: 308] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.690133 75498 usertrap_amd64.go:212] [ 308: 308] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.690180 75498 usertrap_amd64.go:122] [ 308: 308] Allocate a new trap: 0xc003e0ca50 13 D0725 14:31:39.690222 75498 usertrap_amd64.go:225] [ 308: 308] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.690369 75498 usertrap_amd64.go:212] [ 308: 308] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.690403 75498 usertrap_amd64.go:122] [ 308: 308] Allocate a new trap: 0xc003e0ca50 14 D0725 14:31:39.690441 75498 usertrap_amd64.go:225] [ 308: 308] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.711939 75498 task_signals.go:470] [ 309: 309] Notified of signal 56 D0725 14:31:39.712067 75498 task_signals.go:204] [ 309: 309] Signal 309, PID: 309, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.712158 75498 task_exit.go:204] [ 309: 309] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.713540 75498 task_exit.go:204] [ 309: 309] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.713850 75498 task_exit.go:204] [ 308: 308] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.715474 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.715563 75498 task_exit.go:204] [ 308: 308] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.715638 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.715641 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.715757 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.715764 75498 task_exit.go:204] [ 308: 308] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.718425 75498 usertrap_amd64.go:212] [ 310: 310] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.718510 75498 usertrap_amd64.go:122] [ 310: 310] Allocate a new trap: 0xc003e0d5c0 9 D0725 14:31:39.718923 75498 usertrap_amd64.go:225] [ 310: 310] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.721287 75498 usertrap_amd64.go:212] [ 310: 310] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.721342 75498 usertrap_amd64.go:122] [ 310: 310] Allocate a new trap: 0xc003e0d5c0 10 D0725 14:31:39.721392 75498 usertrap_amd64.go:225] [ 310: 310] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.722170 75498 usertrap_amd64.go:212] [ 310: 310] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.722211 75498 usertrap_amd64.go:122] [ 310: 310] Allocate a new trap: 0xc003e0d5c0 11 D0725 14:31:39.722254 75498 usertrap_amd64.go:225] [ 310: 310] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.723197 75498 usertrap_amd64.go:212] [ 310: 310] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.723246 75498 usertrap_amd64.go:122] [ 310: 310] Allocate a new trap: 0xc003e0d5c0 12 D0725 14:31:39.723288 75498 usertrap_amd64.go:225] [ 310: 310] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.724939 75498 usertrap_amd64.go:212] [ 310: 310] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.725003 75498 usertrap_amd64.go:122] [ 310: 310] Allocate a new trap: 0xc003e0d5c0 13 D0725 14:31:39.725058 75498 usertrap_amd64.go:225] [ 310: 310] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.725225 75498 usertrap_amd64.go:212] [ 310: 310] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.725252 75498 usertrap_amd64.go:122] [ 310: 310] Allocate a new trap: 0xc003e0d5c0 14 D0725 14:31:39.725313 75498 usertrap_amd64.go:225] [ 310: 310] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.750131 75498 task_signals.go:470] [ 311: 311] Notified of signal 56 D0725 14:31:39.750266 75498 task_signals.go:204] [ 311: 311] Signal 311, PID: 311, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.750359 75498 task_exit.go:204] [ 311: 311] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.752125 75498 task_exit.go:204] [ 311: 311] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.752744 75498 task_exit.go:204] [ 310: 310] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.754658 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.754735 75498 task_exit.go:204] [ 310: 310] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.754796 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.754874 75498 task_exit.go:204] [ 310: 310] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.754868 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.754918 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.757512 75498 usertrap_amd64.go:212] [ 312: 312] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.757598 75498 usertrap_amd64.go:122] [ 312: 312] Allocate a new trap: 0xc0036ae4e0 9 D0725 14:31:39.757957 75498 usertrap_amd64.go:225] [ 312: 312] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.760259 75498 usertrap_amd64.go:212] [ 312: 312] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.760316 75498 usertrap_amd64.go:122] [ 312: 312] Allocate a new trap: 0xc0036ae4e0 10 D0725 14:31:39.760360 75498 usertrap_amd64.go:225] [ 312: 312] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.761305 75498 usertrap_amd64.go:212] [ 312: 312] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.761347 75498 usertrap_amd64.go:122] [ 312: 312] Allocate a new trap: 0xc0036ae4e0 11 D0725 14:31:39.761388 75498 usertrap_amd64.go:225] [ 312: 312] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.762518 75498 usertrap_amd64.go:212] [ 312: 312] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.762564 75498 usertrap_amd64.go:122] [ 312: 312] Allocate a new trap: 0xc0036ae4e0 12 D0725 14:31:39.762616 75498 usertrap_amd64.go:225] [ 312: 312] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.764205 75498 usertrap_amd64.go:212] [ 312: 312] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.764250 75498 usertrap_amd64.go:122] [ 312: 312] Allocate a new trap: 0xc0036ae4e0 13 D0725 14:31:39.764297 75498 usertrap_amd64.go:225] [ 312: 312] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.764458 75498 usertrap_amd64.go:212] [ 312: 312] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.764493 75498 usertrap_amd64.go:122] [ 312: 312] Allocate a new trap: 0xc0036ae4e0 14 D0725 14:31:39.764530 75498 usertrap_amd64.go:225] [ 312: 312] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.787572 75498 task_signals.go:470] [ 313: 313] Notified of signal 56 D0725 14:31:39.787757 75498 task_signals.go:204] [ 313: 313] Signal 313, PID: 313, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.787860 75498 task_exit.go:204] [ 313: 313] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.789336 75498 task_exit.go:204] [ 313: 313] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.789994 75498 task_exit.go:204] [ 312: 312] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.791878 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.791961 75498 task_exit.go:204] [ 312: 312] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.792022 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.792041 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.792081 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.792597 75498 task_exit.go:204] [ 312: 312] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.795172 75498 usertrap_amd64.go:212] [ 314: 314] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.795234 75498 usertrap_amd64.go:122] [ 314: 314] Allocate a new trap: 0xc0018980c0 9 D0725 14:31:39.795534 75498 usertrap_amd64.go:225] [ 314: 314] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.797821 75498 usertrap_amd64.go:212] [ 314: 314] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.797869 75498 usertrap_amd64.go:122] [ 314: 314] Allocate a new trap: 0xc0018980c0 10 D0725 14:31:39.797914 75498 usertrap_amd64.go:225] [ 314: 314] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.798825 75498 usertrap_amd64.go:212] [ 314: 314] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.798866 75498 usertrap_amd64.go:122] [ 314: 314] Allocate a new trap: 0xc0018980c0 11 D0725 14:31:39.798907 75498 usertrap_amd64.go:225] [ 314: 314] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.800093 75498 usertrap_amd64.go:212] [ 314: 314] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.800140 75498 usertrap_amd64.go:122] [ 314: 314] Allocate a new trap: 0xc0018980c0 12 D0725 14:31:39.800180 75498 usertrap_amd64.go:225] [ 314: 314] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.801756 75498 usertrap_amd64.go:212] [ 314: 314] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.801839 75498 usertrap_amd64.go:122] [ 314: 314] Allocate a new trap: 0xc0018980c0 13 D0725 14:31:39.801903 75498 usertrap_amd64.go:225] [ 314: 314] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.802104 75498 usertrap_amd64.go:212] [ 314: 314] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.802152 75498 usertrap_amd64.go:122] [ 314: 314] Allocate a new trap: 0xc0018980c0 14 D0725 14:31:39.802192 75498 usertrap_amd64.go:225] [ 314: 314] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.822918 75498 task_signals.go:470] [ 315: 315] Notified of signal 56 D0725 14:31:39.823193 75498 task_signals.go:204] [ 315: 315] Signal 315, PID: 315, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.823324 75498 task_exit.go:204] [ 315: 315] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.825370 75498 task_exit.go:204] [ 315: 315] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.825980 75498 task_exit.go:204] [ 314: 314] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.827973 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.828041 75498 task_exit.go:204] [ 314: 314] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.828109 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.828162 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.828230 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.829005 75498 task_exit.go:204] [ 314: 314] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.831542 75498 usertrap_amd64.go:212] [ 316: 316] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.831646 75498 usertrap_amd64.go:122] [ 316: 316] Allocate a new trap: 0xc0002dffb0 9 D0725 14:31:39.831919 75498 usertrap_amd64.go:225] [ 316: 316] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.833884 75498 usertrap_amd64.go:212] [ 316: 316] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.833930 75498 usertrap_amd64.go:122] [ 316: 316] Allocate a new trap: 0xc0002dffb0 10 D0725 14:31:39.833981 75498 usertrap_amd64.go:225] [ 316: 316] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.834945 75498 usertrap_amd64.go:212] [ 316: 316] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.834987 75498 usertrap_amd64.go:122] [ 316: 316] Allocate a new trap: 0xc0002dffb0 11 D0725 14:31:39.835028 75498 usertrap_amd64.go:225] [ 316: 316] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.836319 75498 usertrap_amd64.go:212] [ 316: 316] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.836371 75498 usertrap_amd64.go:122] [ 316: 316] Allocate a new trap: 0xc0002dffb0 12 D0725 14:31:39.836426 75498 usertrap_amd64.go:225] [ 316: 316] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.837928 75498 usertrap_amd64.go:212] [ 316: 316] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.837971 75498 usertrap_amd64.go:122] [ 316: 316] Allocate a new trap: 0xc0002dffb0 13 D0725 14:31:39.838013 75498 usertrap_amd64.go:225] [ 316: 316] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.838187 75498 usertrap_amd64.go:212] [ 316: 316] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.838229 75498 usertrap_amd64.go:122] [ 316: 316] Allocate a new trap: 0xc0002dffb0 14 D0725 14:31:39.838268 75498 usertrap_amd64.go:225] [ 316: 316] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.860003 75498 task_signals.go:470] [ 317: 317] Notified of signal 56 D0725 14:31:39.860186 75498 task_signals.go:204] [ 317: 317] Signal 317, PID: 317, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.860300 75498 task_exit.go:204] [ 317: 317] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.862510 75498 task_exit.go:204] [ 317: 317] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.862624 75498 task_exit.go:204] [ 316: 316] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.864701 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.864778 75498 task_exit.go:204] [ 316: 316] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.864841 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.864912 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.864988 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.865244 75498 task_exit.go:204] [ 316: 316] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.867698 75498 usertrap_amd64.go:212] [ 318: 318] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.867762 75498 usertrap_amd64.go:122] [ 318: 318] Allocate a new trap: 0xc0018985d0 9 D0725 14:31:39.868057 75498 usertrap_amd64.go:225] [ 318: 318] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.869993 75498 usertrap_amd64.go:212] [ 318: 318] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.870045 75498 usertrap_amd64.go:122] [ 318: 318] Allocate a new trap: 0xc0018985d0 10 D0725 14:31:39.870090 75498 usertrap_amd64.go:225] [ 318: 318] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.870981 75498 usertrap_amd64.go:212] [ 318: 318] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.871020 75498 usertrap_amd64.go:122] [ 318: 318] Allocate a new trap: 0xc0018985d0 11 D0725 14:31:39.871070 75498 usertrap_amd64.go:225] [ 318: 318] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.872153 75498 usertrap_amd64.go:212] [ 318: 318] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.872196 75498 usertrap_amd64.go:122] [ 318: 318] Allocate a new trap: 0xc0018985d0 12 D0725 14:31:39.872247 75498 usertrap_amd64.go:225] [ 318: 318] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.873807 75498 usertrap_amd64.go:212] [ 318: 318] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.873862 75498 usertrap_amd64.go:122] [ 318: 318] Allocate a new trap: 0xc0018985d0 13 D0725 14:31:39.873904 75498 usertrap_amd64.go:225] [ 318: 318] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.874059 75498 usertrap_amd64.go:212] [ 318: 318] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.874102 75498 usertrap_amd64.go:122] [ 318: 318] Allocate a new trap: 0xc0018985d0 14 D0725 14:31:39.874148 75498 usertrap_amd64.go:225] [ 318: 318] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.896287 75498 task_signals.go:470] [ 319: 319] Notified of signal 56 D0725 14:31:39.896394 75498 task_signals.go:204] [ 319: 319] Signal 319, PID: 319, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.896464 75498 task_exit.go:204] [ 319: 319] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.897935 75498 task_exit.go:204] [ 319: 319] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.898772 75498 task_exit.go:204] [ 318: 318] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.900824 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.900915 75498 task_exit.go:204] [ 318: 318] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.900961 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.901047 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.901088 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.901752 75498 task_exit.go:204] [ 318: 318] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.904322 75498 usertrap_amd64.go:212] [ 320: 320] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.904391 75498 usertrap_amd64.go:122] [ 320: 320] Allocate a new trap: 0xc001898b40 9 D0725 14:31:39.904701 75498 usertrap_amd64.go:225] [ 320: 320] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.906865 75498 usertrap_amd64.go:212] [ 320: 320] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.906918 75498 usertrap_amd64.go:122] [ 320: 320] Allocate a new trap: 0xc001898b40 10 D0725 14:31:39.906969 75498 usertrap_amd64.go:225] [ 320: 320] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.907877 75498 usertrap_amd64.go:212] [ 320: 320] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.907933 75498 usertrap_amd64.go:122] [ 320: 320] Allocate a new trap: 0xc001898b40 11 D0725 14:31:39.907981 75498 usertrap_amd64.go:225] [ 320: 320] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.909005 75498 usertrap_amd64.go:212] [ 320: 320] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.909048 75498 usertrap_amd64.go:122] [ 320: 320] Allocate a new trap: 0xc001898b40 12 D0725 14:31:39.909088 75498 usertrap_amd64.go:225] [ 320: 320] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.910496 75498 usertrap_amd64.go:212] [ 320: 320] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.910547 75498 usertrap_amd64.go:122] [ 320: 320] Allocate a new trap: 0xc001898b40 13 D0725 14:31:39.910587 75498 usertrap_amd64.go:225] [ 320: 320] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.910741 75498 usertrap_amd64.go:212] [ 320: 320] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.910786 75498 usertrap_amd64.go:122] [ 320: 320] Allocate a new trap: 0xc001898b40 14 D0725 14:31:39.910842 75498 usertrap_amd64.go:225] [ 320: 320] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.932942 75498 task_signals.go:470] [ 321: 321] Notified of signal 56 D0725 14:31:39.933091 75498 task_signals.go:204] [ 321: 321] Signal 321, PID: 321, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.933196 75498 task_exit.go:204] [ 321: 321] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.935167 75498 task_exit.go:204] [ 321: 321] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.935927 75498 task_exit.go:204] [ 320: 320] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.937950 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.938045 75498 task_exit.go:204] [ 320: 320] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.938109 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.938196 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.938266 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.938281 75498 task_exit.go:204] [ 320: 320] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.941117 75498 usertrap_amd64.go:212] [ 322: 322] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.941199 75498 usertrap_amd64.go:122] [ 322: 322] Allocate a new trap: 0xc0036afd40 9 D0725 14:31:39.941577 75498 usertrap_amd64.go:225] [ 322: 322] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.943842 75498 usertrap_amd64.go:212] [ 322: 322] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.943912 75498 usertrap_amd64.go:122] [ 322: 322] Allocate a new trap: 0xc0036afd40 10 D0725 14:31:39.943957 75498 usertrap_amd64.go:225] [ 322: 322] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.945215 75498 usertrap_amd64.go:212] [ 322: 322] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.945270 75498 usertrap_amd64.go:122] [ 322: 322] Allocate a new trap: 0xc0036afd40 11 D0725 14:31:39.945324 75498 usertrap_amd64.go:225] [ 322: 322] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.946409 75498 usertrap_amd64.go:212] [ 322: 322] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.946452 75498 usertrap_amd64.go:122] [ 322: 322] Allocate a new trap: 0xc0036afd40 12 D0725 14:31:39.946496 75498 usertrap_amd64.go:225] [ 322: 322] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.948127 75498 usertrap_amd64.go:212] [ 322: 322] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.948195 75498 usertrap_amd64.go:122] [ 322: 322] Allocate a new trap: 0xc0036afd40 13 D0725 14:31:39.948256 75498 usertrap_amd64.go:225] [ 322: 322] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.948458 75498 usertrap_amd64.go:212] [ 322: 322] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.948509 75498 usertrap_amd64.go:122] [ 322: 322] Allocate a new trap: 0xc0036afd40 14 D0725 14:31:39.948550 75498 usertrap_amd64.go:225] [ 322: 322] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:39.969486 75498 task_signals.go:470] [ 323: 323] Notified of signal 56 D0725 14:31:39.969614 75498 task_signals.go:204] [ 323: 323] Signal 323, PID: 323, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:39.969709 75498 task_exit.go:204] [ 323: 323] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.971296 75498 task_exit.go:204] [ 323: 323] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.971879 75498 task_exit.go:204] [ 322: 322] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:39.973577 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:39.973651 75498 task_exit.go:204] [ 322: 322] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:39.973726 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:39.973780 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:39.973822 75498 task_exit.go:204] [ 322: 322] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:39.973825 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:39.976338 75498 usertrap_amd64.go:212] [ 324: 324] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:39.976398 75498 usertrap_amd64.go:122] [ 324: 324] Allocate a new trap: 0xc002ad84e0 9 D0725 14:31:39.976690 75498 usertrap_amd64.go:225] [ 324: 324] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:39.978562 75498 usertrap_amd64.go:212] [ 324: 324] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:39.978608 75498 usertrap_amd64.go:122] [ 324: 324] Allocate a new trap: 0xc002ad84e0 10 D0725 14:31:39.978652 75498 usertrap_amd64.go:225] [ 324: 324] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:39.979516 75498 usertrap_amd64.go:212] [ 324: 324] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:39.979565 75498 usertrap_amd64.go:122] [ 324: 324] Allocate a new trap: 0xc002ad84e0 11 D0725 14:31:39.979654 75498 usertrap_amd64.go:225] [ 324: 324] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:39.980635 75498 usertrap_amd64.go:212] [ 324: 324] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:39.980700 75498 usertrap_amd64.go:122] [ 324: 324] Allocate a new trap: 0xc002ad84e0 12 D0725 14:31:39.980758 75498 usertrap_amd64.go:225] [ 324: 324] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:39.982291 75498 usertrap_amd64.go:212] [ 324: 324] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:39.982342 75498 usertrap_amd64.go:122] [ 324: 324] Allocate a new trap: 0xc002ad84e0 13 D0725 14:31:39.982392 75498 usertrap_amd64.go:225] [ 324: 324] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:39.982533 75498 usertrap_amd64.go:212] [ 324: 324] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:39.982578 75498 usertrap_amd64.go:122] [ 324: 324] Allocate a new trap: 0xc002ad84e0 14 D0725 14:31:39.982615 75498 usertrap_amd64.go:225] [ 324: 324] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.004955 75498 task_signals.go:470] [ 325: 325] Notified of signal 56 D0725 14:31:40.005160 75498 task_signals.go:204] [ 325: 325] Signal 325, PID: 325, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.005263 75498 task_exit.go:204] [ 325: 325] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.007461 75498 task_exit.go:204] [ 325: 325] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.007805 75498 task_exit.go:204] [ 324: 324] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.009994 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.010088 75498 task_exit.go:204] [ 324: 324] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.010178 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.010216 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.010269 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.010904 75498 task_exit.go:204] [ 324: 324] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.013816 75498 usertrap_amd64.go:212] [ 326: 326] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.013884 75498 usertrap_amd64.go:122] [ 326: 326] Allocate a new trap: 0xc000481230 9 D0725 14:31:40.014316 75498 usertrap_amd64.go:225] [ 326: 326] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.016538 75498 usertrap_amd64.go:212] [ 326: 326] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.016603 75498 usertrap_amd64.go:122] [ 326: 326] Allocate a new trap: 0xc000481230 10 D0725 14:31:40.016649 75498 usertrap_amd64.go:225] [ 326: 326] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.017489 75498 usertrap_amd64.go:212] [ 326: 326] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.017528 75498 usertrap_amd64.go:122] [ 326: 326] Allocate a new trap: 0xc000481230 11 D0725 14:31:40.017576 75498 usertrap_amd64.go:225] [ 326: 326] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.018703 75498 usertrap_amd64.go:212] [ 326: 326] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.018744 75498 usertrap_amd64.go:122] [ 326: 326] Allocate a new trap: 0xc000481230 12 D0725 14:31:40.018821 75498 usertrap_amd64.go:225] [ 326: 326] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.020455 75498 usertrap_amd64.go:212] [ 326: 326] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.020497 75498 usertrap_amd64.go:122] [ 326: 326] Allocate a new trap: 0xc000481230 13 D0725 14:31:40.020547 75498 usertrap_amd64.go:225] [ 326: 326] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.020739 75498 usertrap_amd64.go:212] [ 326: 326] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.020781 75498 usertrap_amd64.go:122] [ 326: 326] Allocate a new trap: 0xc000481230 14 D0725 14:31:40.020887 75498 usertrap_amd64.go:225] [ 326: 326] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.043847 75498 task_signals.go:470] [ 327: 327] Notified of signal 56 D0725 14:31:40.043963 75498 task_signals.go:204] [ 327: 327] Signal 327, PID: 327, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.044036 75498 task_exit.go:204] [ 327: 327] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.045741 75498 task_exit.go:204] [ 327: 327] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.046612 75498 task_exit.go:204] [ 326: 326] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.048345 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.048404 75498 task_exit.go:204] [ 326: 326] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.048442 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.048437 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.048505 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.049594 75498 task_exit.go:204] [ 326: 326] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.052181 75498 usertrap_amd64.go:212] [ 328: 328] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.052248 75498 usertrap_amd64.go:122] [ 328: 328] Allocate a new trap: 0xc00476b740 9 D0725 14:31:40.052534 75498 usertrap_amd64.go:225] [ 328: 328] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.054353 75498 usertrap_amd64.go:212] [ 328: 328] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.054394 75498 usertrap_amd64.go:122] [ 328: 328] Allocate a new trap: 0xc00476b740 10 D0725 14:31:40.054444 75498 usertrap_amd64.go:225] [ 328: 328] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.055361 75498 usertrap_amd64.go:212] [ 328: 328] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.055418 75498 usertrap_amd64.go:122] [ 328: 328] Allocate a new trap: 0xc00476b740 11 D0725 14:31:40.055462 75498 usertrap_amd64.go:225] [ 328: 328] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.056577 75498 usertrap_amd64.go:212] [ 328: 328] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.056619 75498 usertrap_amd64.go:122] [ 328: 328] Allocate a new trap: 0xc00476b740 12 D0725 14:31:40.056670 75498 usertrap_amd64.go:225] [ 328: 328] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.058071 75498 usertrap_amd64.go:212] [ 328: 328] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.058121 75498 usertrap_amd64.go:122] [ 328: 328] Allocate a new trap: 0xc00476b740 13 D0725 14:31:40.058163 75498 usertrap_amd64.go:225] [ 328: 328] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.058319 75498 usertrap_amd64.go:212] [ 328: 328] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.058352 75498 usertrap_amd64.go:122] [ 328: 328] Allocate a new trap: 0xc00476b740 14 D0725 14:31:40.058397 75498 usertrap_amd64.go:225] [ 328: 328] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.079646 75498 task_signals.go:470] [ 329: 329] Notified of signal 56 D0725 14:31:40.079802 75498 task_signals.go:204] [ 329: 329] Signal 329, PID: 329, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.079900 75498 task_exit.go:204] [ 329: 329] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.081436 75498 task_exit.go:204] [ 329: 329] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.082534 75498 task_exit.go:204] [ 328: 328] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.084417 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.084489 75498 task_exit.go:204] [ 328: 328] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.084558 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.084586 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.084627 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.085172 75498 task_exit.go:204] [ 328: 328] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.087921 75498 usertrap_amd64.go:212] [ 330: 330] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.087993 75498 usertrap_amd64.go:122] [ 330: 330] Allocate a new trap: 0xc002ad9590 9 D0725 14:31:40.088326 75498 usertrap_amd64.go:225] [ 330: 330] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.090257 75498 usertrap_amd64.go:212] [ 330: 330] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.090297 75498 usertrap_amd64.go:122] [ 330: 330] Allocate a new trap: 0xc002ad9590 10 D0725 14:31:40.090344 75498 usertrap_amd64.go:225] [ 330: 330] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.091226 75498 usertrap_amd64.go:212] [ 330: 330] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.091264 75498 usertrap_amd64.go:122] [ 330: 330] Allocate a new trap: 0xc002ad9590 11 D0725 14:31:40.091324 75498 usertrap_amd64.go:225] [ 330: 330] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.092405 75498 usertrap_amd64.go:212] [ 330: 330] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.092454 75498 usertrap_amd64.go:122] [ 330: 330] Allocate a new trap: 0xc002ad9590 12 D0725 14:31:40.092502 75498 usertrap_amd64.go:225] [ 330: 330] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.094129 75498 usertrap_amd64.go:212] [ 330: 330] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.094170 75498 usertrap_amd64.go:122] [ 330: 330] Allocate a new trap: 0xc002ad9590 13 D0725 14:31:40.094222 75498 usertrap_amd64.go:225] [ 330: 330] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.094376 75498 usertrap_amd64.go:212] [ 330: 330] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.094428 75498 usertrap_amd64.go:122] [ 330: 330] Allocate a new trap: 0xc002ad9590 14 D0725 14:31:40.094473 75498 usertrap_amd64.go:225] [ 330: 330] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.117272 75498 task_signals.go:470] [ 331: 331] Notified of signal 56 D0725 14:31:40.117384 75498 task_signals.go:204] [ 331: 331] Signal 331, PID: 331, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.117454 75498 task_exit.go:204] [ 331: 331] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.118862 75498 task_exit.go:204] [ 331: 331] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.119759 75498 task_exit.go:204] [ 330: 330] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.121703 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.121789 75498 task_exit.go:204] [ 330: 330] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.121849 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.121854 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.121911 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.121963 75498 task_exit.go:204] [ 330: 330] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.124719 75498 usertrap_amd64.go:212] [ 332: 332] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.124784 75498 usertrap_amd64.go:122] [ 332: 332] Allocate a new trap: 0xc000bdc7e0 9 D0725 14:31:40.125060 75498 usertrap_amd64.go:225] [ 332: 332] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.127268 75498 usertrap_amd64.go:212] [ 332: 332] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.127325 75498 usertrap_amd64.go:122] [ 332: 332] Allocate a new trap: 0xc000bdc7e0 10 D0725 14:31:40.127385 75498 usertrap_amd64.go:225] [ 332: 332] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.128334 75498 usertrap_amd64.go:212] [ 332: 332] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.128397 75498 usertrap_amd64.go:122] [ 332: 332] Allocate a new trap: 0xc000bdc7e0 11 D0725 14:31:40.128454 75498 usertrap_amd64.go:225] [ 332: 332] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.129779 75498 usertrap_amd64.go:212] [ 332: 332] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.129826 75498 usertrap_amd64.go:122] [ 332: 332] Allocate a new trap: 0xc000bdc7e0 12 D0725 14:31:40.129889 75498 usertrap_amd64.go:225] [ 332: 332] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.131441 75498 usertrap_amd64.go:212] [ 332: 332] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.131483 75498 usertrap_amd64.go:122] [ 332: 332] Allocate a new trap: 0xc000bdc7e0 13 D0725 14:31:40.131527 75498 usertrap_amd64.go:225] [ 332: 332] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.131735 75498 usertrap_amd64.go:212] [ 332: 332] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.131772 75498 usertrap_amd64.go:122] [ 332: 332] Allocate a new trap: 0xc000bdc7e0 14 D0725 14:31:40.131813 75498 usertrap_amd64.go:225] [ 332: 332] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.156554 75498 task_signals.go:470] [ 333: 333] Notified of signal 56 D0725 14:31:40.156788 75498 task_signals.go:204] [ 333: 333] Signal 333, PID: 333, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.156883 75498 task_exit.go:204] [ 333: 333] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.158739 75498 task_exit.go:204] [ 333: 333] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.159301 75498 task_exit.go:204] [ 332: 332] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.161230 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.161319 75498 task_exit.go:204] [ 332: 332] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.161370 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.161433 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.161485 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.161866 75498 task_exit.go:204] [ 332: 332] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.164435 75498 usertrap_amd64.go:212] [ 334: 334] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.164499 75498 usertrap_amd64.go:122] [ 334: 334] Allocate a new trap: 0xc000481e00 9 D0725 14:31:40.164913 75498 usertrap_amd64.go:225] [ 334: 334] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.166886 75498 usertrap_amd64.go:212] [ 334: 334] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.166927 75498 usertrap_amd64.go:122] [ 334: 334] Allocate a new trap: 0xc000481e00 10 D0725 14:31:40.166971 75498 usertrap_amd64.go:225] [ 334: 334] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.167840 75498 usertrap_amd64.go:212] [ 334: 334] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.167881 75498 usertrap_amd64.go:122] [ 334: 334] Allocate a new trap: 0xc000481e00 11 D0725 14:31:40.167924 75498 usertrap_amd64.go:225] [ 334: 334] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.169042 75498 usertrap_amd64.go:212] [ 334: 334] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.169084 75498 usertrap_amd64.go:122] [ 334: 334] Allocate a new trap: 0xc000481e00 12 D0725 14:31:40.169127 75498 usertrap_amd64.go:225] [ 334: 334] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.170656 75498 usertrap_amd64.go:212] [ 334: 334] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.170699 75498 usertrap_amd64.go:122] [ 334: 334] Allocate a new trap: 0xc000481e00 13 D0725 14:31:40.170748 75498 usertrap_amd64.go:225] [ 334: 334] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.170925 75498 usertrap_amd64.go:212] [ 334: 334] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.170967 75498 usertrap_amd64.go:122] [ 334: 334] Allocate a new trap: 0xc000481e00 14 D0725 14:31:40.171013 75498 usertrap_amd64.go:225] [ 334: 334] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.192212 75498 task_signals.go:470] [ 335: 335] Notified of signal 56 D0725 14:31:40.192340 75498 task_signals.go:204] [ 335: 335] Signal 335, PID: 335, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.192423 75498 task_exit.go:204] [ 335: 335] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.194221 75498 task_exit.go:204] [ 335: 335] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.194696 75498 task_exit.go:204] [ 334: 334] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.196470 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.196538 75498 task_exit.go:204] [ 334: 334] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.196580 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.196598 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.196673 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.196673 75498 task_exit.go:204] [ 334: 334] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.199435 75498 usertrap_amd64.go:212] [ 336: 336] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.199497 75498 usertrap_amd64.go:122] [ 336: 336] Allocate a new trap: 0xc000048240 9 D0725 14:31:40.199834 75498 usertrap_amd64.go:225] [ 336: 336] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.202151 75498 usertrap_amd64.go:212] [ 336: 336] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.202208 75498 usertrap_amd64.go:122] [ 336: 336] Allocate a new trap: 0xc000048240 10 D0725 14:31:40.202266 75498 usertrap_amd64.go:225] [ 336: 336] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.203188 75498 usertrap_amd64.go:212] [ 336: 336] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.203228 75498 usertrap_amd64.go:122] [ 336: 336] Allocate a new trap: 0xc000048240 11 D0725 14:31:40.203277 75498 usertrap_amd64.go:225] [ 336: 336] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.204462 75498 usertrap_amd64.go:212] [ 336: 336] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.204506 75498 usertrap_amd64.go:122] [ 336: 336] Allocate a new trap: 0xc000048240 12 D0725 14:31:40.204564 75498 usertrap_amd64.go:225] [ 336: 336] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.206491 75498 usertrap_amd64.go:212] [ 336: 336] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.206539 75498 usertrap_amd64.go:122] [ 336: 336] Allocate a new trap: 0xc000048240 13 D0725 14:31:40.206598 75498 usertrap_amd64.go:225] [ 336: 336] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.206768 75498 usertrap_amd64.go:212] [ 336: 336] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.206832 75498 usertrap_amd64.go:122] [ 336: 336] Allocate a new trap: 0xc000048240 14 D0725 14:31:40.206891 75498 usertrap_amd64.go:225] [ 336: 336] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.228267 75498 task_signals.go:470] [ 337: 337] Notified of signal 56 D0725 14:31:40.228483 75498 task_signals.go:204] [ 337: 337] Signal 337, PID: 337, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.228580 75498 task_exit.go:204] [ 337: 337] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.230476 75498 task_exit.go:204] [ 337: 337] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.230716 75498 task_exit.go:204] [ 336: 336] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.232822 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.232908 75498 task_exit.go:204] [ 336: 336] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.232949 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.233029 75498 task_exit.go:204] [ 336: 336] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.233045 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.233081 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.235692 75498 usertrap_amd64.go:212] [ 338: 338] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.235753 75498 usertrap_amd64.go:122] [ 338: 338] Allocate a new trap: 0xc0000490e0 9 D0725 14:31:40.236113 75498 usertrap_amd64.go:225] [ 338: 338] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.238004 75498 usertrap_amd64.go:212] [ 338: 338] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.238049 75498 usertrap_amd64.go:122] [ 338: 338] Allocate a new trap: 0xc0000490e0 10 D0725 14:31:40.238094 75498 usertrap_amd64.go:225] [ 338: 338] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.238949 75498 usertrap_amd64.go:212] [ 338: 338] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.238997 75498 usertrap_amd64.go:122] [ 338: 338] Allocate a new trap: 0xc0000490e0 11 D0725 14:31:40.239038 75498 usertrap_amd64.go:225] [ 338: 338] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.240300 75498 usertrap_amd64.go:212] [ 338: 338] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.240362 75498 usertrap_amd64.go:122] [ 338: 338] Allocate a new trap: 0xc0000490e0 12 D0725 14:31:40.240436 75498 usertrap_amd64.go:225] [ 338: 338] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.242722 75498 usertrap_amd64.go:212] [ 338: 338] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.242782 75498 usertrap_amd64.go:122] [ 338: 338] Allocate a new trap: 0xc0000490e0 13 D0725 14:31:40.242852 75498 usertrap_amd64.go:225] [ 338: 338] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.243126 75498 usertrap_amd64.go:212] [ 338: 338] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.243176 75498 usertrap_amd64.go:122] [ 338: 338] Allocate a new trap: 0xc0000490e0 14 D0725 14:31:40.243242 75498 usertrap_amd64.go:225] [ 338: 338] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.266375 75498 task_signals.go:470] [ 339: 339] Notified of signal 56 D0725 14:31:40.266498 75498 task_signals.go:204] [ 339: 339] Signal 339, PID: 339, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.266579 75498 task_exit.go:204] [ 339: 339] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.268391 75498 task_exit.go:204] [ 339: 339] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.269670 75498 task_exit.go:204] [ 338: 338] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.271943 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.272043 75498 task_exit.go:204] [ 338: 338] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.272095 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.272166 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.272238 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.272787 75498 task_exit.go:204] [ 338: 338] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.275493 75498 usertrap_amd64.go:212] [ 340: 340] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.275561 75498 usertrap_amd64.go:122] [ 340: 340] Allocate a new trap: 0xc0018992c0 9 D0725 14:31:40.275879 75498 usertrap_amd64.go:225] [ 340: 340] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.277618 75498 usertrap_amd64.go:212] [ 340: 340] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.277668 75498 usertrap_amd64.go:122] [ 340: 340] Allocate a new trap: 0xc0018992c0 10 D0725 14:31:40.277710 75498 usertrap_amd64.go:225] [ 340: 340] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.278482 75498 usertrap_amd64.go:212] [ 340: 340] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.278521 75498 usertrap_amd64.go:122] [ 340: 340] Allocate a new trap: 0xc0018992c0 11 D0725 14:31:40.278562 75498 usertrap_amd64.go:225] [ 340: 340] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.279512 75498 usertrap_amd64.go:212] [ 340: 340] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.279551 75498 usertrap_amd64.go:122] [ 340: 340] Allocate a new trap: 0xc0018992c0 12 D0725 14:31:40.279619 75498 usertrap_amd64.go:225] [ 340: 340] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.281014 75498 usertrap_amd64.go:212] [ 340: 340] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.281070 75498 usertrap_amd64.go:122] [ 340: 340] Allocate a new trap: 0xc0018992c0 13 D0725 14:31:40.281110 75498 usertrap_amd64.go:225] [ 340: 340] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.281348 75498 usertrap_amd64.go:212] [ 340: 340] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.281398 75498 usertrap_amd64.go:122] [ 340: 340] Allocate a new trap: 0xc0018992c0 14 D0725 14:31:40.281463 75498 usertrap_amd64.go:225] [ 340: 340] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.309927 75498 task_signals.go:470] [ 341: 341] Notified of signal 56 D0725 14:31:40.310157 75498 task_signals.go:204] [ 341: 341] Signal 341, PID: 341, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.310267 75498 task_exit.go:204] [ 341: 341] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.311968 75498 task_exit.go:204] [ 341: 341] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.312411 75498 task_exit.go:204] [ 340: 340] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.314378 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.314448 75498 task_exit.go:204] [ 340: 340] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.314489 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.314606 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.314672 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.315297 75498 task_exit.go:204] [ 340: 340] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.318871 75498 usertrap_amd64.go:212] [ 342: 342] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.318978 75498 usertrap_amd64.go:122] [ 342: 342] Allocate a new trap: 0xc000bdc180 9 D0725 14:31:40.319413 75498 usertrap_amd64.go:225] [ 342: 342] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.322442 75498 usertrap_amd64.go:212] [ 342: 342] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.322509 75498 usertrap_amd64.go:122] [ 342: 342] Allocate a new trap: 0xc000bdc180 10 D0725 14:31:40.322590 75498 usertrap_amd64.go:225] [ 342: 342] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.323625 75498 usertrap_amd64.go:212] [ 342: 342] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.323685 75498 usertrap_amd64.go:122] [ 342: 342] Allocate a new trap: 0xc000bdc180 11 D0725 14:31:40.323735 75498 usertrap_amd64.go:225] [ 342: 342] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.324884 75498 usertrap_amd64.go:212] [ 342: 342] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.324924 75498 usertrap_amd64.go:122] [ 342: 342] Allocate a new trap: 0xc000bdc180 12 D0725 14:31:40.324989 75498 usertrap_amd64.go:225] [ 342: 342] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.326644 75498 usertrap_amd64.go:212] [ 342: 342] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.326696 75498 usertrap_amd64.go:122] [ 342: 342] Allocate a new trap: 0xc000bdc180 13 D0725 14:31:40.326811 75498 usertrap_amd64.go:225] [ 342: 342] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.327144 75498 usertrap_amd64.go:212] [ 342: 342] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.327183 75498 usertrap_amd64.go:122] [ 342: 342] Allocate a new trap: 0xc000bdc180 14 D0725 14:31:40.327227 75498 usertrap_amd64.go:225] [ 342: 342] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.347576 75498 task_signals.go:470] [ 343: 343] Notified of signal 56 D0725 14:31:40.347738 75498 task_signals.go:204] [ 343: 343] Signal 343, PID: 343, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.347830 75498 task_exit.go:204] [ 343: 343] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.349426 75498 task_exit.go:204] [ 343: 343] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.349854 75498 task_exit.go:204] [ 342: 342] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.351707 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.351802 75498 task_exit.go:204] [ 342: 342] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.351846 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.351933 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.352019 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.352669 75498 task_exit.go:204] [ 342: 342] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.355327 75498 usertrap_amd64.go:212] [ 344: 344] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.355386 75498 usertrap_amd64.go:122] [ 344: 344] Allocate a new trap: 0xc00594c0c0 9 D0725 14:31:40.355741 75498 usertrap_amd64.go:225] [ 344: 344] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.357744 75498 usertrap_amd64.go:212] [ 344: 344] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.357798 75498 usertrap_amd64.go:122] [ 344: 344] Allocate a new trap: 0xc00594c0c0 10 D0725 14:31:40.357857 75498 usertrap_amd64.go:225] [ 344: 344] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.358858 75498 usertrap_amd64.go:212] [ 344: 344] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.358902 75498 usertrap_amd64.go:122] [ 344: 344] Allocate a new trap: 0xc00594c0c0 11 D0725 14:31:40.358969 75498 usertrap_amd64.go:225] [ 344: 344] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.360026 75498 usertrap_amd64.go:212] [ 344: 344] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.360084 75498 usertrap_amd64.go:122] [ 344: 344] Allocate a new trap: 0xc00594c0c0 12 D0725 14:31:40.360126 75498 usertrap_amd64.go:225] [ 344: 344] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.361820 75498 usertrap_amd64.go:212] [ 344: 344] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.361861 75498 usertrap_amd64.go:122] [ 344: 344] Allocate a new trap: 0xc00594c0c0 13 D0725 14:31:40.361903 75498 usertrap_amd64.go:225] [ 344: 344] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.362065 75498 usertrap_amd64.go:212] [ 344: 344] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.362120 75498 usertrap_amd64.go:122] [ 344: 344] Allocate a new trap: 0xc00594c0c0 14 D0725 14:31:40.362166 75498 usertrap_amd64.go:225] [ 344: 344] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.383660 75498 task_signals.go:470] [ 345: 345] Notified of signal 56 D0725 14:31:40.383801 75498 task_signals.go:204] [ 345: 345] Signal 345, PID: 345, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.383884 75498 task_exit.go:204] [ 345: 345] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.385453 75498 task_exit.go:204] [ 345: 345] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.385944 75498 task_exit.go:204] [ 344: 344] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.387730 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.387809 75498 task_exit.go:204] [ 344: 344] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.387850 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.387949 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.388023 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.388669 75498 task_exit.go:204] [ 344: 344] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.391798 75498 usertrap_amd64.go:212] [ 346: 346] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.391878 75498 usertrap_amd64.go:122] [ 346: 346] Allocate a new trap: 0xc00594cd50 9 D0725 14:31:40.392227 75498 usertrap_amd64.go:225] [ 346: 346] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.394106 75498 usertrap_amd64.go:212] [ 346: 346] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.394149 75498 usertrap_amd64.go:122] [ 346: 346] Allocate a new trap: 0xc00594cd50 10 D0725 14:31:40.394193 75498 usertrap_amd64.go:225] [ 346: 346] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.394974 75498 usertrap_amd64.go:212] [ 346: 346] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.395015 75498 usertrap_amd64.go:122] [ 346: 346] Allocate a new trap: 0xc00594cd50 11 D0725 14:31:40.395057 75498 usertrap_amd64.go:225] [ 346: 346] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.396088 75498 usertrap_amd64.go:212] [ 346: 346] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.396142 75498 usertrap_amd64.go:122] [ 346: 346] Allocate a new trap: 0xc00594cd50 12 D0725 14:31:40.396193 75498 usertrap_amd64.go:225] [ 346: 346] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.397567 75498 usertrap_amd64.go:212] [ 346: 346] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.397615 75498 usertrap_amd64.go:122] [ 346: 346] Allocate a new trap: 0xc00594cd50 13 D0725 14:31:40.397656 75498 usertrap_amd64.go:225] [ 346: 346] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.397801 75498 usertrap_amd64.go:212] [ 346: 346] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.397850 75498 usertrap_amd64.go:122] [ 346: 346] Allocate a new trap: 0xc00594cd50 14 D0725 14:31:40.397888 75498 usertrap_amd64.go:225] [ 346: 346] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.418599 75498 task_signals.go:470] [ 347: 347] Notified of signal 56 D0725 14:31:40.418834 75498 task_signals.go:204] [ 347: 347] Signal 347, PID: 347, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.418923 75498 task_exit.go:204] [ 347: 347] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.420430 75498 task_exit.go:204] [ 347: 347] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.420947 75498 task_exit.go:204] [ 346: 346] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.423101 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.423171 75498 task_exit.go:204] [ 346: 346] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.423251 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.423324 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.423385 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.423943 75498 task_exit.go:204] [ 346: 346] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.426935 75498 usertrap_amd64.go:212] [ 348: 348] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.427018 75498 usertrap_amd64.go:122] [ 348: 348] Allocate a new trap: 0xc0032405d0 9 D0725 14:31:40.427328 75498 usertrap_amd64.go:225] [ 348: 348] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.430595 75498 usertrap_amd64.go:212] [ 348: 348] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.430663 75498 usertrap_amd64.go:122] [ 348: 348] Allocate a new trap: 0xc0032405d0 10 D0725 14:31:40.430773 75498 usertrap_amd64.go:225] [ 348: 348] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.431915 75498 usertrap_amd64.go:212] [ 348: 348] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.431974 75498 usertrap_amd64.go:122] [ 348: 348] Allocate a new trap: 0xc0032405d0 11 D0725 14:31:40.432029 75498 usertrap_amd64.go:225] [ 348: 348] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.433218 75498 usertrap_amd64.go:212] [ 348: 348] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.433281 75498 usertrap_amd64.go:122] [ 348: 348] Allocate a new trap: 0xc0032405d0 12 D0725 14:31:40.433362 75498 usertrap_amd64.go:225] [ 348: 348] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.435122 75498 usertrap_amd64.go:212] [ 348: 348] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.435166 75498 usertrap_amd64.go:122] [ 348: 348] Allocate a new trap: 0xc0032405d0 13 D0725 14:31:40.435237 75498 usertrap_amd64.go:225] [ 348: 348] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.435422 75498 usertrap_amd64.go:212] [ 348: 348] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.435458 75498 usertrap_amd64.go:122] [ 348: 348] Allocate a new trap: 0xc0032405d0 14 D0725 14:31:40.435501 75498 usertrap_amd64.go:225] [ 348: 348] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.456957 75498 task_signals.go:470] [ 349: 349] Notified of signal 56 D0725 14:31:40.457116 75498 task_signals.go:204] [ 349: 349] Signal 349, PID: 349, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.457198 75498 task_exit.go:204] [ 349: 349] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.458636 75498 task_exit.go:204] [ 349: 349] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.459388 75498 task_exit.go:204] [ 348: 348] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.461468 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.461539 75498 task_exit.go:204] [ 348: 348] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.461581 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.461619 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.461691 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.462094 75498 task_exit.go:204] [ 348: 348] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.464993 75498 usertrap_amd64.go:212] [ 350: 350] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.465070 75498 usertrap_amd64.go:122] [ 350: 350] Allocate a new trap: 0xc00594ce40 9 D0725 14:31:40.465440 75498 usertrap_amd64.go:225] [ 350: 350] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.468089 75498 usertrap_amd64.go:212] [ 350: 350] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.468151 75498 usertrap_amd64.go:122] [ 350: 350] Allocate a new trap: 0xc00594ce40 10 D0725 14:31:40.468200 75498 usertrap_amd64.go:225] [ 350: 350] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.469232 75498 usertrap_amd64.go:212] [ 350: 350] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.469283 75498 usertrap_amd64.go:122] [ 350: 350] Allocate a new trap: 0xc00594ce40 11 D0725 14:31:40.469334 75498 usertrap_amd64.go:225] [ 350: 350] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.470683 75498 usertrap_amd64.go:212] [ 350: 350] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.470735 75498 usertrap_amd64.go:122] [ 350: 350] Allocate a new trap: 0xc00594ce40 12 D0725 14:31:40.470783 75498 usertrap_amd64.go:225] [ 350: 350] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.472732 75498 usertrap_amd64.go:212] [ 350: 350] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.472775 75498 usertrap_amd64.go:122] [ 350: 350] Allocate a new trap: 0xc00594ce40 13 D0725 14:31:40.472844 75498 usertrap_amd64.go:225] [ 350: 350] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.473097 75498 usertrap_amd64.go:212] [ 350: 350] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.473145 75498 usertrap_amd64.go:122] [ 350: 350] Allocate a new trap: 0xc00594ce40 14 D0725 14:31:40.473207 75498 usertrap_amd64.go:225] [ 350: 350] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.501092 75498 task_signals.go:470] [ 351: 351] Notified of signal 56 D0725 14:31:40.501350 75498 task_signals.go:204] [ 351: 351] Signal 351, PID: 351, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.501475 75498 task_exit.go:204] [ 351: 351] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.503455 75498 task_exit.go:204] [ 351: 351] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.504288 75498 task_exit.go:204] [ 350: 350] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.506534 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.506640 75498 task_exit.go:204] [ 350: 350] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.506703 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.506769 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.506713 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.507629 75498 task_exit.go:204] [ 350: 350] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.510773 75498 usertrap_amd64.go:212] [ 352: 352] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.510848 75498 usertrap_amd64.go:122] [ 352: 352] Allocate a new trap: 0xc00594cfc0 9 D0725 14:31:40.511183 75498 usertrap_amd64.go:225] [ 352: 352] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.513267 75498 usertrap_amd64.go:212] [ 352: 352] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.513312 75498 usertrap_amd64.go:122] [ 352: 352] Allocate a new trap: 0xc00594cfc0 10 D0725 14:31:40.513418 75498 usertrap_amd64.go:225] [ 352: 352] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.514366 75498 usertrap_amd64.go:212] [ 352: 352] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.514417 75498 usertrap_amd64.go:122] [ 352: 352] Allocate a new trap: 0xc00594cfc0 11 D0725 14:31:40.514501 75498 usertrap_amd64.go:225] [ 352: 352] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.515697 75498 usertrap_amd64.go:212] [ 352: 352] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.515741 75498 usertrap_amd64.go:122] [ 352: 352] Allocate a new trap: 0xc00594cfc0 12 D0725 14:31:40.515818 75498 usertrap_amd64.go:225] [ 352: 352] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.517338 75498 usertrap_amd64.go:212] [ 352: 352] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.517382 75498 usertrap_amd64.go:122] [ 352: 352] Allocate a new trap: 0xc00594cfc0 13 D0725 14:31:40.517452 75498 usertrap_amd64.go:225] [ 352: 352] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.517682 75498 usertrap_amd64.go:212] [ 352: 352] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.517722 75498 usertrap_amd64.go:122] [ 352: 352] Allocate a new trap: 0xc00594cfc0 14 D0725 14:31:40.517780 75498 usertrap_amd64.go:225] [ 352: 352] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.539627 75498 task_signals.go:470] [ 353: 353] Notified of signal 56 D0725 14:31:40.539751 75498 task_signals.go:204] [ 353: 353] Signal 353, PID: 353, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.539826 75498 task_exit.go:204] [ 353: 353] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.541368 75498 task_exit.go:204] [ 353: 353] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.542114 75498 task_exit.go:204] [ 352: 352] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.543976 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.544049 75498 task_exit.go:204] [ 352: 352] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.544125 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.544138 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.544186 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.544576 75498 task_exit.go:204] [ 352: 352] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.547292 75498 usertrap_amd64.go:212] [ 354: 354] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.547361 75498 usertrap_amd64.go:122] [ 354: 354] Allocate a new trap: 0xc0002e4300 9 D0725 14:31:40.547660 75498 usertrap_amd64.go:225] [ 354: 354] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.549832 75498 usertrap_amd64.go:212] [ 354: 354] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.549892 75498 usertrap_amd64.go:122] [ 354: 354] Allocate a new trap: 0xc0002e4300 10 D0725 14:31:40.549963 75498 usertrap_amd64.go:225] [ 354: 354] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.550840 75498 usertrap_amd64.go:212] [ 354: 354] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.550892 75498 usertrap_amd64.go:122] [ 354: 354] Allocate a new trap: 0xc0002e4300 11 D0725 14:31:40.550935 75498 usertrap_amd64.go:225] [ 354: 354] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.552130 75498 usertrap_amd64.go:212] [ 354: 354] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.552189 75498 usertrap_amd64.go:122] [ 354: 354] Allocate a new trap: 0xc0002e4300 12 D0725 14:31:40.552232 75498 usertrap_amd64.go:225] [ 354: 354] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.553760 75498 usertrap_amd64.go:212] [ 354: 354] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.553803 75498 usertrap_amd64.go:122] [ 354: 354] Allocate a new trap: 0xc0002e4300 13 D0725 14:31:40.553854 75498 usertrap_amd64.go:225] [ 354: 354] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.554065 75498 usertrap_amd64.go:212] [ 354: 354] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.554130 75498 usertrap_amd64.go:122] [ 354: 354] Allocate a new trap: 0xc0002e4300 14 D0725 14:31:40.554187 75498 usertrap_amd64.go:225] [ 354: 354] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.575041 75498 task_signals.go:470] [ 355: 355] Notified of signal 56 D0725 14:31:40.575150 75498 task_signals.go:204] [ 355: 355] Signal 355, PID: 355, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.575231 75498 task_exit.go:204] [ 355: 355] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.576668 75498 task_exit.go:204] [ 355: 355] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.577616 75498 task_exit.go:204] [ 354: 354] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.579882 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.579957 75498 task_exit.go:204] [ 354: 354] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.580023 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.580041 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.580108 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.580113 75498 task_exit.go:204] [ 354: 354] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.582831 75498 usertrap_amd64.go:212] [ 356: 356] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.582920 75498 usertrap_amd64.go:122] [ 356: 356] Allocate a new trap: 0xc00594db30 9 D0725 14:31:40.583238 75498 usertrap_amd64.go:225] [ 356: 356] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.585198 75498 usertrap_amd64.go:212] [ 356: 356] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.585263 75498 usertrap_amd64.go:122] [ 356: 356] Allocate a new trap: 0xc00594db30 10 D0725 14:31:40.585318 75498 usertrap_amd64.go:225] [ 356: 356] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.586182 75498 usertrap_amd64.go:212] [ 356: 356] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.586254 75498 usertrap_amd64.go:122] [ 356: 356] Allocate a new trap: 0xc00594db30 11 D0725 14:31:40.586310 75498 usertrap_amd64.go:225] [ 356: 356] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.587511 75498 usertrap_amd64.go:212] [ 356: 356] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.587559 75498 usertrap_amd64.go:122] [ 356: 356] Allocate a new trap: 0xc00594db30 12 D0725 14:31:40.587644 75498 usertrap_amd64.go:225] [ 356: 356] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.589173 75498 usertrap_amd64.go:212] [ 356: 356] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.589227 75498 usertrap_amd64.go:122] [ 356: 356] Allocate a new trap: 0xc00594db30 13 D0725 14:31:40.589272 75498 usertrap_amd64.go:225] [ 356: 356] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.589466 75498 usertrap_amd64.go:212] [ 356: 356] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.589517 75498 usertrap_amd64.go:122] [ 356: 356] Allocate a new trap: 0xc00594db30 14 D0725 14:31:40.589597 75498 usertrap_amd64.go:225] [ 356: 356] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.611754 75498 task_signals.go:470] [ 357: 357] Notified of signal 56 D0725 14:31:40.611907 75498 task_signals.go:204] [ 357: 357] Signal 357, PID: 357, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.612007 75498 task_exit.go:204] [ 357: 357] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.613335 75498 task_exit.go:204] [ 357: 357] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.614796 75498 task_exit.go:204] [ 356: 356] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.616817 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.616894 75498 task_exit.go:204] [ 356: 356] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.616937 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.617030 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.617103 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.617963 75498 task_exit.go:204] [ 356: 356] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.621462 75498 usertrap_amd64.go:212] [ 358: 358] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.621540 75498 usertrap_amd64.go:122] [ 358: 358] Allocate a new trap: 0xc00594dda0 9 D0725 14:31:40.621856 75498 usertrap_amd64.go:225] [ 358: 358] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.624006 75498 usertrap_amd64.go:212] [ 358: 358] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.624068 75498 usertrap_amd64.go:122] [ 358: 358] Allocate a new trap: 0xc00594dda0 10 D0725 14:31:40.624124 75498 usertrap_amd64.go:225] [ 358: 358] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.625295 75498 usertrap_amd64.go:212] [ 358: 358] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.625354 75498 usertrap_amd64.go:122] [ 358: 358] Allocate a new trap: 0xc00594dda0 11 D0725 14:31:40.625460 75498 usertrap_amd64.go:225] [ 358: 358] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.626644 75498 usertrap_amd64.go:212] [ 358: 358] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.626701 75498 usertrap_amd64.go:122] [ 358: 358] Allocate a new trap: 0xc00594dda0 12 D0725 14:31:40.626749 75498 usertrap_amd64.go:225] [ 358: 358] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.628229 75498 usertrap_amd64.go:212] [ 358: 358] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.628270 75498 usertrap_amd64.go:122] [ 358: 358] Allocate a new trap: 0xc00594dda0 13 D0725 14:31:40.628323 75498 usertrap_amd64.go:225] [ 358: 358] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.628477 75498 usertrap_amd64.go:212] [ 358: 358] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.628512 75498 usertrap_amd64.go:122] [ 358: 358] Allocate a new trap: 0xc00594dda0 14 D0725 14:31:40.628567 75498 usertrap_amd64.go:225] [ 358: 358] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.649836 75498 task_signals.go:470] [ 359: 359] Notified of signal 56 D0725 14:31:40.649958 75498 task_signals.go:204] [ 359: 359] Signal 359, PID: 359, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.650069 75498 task_exit.go:204] [ 359: 359] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.651637 75498 task_exit.go:204] [ 359: 359] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.652192 75498 task_exit.go:204] [ 358: 358] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.653815 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.653884 75498 task_exit.go:204] [ 358: 358] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.653931 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.653928 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.653975 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.654395 75498 task_exit.go:204] [ 358: 358] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.656991 75498 usertrap_amd64.go:212] [ 360: 360] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.657066 75498 usertrap_amd64.go:122] [ 360: 360] Allocate a new trap: 0xc003e0cbd0 9 D0725 14:31:40.657419 75498 usertrap_amd64.go:225] [ 360: 360] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.659961 75498 usertrap_amd64.go:212] [ 360: 360] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.660044 75498 usertrap_amd64.go:122] [ 360: 360] Allocate a new trap: 0xc003e0cbd0 10 D0725 14:31:40.660095 75498 usertrap_amd64.go:225] [ 360: 360] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.660982 75498 usertrap_amd64.go:212] [ 360: 360] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.661036 75498 usertrap_amd64.go:122] [ 360: 360] Allocate a new trap: 0xc003e0cbd0 11 D0725 14:31:40.661078 75498 usertrap_amd64.go:225] [ 360: 360] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.662056 75498 usertrap_amd64.go:212] [ 360: 360] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.662105 75498 usertrap_amd64.go:122] [ 360: 360] Allocate a new trap: 0xc003e0cbd0 12 D0725 14:31:40.662145 75498 usertrap_amd64.go:225] [ 360: 360] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.663578 75498 usertrap_amd64.go:212] [ 360: 360] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.663639 75498 usertrap_amd64.go:122] [ 360: 360] Allocate a new trap: 0xc003e0cbd0 13 D0725 14:31:40.663683 75498 usertrap_amd64.go:225] [ 360: 360] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.663894 75498 usertrap_amd64.go:212] [ 360: 360] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.663931 75498 usertrap_amd64.go:122] [ 360: 360] Allocate a new trap: 0xc003e0cbd0 14 D0725 14:31:40.663980 75498 usertrap_amd64.go:225] [ 360: 360] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.684321 75498 task_signals.go:470] [ 361: 361] Notified of signal 56 D0725 14:31:40.684457 75498 task_signals.go:204] [ 361: 361] Signal 361, PID: 361, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.684548 75498 task_exit.go:204] [ 361: 361] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.685943 75498 task_exit.go:204] [ 361: 361] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.686402 75498 task_exit.go:204] [ 360: 360] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.688054 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.688131 75498 task_exit.go:204] [ 360: 360] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.688172 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.688204 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.688281 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.689115 75498 task_exit.go:204] [ 360: 360] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.691735 75498 usertrap_amd64.go:212] [ 362: 362] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.691843 75498 usertrap_amd64.go:122] [ 362: 362] Allocate a new trap: 0xc0015bc3f0 9 D0725 14:31:40.692210 75498 usertrap_amd64.go:225] [ 362: 362] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.694511 75498 usertrap_amd64.go:212] [ 362: 362] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.694558 75498 usertrap_amd64.go:122] [ 362: 362] Allocate a new trap: 0xc0015bc3f0 10 D0725 14:31:40.694634 75498 usertrap_amd64.go:225] [ 362: 362] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.695477 75498 usertrap_amd64.go:212] [ 362: 362] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.695519 75498 usertrap_amd64.go:122] [ 362: 362] Allocate a new trap: 0xc0015bc3f0 11 D0725 14:31:40.695584 75498 usertrap_amd64.go:225] [ 362: 362] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.696783 75498 usertrap_amd64.go:212] [ 362: 362] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.696822 75498 usertrap_amd64.go:122] [ 362: 362] Allocate a new trap: 0xc0015bc3f0 12 D0725 14:31:40.696873 75498 usertrap_amd64.go:225] [ 362: 362] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.698365 75498 usertrap_amd64.go:212] [ 362: 362] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.698415 75498 usertrap_amd64.go:122] [ 362: 362] Allocate a new trap: 0xc0015bc3f0 13 D0725 14:31:40.698467 75498 usertrap_amd64.go:225] [ 362: 362] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.698723 75498 usertrap_amd64.go:212] [ 362: 362] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.698797 75498 usertrap_amd64.go:122] [ 362: 362] Allocate a new trap: 0xc0015bc3f0 14 D0725 14:31:40.698889 75498 usertrap_amd64.go:225] [ 362: 362] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.720762 75498 task_signals.go:470] [ 363: 363] Notified of signal 56 D0725 14:31:40.720883 75498 task_signals.go:204] [ 363: 363] Signal 363, PID: 363, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.720976 75498 task_exit.go:204] [ 363: 363] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.722372 75498 task_exit.go:204] [ 363: 363] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.723119 75498 task_exit.go:204] [ 362: 362] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.725254 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.725338 75498 task_exit.go:204] [ 362: 362] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.725397 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.725455 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.725412 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.725689 75498 task_exit.go:204] [ 362: 362] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.728987 75498 usertrap_amd64.go:212] [ 364: 364] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.729078 75498 usertrap_amd64.go:122] [ 364: 364] Allocate a new trap: 0xc0015bc930 9 D0725 14:31:40.729408 75498 usertrap_amd64.go:225] [ 364: 364] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.731863 75498 usertrap_amd64.go:212] [ 364: 364] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.731929 75498 usertrap_amd64.go:122] [ 364: 364] Allocate a new trap: 0xc0015bc930 10 D0725 14:31:40.731996 75498 usertrap_amd64.go:225] [ 364: 364] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.732937 75498 usertrap_amd64.go:212] [ 364: 364] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.733001 75498 usertrap_amd64.go:122] [ 364: 364] Allocate a new trap: 0xc0015bc930 11 D0725 14:31:40.733074 75498 usertrap_amd64.go:225] [ 364: 364] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.734332 75498 usertrap_amd64.go:212] [ 364: 364] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.734394 75498 usertrap_amd64.go:122] [ 364: 364] Allocate a new trap: 0xc0015bc930 12 D0725 14:31:40.734445 75498 usertrap_amd64.go:225] [ 364: 364] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.735965 75498 usertrap_amd64.go:212] [ 364: 364] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.736010 75498 usertrap_amd64.go:122] [ 364: 364] Allocate a new trap: 0xc0015bc930 13 D0725 14:31:40.736054 75498 usertrap_amd64.go:225] [ 364: 364] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.736289 75498 usertrap_amd64.go:212] [ 364: 364] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.736338 75498 usertrap_amd64.go:122] [ 364: 364] Allocate a new trap: 0xc0015bc930 14 D0725 14:31:40.736388 75498 usertrap_amd64.go:225] [ 364: 364] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.757219 75498 task_signals.go:470] [ 365: 365] Notified of signal 56 D0725 14:31:40.757322 75498 task_signals.go:204] [ 365: 365] Signal 365, PID: 365, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.757425 75498 task_exit.go:204] [ 365: 365] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.759103 75498 task_exit.go:204] [ 365: 365] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.760003 75498 task_exit.go:204] [ 364: 364] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.761724 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.761782 75498 task_exit.go:204] [ 364: 364] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.761859 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.762026 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.762125 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.762288 75498 task_exit.go:204] [ 364: 364] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.765210 75498 usertrap_amd64.go:212] [ 366: 366] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.765298 75498 usertrap_amd64.go:122] [ 366: 366] Allocate a new trap: 0xc001899440 9 D0725 14:31:40.765703 75498 usertrap_amd64.go:225] [ 366: 366] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.768267 75498 usertrap_amd64.go:212] [ 366: 366] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.768319 75498 usertrap_amd64.go:122] [ 366: 366] Allocate a new trap: 0xc001899440 10 D0725 14:31:40.768369 75498 usertrap_amd64.go:225] [ 366: 366] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.769279 75498 usertrap_amd64.go:212] [ 366: 366] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.769333 75498 usertrap_amd64.go:122] [ 366: 366] Allocate a new trap: 0xc001899440 11 D0725 14:31:40.769386 75498 usertrap_amd64.go:225] [ 366: 366] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.770568 75498 usertrap_amd64.go:212] [ 366: 366] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.770611 75498 usertrap_amd64.go:122] [ 366: 366] Allocate a new trap: 0xc001899440 12 D0725 14:31:40.770661 75498 usertrap_amd64.go:225] [ 366: 366] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.772147 75498 usertrap_amd64.go:212] [ 366: 366] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.772193 75498 usertrap_amd64.go:122] [ 366: 366] Allocate a new trap: 0xc001899440 13 D0725 14:31:40.772247 75498 usertrap_amd64.go:225] [ 366: 366] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.772475 75498 usertrap_amd64.go:212] [ 366: 366] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.772534 75498 usertrap_amd64.go:122] [ 366: 366] Allocate a new trap: 0xc001899440 14 D0725 14:31:40.772585 75498 usertrap_amd64.go:225] [ 366: 366] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.793881 75498 task_signals.go:470] [ 367: 367] Notified of signal 56 D0725 14:31:40.794019 75498 task_signals.go:204] [ 367: 367] Signal 367, PID: 367, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.794114 75498 task_exit.go:204] [ 367: 367] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.795510 75498 task_exit.go:204] [ 367: 367] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.796266 75498 task_exit.go:204] [ 366: 366] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.798021 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.798091 75498 task_exit.go:204] [ 366: 366] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.798124 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.798148 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.798169 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.798673 75498 task_exit.go:204] [ 366: 366] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.801067 75498 usertrap_amd64.go:212] [ 368: 368] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.801126 75498 usertrap_amd64.go:122] [ 368: 368] Allocate a new trap: 0xc001899aa0 9 D0725 14:31:40.801387 75498 usertrap_amd64.go:225] [ 368: 368] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.803216 75498 usertrap_amd64.go:212] [ 368: 368] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.803280 75498 usertrap_amd64.go:122] [ 368: 368] Allocate a new trap: 0xc001899aa0 10 D0725 14:31:40.803353 75498 usertrap_amd64.go:225] [ 368: 368] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.804213 75498 usertrap_amd64.go:212] [ 368: 368] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.804256 75498 usertrap_amd64.go:122] [ 368: 368] Allocate a new trap: 0xc001899aa0 11 D0725 14:31:40.804338 75498 usertrap_amd64.go:225] [ 368: 368] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.805433 75498 usertrap_amd64.go:212] [ 368: 368] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.805478 75498 usertrap_amd64.go:122] [ 368: 368] Allocate a new trap: 0xc001899aa0 12 D0725 14:31:40.805556 75498 usertrap_amd64.go:225] [ 368: 368] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.806869 75498 usertrap_amd64.go:212] [ 368: 368] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.806913 75498 usertrap_amd64.go:122] [ 368: 368] Allocate a new trap: 0xc001899aa0 13 D0725 14:31:40.806975 75498 usertrap_amd64.go:225] [ 368: 368] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.807174 75498 usertrap_amd64.go:212] [ 368: 368] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.807223 75498 usertrap_amd64.go:122] [ 368: 368] Allocate a new trap: 0xc001899aa0 14 D0725 14:31:40.807296 75498 usertrap_amd64.go:225] [ 368: 368] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.828139 75498 task_signals.go:470] [ 369: 369] Notified of signal 56 D0725 14:31:40.828358 75498 task_signals.go:204] [ 369: 369] Signal 369, PID: 369, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.828449 75498 task_exit.go:204] [ 369: 369] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.830141 75498 task_exit.go:204] [ 369: 369] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.830429 75498 task_exit.go:204] [ 368: 368] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.832334 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.832425 75498 task_exit.go:204] [ 368: 368] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.832482 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.832507 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.832527 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.833378 75498 task_exit.go:204] [ 368: 368] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.836082 75498 usertrap_amd64.go:212] [ 370: 370] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.836159 75498 usertrap_amd64.go:122] [ 370: 370] Allocate a new trap: 0xc0002de1e0 9 D0725 14:31:40.836497 75498 usertrap_amd64.go:225] [ 370: 370] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.838201 75498 usertrap_amd64.go:212] [ 370: 370] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.838245 75498 usertrap_amd64.go:122] [ 370: 370] Allocate a new trap: 0xc0002de1e0 10 D0725 14:31:40.838326 75498 usertrap_amd64.go:225] [ 370: 370] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.839103 75498 usertrap_amd64.go:212] [ 370: 370] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.839141 75498 usertrap_amd64.go:122] [ 370: 370] Allocate a new trap: 0xc0002de1e0 11 D0725 14:31:40.839190 75498 usertrap_amd64.go:225] [ 370: 370] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.840144 75498 usertrap_amd64.go:212] [ 370: 370] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.840181 75498 usertrap_amd64.go:122] [ 370: 370] Allocate a new trap: 0xc0002de1e0 12 D0725 14:31:40.840257 75498 usertrap_amd64.go:225] [ 370: 370] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.841684 75498 usertrap_amd64.go:212] [ 370: 370] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.841735 75498 usertrap_amd64.go:122] [ 370: 370] Allocate a new trap: 0xc0002de1e0 13 D0725 14:31:40.841795 75498 usertrap_amd64.go:225] [ 370: 370] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.841963 75498 usertrap_amd64.go:212] [ 370: 370] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.842006 75498 usertrap_amd64.go:122] [ 370: 370] Allocate a new trap: 0xc0002de1e0 14 D0725 14:31:40.842044 75498 usertrap_amd64.go:225] [ 370: 370] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.862222 75498 task_signals.go:470] [ 371: 371] Notified of signal 56 D0725 14:31:40.862346 75498 task_signals.go:204] [ 371: 371] Signal 371, PID: 371, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.862441 75498 task_exit.go:204] [ 371: 371] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.863804 75498 task_exit.go:204] [ 371: 371] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.864238 75498 task_exit.go:204] [ 370: 370] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.866252 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.866327 75498 task_exit.go:204] [ 370: 370] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.866363 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.866395 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.866405 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.867087 75498 task_exit.go:204] [ 370: 370] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.869696 75498 usertrap_amd64.go:212] [ 372: 372] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.869763 75498 usertrap_amd64.go:122] [ 372: 372] Allocate a new trap: 0xc0002def00 9 D0725 14:31:40.870046 75498 usertrap_amd64.go:225] [ 372: 372] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.872412 75498 usertrap_amd64.go:212] [ 372: 372] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.872465 75498 usertrap_amd64.go:122] [ 372: 372] Allocate a new trap: 0xc0002def00 10 D0725 14:31:40.872542 75498 usertrap_amd64.go:225] [ 372: 372] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.873529 75498 usertrap_amd64.go:212] [ 372: 372] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.873589 75498 usertrap_amd64.go:122] [ 372: 372] Allocate a new trap: 0xc0002def00 11 D0725 14:31:40.873637 75498 usertrap_amd64.go:225] [ 372: 372] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.874875 75498 usertrap_amd64.go:212] [ 372: 372] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.874924 75498 usertrap_amd64.go:122] [ 372: 372] Allocate a new trap: 0xc0002def00 12 D0725 14:31:40.874994 75498 usertrap_amd64.go:225] [ 372: 372] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.876701 75498 usertrap_amd64.go:212] [ 372: 372] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.876754 75498 usertrap_amd64.go:122] [ 372: 372] Allocate a new trap: 0xc0002def00 13 D0725 14:31:40.876814 75498 usertrap_amd64.go:225] [ 372: 372] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.876994 75498 usertrap_amd64.go:212] [ 372: 372] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.877051 75498 usertrap_amd64.go:122] [ 372: 372] Allocate a new trap: 0xc0002def00 14 D0725 14:31:40.877117 75498 usertrap_amd64.go:225] [ 372: 372] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.897129 75498 task_signals.go:470] [ 373: 373] Notified of signal 56 D0725 14:31:40.897333 75498 task_signals.go:204] [ 373: 373] Signal 373, PID: 373, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.897412 75498 task_exit.go:204] [ 373: 373] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.898898 75498 task_exit.go:204] [ 373: 373] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.899367 75498 task_exit.go:204] [ 372: 372] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.901266 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.901338 75498 task_exit.go:204] [ 372: 372] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.901384 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.901486 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.901545 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.902191 75498 task_exit.go:204] [ 372: 372] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.904598 75498 usertrap_amd64.go:212] [ 374: 374] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.904672 75498 usertrap_amd64.go:122] [ 374: 374] Allocate a new trap: 0xc001899c80 9 D0725 14:31:40.904943 75498 usertrap_amd64.go:225] [ 374: 374] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.906858 75498 usertrap_amd64.go:212] [ 374: 374] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.906899 75498 usertrap_amd64.go:122] [ 374: 374] Allocate a new trap: 0xc001899c80 10 D0725 14:31:40.906941 75498 usertrap_amd64.go:225] [ 374: 374] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.907785 75498 usertrap_amd64.go:212] [ 374: 374] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.907844 75498 usertrap_amd64.go:122] [ 374: 374] Allocate a new trap: 0xc001899c80 11 D0725 14:31:40.907885 75498 usertrap_amd64.go:225] [ 374: 374] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.908986 75498 usertrap_amd64.go:212] [ 374: 374] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.909024 75498 usertrap_amd64.go:122] [ 374: 374] Allocate a new trap: 0xc001899c80 12 D0725 14:31:40.909074 75498 usertrap_amd64.go:225] [ 374: 374] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.910535 75498 usertrap_amd64.go:212] [ 374: 374] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.910575 75498 usertrap_amd64.go:122] [ 374: 374] Allocate a new trap: 0xc001899c80 13 D0725 14:31:40.910616 75498 usertrap_amd64.go:225] [ 374: 374] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.910775 75498 usertrap_amd64.go:212] [ 374: 374] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.910809 75498 usertrap_amd64.go:122] [ 374: 374] Allocate a new trap: 0xc001899c80 14 D0725 14:31:40.910851 75498 usertrap_amd64.go:225] [ 374: 374] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.931563 75498 task_signals.go:470] [ 375: 375] Notified of signal 56 D0725 14:31:40.931829 75498 task_signals.go:204] [ 375: 375] Signal 375, PID: 375, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.931924 75498 task_exit.go:204] [ 375: 375] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.933445 75498 task_exit.go:204] [ 375: 375] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.933880 75498 task_exit.go:204] [ 374: 374] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.935869 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.935933 75498 task_exit.go:204] [ 374: 374] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.936000 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.936031 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.936099 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.936880 75498 task_exit.go:204] [ 374: 374] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.939446 75498 usertrap_amd64.go:212] [ 376: 376] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.939518 75498 usertrap_amd64.go:122] [ 376: 376] Allocate a new trap: 0xc0002dfb30 9 D0725 14:31:40.939870 75498 usertrap_amd64.go:225] [ 376: 376] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.941968 75498 usertrap_amd64.go:212] [ 376: 376] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.942044 75498 usertrap_amd64.go:122] [ 376: 376] Allocate a new trap: 0xc0002dfb30 10 D0725 14:31:40.942099 75498 usertrap_amd64.go:225] [ 376: 376] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.943058 75498 usertrap_amd64.go:212] [ 376: 376] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.943107 75498 usertrap_amd64.go:122] [ 376: 376] Allocate a new trap: 0xc0002dfb30 11 D0725 14:31:40.943165 75498 usertrap_amd64.go:225] [ 376: 376] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.944210 75498 usertrap_amd64.go:212] [ 376: 376] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.944253 75498 usertrap_amd64.go:122] [ 376: 376] Allocate a new trap: 0xc0002dfb30 12 D0725 14:31:40.944293 75498 usertrap_amd64.go:225] [ 376: 376] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.945695 75498 usertrap_amd64.go:212] [ 376: 376] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.945761 75498 usertrap_amd64.go:122] [ 376: 376] Allocate a new trap: 0xc0002dfb30 13 D0725 14:31:40.945837 75498 usertrap_amd64.go:225] [ 376: 376] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.946014 75498 usertrap_amd64.go:212] [ 376: 376] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.946050 75498 usertrap_amd64.go:122] [ 376: 376] Allocate a new trap: 0xc0002dfb30 14 D0725 14:31:40.946097 75498 usertrap_amd64.go:225] [ 376: 376] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:40.967022 75498 task_signals.go:470] [ 377: 377] Notified of signal 56 D0725 14:31:40.967111 75498 task_signals.go:204] [ 377: 377] Signal 377, PID: 377, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:40.967217 75498 task_exit.go:204] [ 377: 377] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.968760 75498 task_exit.go:204] [ 377: 377] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.969186 75498 task_exit.go:204] [ 376: 376] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:40.970797 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:40.970862 75498 task_exit.go:204] [ 376: 376] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:40.970929 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:40.970942 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:40.970980 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:40.971037 75498 task_exit.go:204] [ 376: 376] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:40.973528 75498 usertrap_amd64.go:212] [ 378: 378] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:40.973601 75498 usertrap_amd64.go:122] [ 378: 378] Allocate a new trap: 0xc003e0d290 9 D0725 14:31:40.973889 75498 usertrap_amd64.go:225] [ 378: 378] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:40.975744 75498 usertrap_amd64.go:212] [ 378: 378] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:40.975785 75498 usertrap_amd64.go:122] [ 378: 378] Allocate a new trap: 0xc003e0d290 10 D0725 14:31:40.975837 75498 usertrap_amd64.go:225] [ 378: 378] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:40.976763 75498 usertrap_amd64.go:212] [ 378: 378] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:40.976806 75498 usertrap_amd64.go:122] [ 378: 378] Allocate a new trap: 0xc003e0d290 11 D0725 14:31:40.976849 75498 usertrap_amd64.go:225] [ 378: 378] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:40.977827 75498 usertrap_amd64.go:212] [ 378: 378] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:40.977883 75498 usertrap_amd64.go:122] [ 378: 378] Allocate a new trap: 0xc003e0d290 12 D0725 14:31:40.977960 75498 usertrap_amd64.go:225] [ 378: 378] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:40.979303 75498 usertrap_amd64.go:212] [ 378: 378] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:40.979351 75498 usertrap_amd64.go:122] [ 378: 378] Allocate a new trap: 0xc003e0d290 13 D0725 14:31:40.979392 75498 usertrap_amd64.go:225] [ 378: 378] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:40.979564 75498 usertrap_amd64.go:212] [ 378: 378] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:40.979599 75498 usertrap_amd64.go:122] [ 378: 378] Allocate a new trap: 0xc003e0d290 14 D0725 14:31:40.979686 75498 usertrap_amd64.go:225] [ 378: 378] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.000027 75498 task_signals.go:470] [ 379: 379] Notified of signal 56 D0725 14:31:41.000139 75498 task_signals.go:204] [ 379: 379] Signal 379, PID: 379, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.000259 75498 task_exit.go:204] [ 379: 379] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.001662 75498 task_exit.go:204] [ 379: 379] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.002297 75498 task_exit.go:204] [ 378: 378] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.003918 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.003992 75498 task_exit.go:204] [ 378: 378] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.004035 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.004066 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.004081 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.005237 75498 task_exit.go:204] [ 378: 378] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.007840 75498 usertrap_amd64.go:212] [ 380: 380] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.007929 75498 usertrap_amd64.go:122] [ 380: 380] Allocate a new trap: 0xc000bdd860 9 D0725 14:31:41.008257 75498 usertrap_amd64.go:225] [ 380: 380] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.010222 75498 usertrap_amd64.go:212] [ 380: 380] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.010268 75498 usertrap_amd64.go:122] [ 380: 380] Allocate a new trap: 0xc000bdd860 10 D0725 14:31:41.010313 75498 usertrap_amd64.go:225] [ 380: 380] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.011302 75498 usertrap_amd64.go:212] [ 380: 380] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.011363 75498 usertrap_amd64.go:122] [ 380: 380] Allocate a new trap: 0xc000bdd860 11 D0725 14:31:41.011429 75498 usertrap_amd64.go:225] [ 380: 380] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.012580 75498 usertrap_amd64.go:212] [ 380: 380] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.012624 75498 usertrap_amd64.go:122] [ 380: 380] Allocate a new trap: 0xc000bdd860 12 D0725 14:31:41.012669 75498 usertrap_amd64.go:225] [ 380: 380] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.014015 75498 usertrap_amd64.go:212] [ 380: 380] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.014056 75498 usertrap_amd64.go:122] [ 380: 380] Allocate a new trap: 0xc000bdd860 13 D0725 14:31:41.014096 75498 usertrap_amd64.go:225] [ 380: 380] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.014294 75498 usertrap_amd64.go:212] [ 380: 380] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.014330 75498 usertrap_amd64.go:122] [ 380: 380] Allocate a new trap: 0xc000bdd860 14 D0725 14:31:41.014382 75498 usertrap_amd64.go:225] [ 380: 380] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.034038 75498 task_signals.go:470] [ 381: 381] Notified of signal 56 D0725 14:31:41.034145 75498 task_signals.go:204] [ 381: 381] Signal 381, PID: 381, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.034248 75498 task_exit.go:204] [ 381: 381] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.035730 75498 task_exit.go:204] [ 381: 381] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.036177 75498 task_exit.go:204] [ 380: 380] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.037818 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.037893 75498 task_exit.go:204] [ 380: 380] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.037936 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.037963 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.037983 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.038871 75498 task_exit.go:204] [ 380: 380] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.041409 75498 usertrap_amd64.go:212] [ 382: 382] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.041495 75498 usertrap_amd64.go:122] [ 382: 382] Allocate a new trap: 0xc0002dfce0 9 D0725 14:31:41.041824 75498 usertrap_amd64.go:225] [ 382: 382] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.043937 75498 usertrap_amd64.go:212] [ 382: 382] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.043988 75498 usertrap_amd64.go:122] [ 382: 382] Allocate a new trap: 0xc0002dfce0 10 D0725 14:31:41.044077 75498 usertrap_amd64.go:225] [ 382: 382] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.045037 75498 usertrap_amd64.go:212] [ 382: 382] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.045087 75498 usertrap_amd64.go:122] [ 382: 382] Allocate a new trap: 0xc0002dfce0 11 D0725 14:31:41.045158 75498 usertrap_amd64.go:225] [ 382: 382] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.046382 75498 usertrap_amd64.go:212] [ 382: 382] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.046443 75498 usertrap_amd64.go:122] [ 382: 382] Allocate a new trap: 0xc0002dfce0 12 D0725 14:31:41.046512 75498 usertrap_amd64.go:225] [ 382: 382] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.048064 75498 usertrap_amd64.go:212] [ 382: 382] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.048129 75498 usertrap_amd64.go:122] [ 382: 382] Allocate a new trap: 0xc0002dfce0 13 D0725 14:31:41.048196 75498 usertrap_amd64.go:225] [ 382: 382] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.048419 75498 usertrap_amd64.go:212] [ 382: 382] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.048458 75498 usertrap_amd64.go:122] [ 382: 382] Allocate a new trap: 0xc0002dfce0 14 D0725 14:31:41.048538 75498 usertrap_amd64.go:225] [ 382: 382] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.069031 75498 task_signals.go:470] [ 383: 383] Notified of signal 56 D0725 14:31:41.069138 75498 task_signals.go:204] [ 383: 383] Signal 383, PID: 383, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.069227 75498 task_exit.go:204] [ 383: 383] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.070791 75498 task_exit.go:204] [ 383: 383] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.071231 75498 task_exit.go:204] [ 382: 382] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.073272 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.073346 75498 task_exit.go:204] [ 382: 382] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.073418 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.073446 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.073506 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.074314 75498 task_exit.go:204] [ 382: 382] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.077027 75498 usertrap_amd64.go:212] [ 384: 384] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.077108 75498 usertrap_amd64.go:122] [ 384: 384] Allocate a new trap: 0xc003e0da10 9 D0725 14:31:41.077421 75498 usertrap_amd64.go:225] [ 384: 384] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.079682 75498 usertrap_amd64.go:212] [ 384: 384] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.079735 75498 usertrap_amd64.go:122] [ 384: 384] Allocate a new trap: 0xc003e0da10 10 D0725 14:31:41.079825 75498 usertrap_amd64.go:225] [ 384: 384] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.080794 75498 usertrap_amd64.go:212] [ 384: 384] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.080850 75498 usertrap_amd64.go:122] [ 384: 384] Allocate a new trap: 0xc003e0da10 11 D0725 14:31:41.080905 75498 usertrap_amd64.go:225] [ 384: 384] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.082126 75498 usertrap_amd64.go:212] [ 384: 384] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.082174 75498 usertrap_amd64.go:122] [ 384: 384] Allocate a new trap: 0xc003e0da10 12 D0725 14:31:41.082225 75498 usertrap_amd64.go:225] [ 384: 384] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.083718 75498 usertrap_amd64.go:212] [ 384: 384] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.083769 75498 usertrap_amd64.go:122] [ 384: 384] Allocate a new trap: 0xc003e0da10 13 D0725 14:31:41.083824 75498 usertrap_amd64.go:225] [ 384: 384] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.084006 75498 usertrap_amd64.go:212] [ 384: 384] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.084061 75498 usertrap_amd64.go:122] [ 384: 384] Allocate a new trap: 0xc003e0da10 14 D0725 14:31:41.084122 75498 usertrap_amd64.go:225] [ 384: 384] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.106101 75498 task_signals.go:470] [ 385: 385] Notified of signal 56 D0725 14:31:41.106380 75498 task_signals.go:204] [ 385: 385] Signal 385, PID: 385, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.106501 75498 task_exit.go:204] [ 385: 385] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.108090 75498 task_exit.go:204] [ 385: 385] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.108351 75498 task_exit.go:204] [ 384: 384] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.110199 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.110303 75498 task_exit.go:204] [ 384: 384] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.110363 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.110373 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.110409 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.110474 75498 task_exit.go:204] [ 384: 384] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.113093 75498 usertrap_amd64.go:212] [ 386: 386] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.113161 75498 usertrap_amd64.go:122] [ 386: 386] Allocate a new trap: 0xc003e0dec0 9 D0725 14:31:41.113472 75498 usertrap_amd64.go:225] [ 386: 386] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.115405 75498 usertrap_amd64.go:212] [ 386: 386] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.115462 75498 usertrap_amd64.go:122] [ 386: 386] Allocate a new trap: 0xc003e0dec0 10 D0725 14:31:41.115524 75498 usertrap_amd64.go:225] [ 386: 386] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.116368 75498 usertrap_amd64.go:212] [ 386: 386] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.116416 75498 usertrap_amd64.go:122] [ 386: 386] Allocate a new trap: 0xc003e0dec0 11 D0725 14:31:41.116459 75498 usertrap_amd64.go:225] [ 386: 386] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.117463 75498 usertrap_amd64.go:212] [ 386: 386] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.117512 75498 usertrap_amd64.go:122] [ 386: 386] Allocate a new trap: 0xc003e0dec0 12 D0725 14:31:41.117566 75498 usertrap_amd64.go:225] [ 386: 386] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.119128 75498 usertrap_amd64.go:212] [ 386: 386] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.119177 75498 usertrap_amd64.go:122] [ 386: 386] Allocate a new trap: 0xc003e0dec0 13 D0725 14:31:41.119224 75498 usertrap_amd64.go:225] [ 386: 386] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.119408 75498 usertrap_amd64.go:212] [ 386: 386] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.119443 75498 usertrap_amd64.go:122] [ 386: 386] Allocate a new trap: 0xc003e0dec0 14 D0725 14:31:41.119518 75498 usertrap_amd64.go:225] [ 386: 386] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.140115 75498 task_signals.go:470] [ 387: 387] Notified of signal 56 D0725 14:31:41.140316 75498 task_signals.go:204] [ 387: 387] Signal 387, PID: 387, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.140462 75498 task_exit.go:204] [ 387: 387] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.142344 75498 task_exit.go:204] [ 387: 387] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.142596 75498 task_exit.go:204] [ 386: 386] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.144672 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.144749 75498 task_exit.go:204] [ 386: 386] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.144805 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.144881 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.144945 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.145854 75498 task_exit.go:204] [ 386: 386] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.148506 75498 usertrap_amd64.go:212] [ 388: 388] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.148595 75498 usertrap_amd64.go:122] [ 388: 388] Allocate a new trap: 0xc0002dfe60 9 D0725 14:31:41.148948 75498 usertrap_amd64.go:225] [ 388: 388] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.150877 75498 usertrap_amd64.go:212] [ 388: 388] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.150925 75498 usertrap_amd64.go:122] [ 388: 388] Allocate a new trap: 0xc0002dfe60 10 D0725 14:31:41.150982 75498 usertrap_amd64.go:225] [ 388: 388] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.151860 75498 usertrap_amd64.go:212] [ 388: 388] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.151902 75498 usertrap_amd64.go:122] [ 388: 388] Allocate a new trap: 0xc0002dfe60 11 D0725 14:31:41.151942 75498 usertrap_amd64.go:225] [ 388: 388] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.153441 75498 usertrap_amd64.go:212] [ 388: 388] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.153534 75498 usertrap_amd64.go:122] [ 388: 388] Allocate a new trap: 0xc0002dfe60 12 D0725 14:31:41.153614 75498 usertrap_amd64.go:225] [ 388: 388] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.155740 75498 usertrap_amd64.go:212] [ 388: 388] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.155793 75498 usertrap_amd64.go:122] [ 388: 388] Allocate a new trap: 0xc0002dfe60 13 D0725 14:31:41.155839 75498 usertrap_amd64.go:225] [ 388: 388] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.156041 75498 usertrap_amd64.go:212] [ 388: 388] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.156082 75498 usertrap_amd64.go:122] [ 388: 388] Allocate a new trap: 0xc0002dfe60 14 D0725 14:31:41.156135 75498 usertrap_amd64.go:225] [ 388: 388] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.179431 75498 task_signals.go:470] [ 389: 389] Notified of signal 56 D0725 14:31:41.179672 75498 task_signals.go:204] [ 389: 389] Signal 389, PID: 389, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.179758 75498 task_exit.go:204] [ 389: 389] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.181608 75498 task_exit.go:204] [ 389: 389] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.182377 75498 task_exit.go:204] [ 388: 388] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.184531 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.184697 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.184729 75498 task_exit.go:204] [ 388: 388] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.184755 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.184780 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.184903 75498 task_exit.go:204] [ 388: 388] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.187965 75498 usertrap_amd64.go:212] [ 390: 390] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.188030 75498 usertrap_amd64.go:122] [ 390: 390] Allocate a new trap: 0xc005fc0180 9 D0725 14:31:41.188289 75498 usertrap_amd64.go:225] [ 390: 390] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.190293 75498 usertrap_amd64.go:212] [ 390: 390] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.190350 75498 usertrap_amd64.go:122] [ 390: 390] Allocate a new trap: 0xc005fc0180 10 D0725 14:31:41.190401 75498 usertrap_amd64.go:225] [ 390: 390] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.191171 75498 usertrap_amd64.go:212] [ 390: 390] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.191219 75498 usertrap_amd64.go:122] [ 390: 390] Allocate a new trap: 0xc005fc0180 11 D0725 14:31:41.191258 75498 usertrap_amd64.go:225] [ 390: 390] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.192202 75498 usertrap_amd64.go:212] [ 390: 390] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.192242 75498 usertrap_amd64.go:122] [ 390: 390] Allocate a new trap: 0xc005fc0180 12 D0725 14:31:41.192282 75498 usertrap_amd64.go:225] [ 390: 390] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.193652 75498 usertrap_amd64.go:212] [ 390: 390] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.193702 75498 usertrap_amd64.go:122] [ 390: 390] Allocate a new trap: 0xc005fc0180 13 D0725 14:31:41.193744 75498 usertrap_amd64.go:225] [ 390: 390] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.193891 75498 usertrap_amd64.go:212] [ 390: 390] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.193924 75498 usertrap_amd64.go:122] [ 390: 390] Allocate a new trap: 0xc005fc0180 14 D0725 14:31:41.193969 75498 usertrap_amd64.go:225] [ 390: 390] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.214720 75498 task_signals.go:470] [ 391: 391] Notified of signal 56 D0725 14:31:41.214969 75498 task_signals.go:204] [ 391: 391] Signal 391, PID: 391, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.215070 75498 task_exit.go:204] [ 391: 391] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.216746 75498 task_exit.go:204] [ 391: 391] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.217372 75498 task_exit.go:204] [ 390: 390] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.219338 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.219425 75498 task_exit.go:204] [ 390: 390] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.219518 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.219564 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.219651 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.219989 75498 task_exit.go:204] [ 390: 390] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.222734 75498 usertrap_amd64.go:212] [ 392: 392] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.222815 75498 usertrap_amd64.go:122] [ 392: 392] Allocate a new trap: 0xc005fc0db0 9 D0725 14:31:41.223123 75498 usertrap_amd64.go:225] [ 392: 392] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.225806 75498 usertrap_amd64.go:212] [ 392: 392] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.225871 75498 usertrap_amd64.go:122] [ 392: 392] Allocate a new trap: 0xc005fc0db0 10 D0725 14:31:41.225965 75498 usertrap_amd64.go:225] [ 392: 392] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.226927 75498 usertrap_amd64.go:212] [ 392: 392] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.226969 75498 usertrap_amd64.go:122] [ 392: 392] Allocate a new trap: 0xc005fc0db0 11 D0725 14:31:41.227029 75498 usertrap_amd64.go:225] [ 392: 392] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.228259 75498 usertrap_amd64.go:212] [ 392: 392] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.228301 75498 usertrap_amd64.go:122] [ 392: 392] Allocate a new trap: 0xc005fc0db0 12 D0725 14:31:41.228378 75498 usertrap_amd64.go:225] [ 392: 392] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.229938 75498 usertrap_amd64.go:212] [ 392: 392] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.229990 75498 usertrap_amd64.go:122] [ 392: 392] Allocate a new trap: 0xc005fc0db0 13 D0725 14:31:41.230047 75498 usertrap_amd64.go:225] [ 392: 392] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.230289 75498 usertrap_amd64.go:212] [ 392: 392] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.230363 75498 usertrap_amd64.go:122] [ 392: 392] Allocate a new trap: 0xc005fc0db0 14 D0725 14:31:41.230418 75498 usertrap_amd64.go:225] [ 392: 392] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.253068 75498 task_signals.go:470] [ 393: 393] Notified of signal 56 D0725 14:31:41.253162 75498 task_signals.go:204] [ 393: 393] Signal 393, PID: 393, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.253231 75498 task_exit.go:204] [ 393: 393] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.254711 75498 task_exit.go:204] [ 393: 393] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.255367 75498 task_exit.go:204] [ 392: 392] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.257089 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.257147 75498 task_exit.go:204] [ 392: 392] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.257192 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.257271 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.257339 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.258048 75498 task_exit.go:204] [ 392: 392] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.260899 75498 usertrap_amd64.go:212] [ 394: 394] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.260960 75498 usertrap_amd64.go:122] [ 394: 394] Allocate a new trap: 0xc005fc1350 9 D0725 14:31:41.261434 75498 usertrap_amd64.go:225] [ 394: 394] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.263977 75498 usertrap_amd64.go:212] [ 394: 394] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.264027 75498 usertrap_amd64.go:122] [ 394: 394] Allocate a new trap: 0xc005fc1350 10 D0725 14:31:41.264087 75498 usertrap_amd64.go:225] [ 394: 394] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.264977 75498 usertrap_amd64.go:212] [ 394: 394] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.265021 75498 usertrap_amd64.go:122] [ 394: 394] Allocate a new trap: 0xc005fc1350 11 D0725 14:31:41.265063 75498 usertrap_amd64.go:225] [ 394: 394] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.266188 75498 usertrap_amd64.go:212] [ 394: 394] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.266233 75498 usertrap_amd64.go:122] [ 394: 394] Allocate a new trap: 0xc005fc1350 12 D0725 14:31:41.266274 75498 usertrap_amd64.go:225] [ 394: 394] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.268027 75498 usertrap_amd64.go:212] [ 394: 394] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.268073 75498 usertrap_amd64.go:122] [ 394: 394] Allocate a new trap: 0xc005fc1350 13 D0725 14:31:41.268116 75498 usertrap_amd64.go:225] [ 394: 394] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.268285 75498 usertrap_amd64.go:212] [ 394: 394] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.268321 75498 usertrap_amd64.go:122] [ 394: 394] Allocate a new trap: 0xc005fc1350 14 D0725 14:31:41.268361 75498 usertrap_amd64.go:225] [ 394: 394] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.290876 75498 task_signals.go:470] [ 395: 395] Notified of signal 56 D0725 14:31:41.291004 75498 task_signals.go:204] [ 395: 395] Signal 395, PID: 395, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.291158 75498 task_exit.go:204] [ 395: 395] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.292680 75498 task_exit.go:204] [ 395: 395] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.293307 75498 task_exit.go:204] [ 394: 394] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.295144 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.295230 75498 task_exit.go:204] [ 394: 394] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.295290 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.295299 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.295372 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.296236 75498 task_exit.go:204] [ 394: 394] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.298967 75498 usertrap_amd64.go:212] [ 396: 396] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.299047 75498 usertrap_amd64.go:122] [ 396: 396] Allocate a new trap: 0xc0004808d0 9 D0725 14:31:41.299360 75498 usertrap_amd64.go:225] [ 396: 396] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.301554 75498 usertrap_amd64.go:212] [ 396: 396] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.301620 75498 usertrap_amd64.go:122] [ 396: 396] Allocate a new trap: 0xc0004808d0 10 D0725 14:31:41.301676 75498 usertrap_amd64.go:225] [ 396: 396] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.302556 75498 usertrap_amd64.go:212] [ 396: 396] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.302599 75498 usertrap_amd64.go:122] [ 396: 396] Allocate a new trap: 0xc0004808d0 11 D0725 14:31:41.302681 75498 usertrap_amd64.go:225] [ 396: 396] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.304184 75498 usertrap_amd64.go:212] [ 396: 396] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.304264 75498 usertrap_amd64.go:122] [ 396: 396] Allocate a new trap: 0xc0004808d0 12 D0725 14:31:41.304363 75498 usertrap_amd64.go:225] [ 396: 396] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.306222 75498 usertrap_amd64.go:212] [ 396: 396] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.306268 75498 usertrap_amd64.go:122] [ 396: 396] Allocate a new trap: 0xc0004808d0 13 D0725 14:31:41.306313 75498 usertrap_amd64.go:225] [ 396: 396] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.306498 75498 usertrap_amd64.go:212] [ 396: 396] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.306534 75498 usertrap_amd64.go:122] [ 396: 396] Allocate a new trap: 0xc0004808d0 14 D0725 14:31:41.306574 75498 usertrap_amd64.go:225] [ 396: 396] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.329666 75498 task_signals.go:470] [ 397: 397] Notified of signal 56 D0725 14:31:41.329801 75498 task_signals.go:204] [ 397: 397] Signal 397, PID: 397, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.329913 75498 task_exit.go:204] [ 397: 397] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.331520 75498 task_exit.go:204] [ 397: 397] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.332274 75498 task_exit.go:204] [ 396: 396] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.334171 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.334234 75498 task_exit.go:204] [ 396: 396] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.334275 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.334338 75498 task_exit.go:204] [ 396: 396] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.334395 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.334457 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.337140 75498 usertrap_amd64.go:212] [ 398: 398] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.337212 75498 usertrap_amd64.go:122] [ 398: 398] Allocate a new trap: 0xc000480bd0 9 D0725 14:31:41.337506 75498 usertrap_amd64.go:225] [ 398: 398] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.339721 75498 usertrap_amd64.go:212] [ 398: 398] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.339779 75498 usertrap_amd64.go:122] [ 398: 398] Allocate a new trap: 0xc000480bd0 10 D0725 14:31:41.339902 75498 usertrap_amd64.go:225] [ 398: 398] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.340910 75498 usertrap_amd64.go:212] [ 398: 398] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.340974 75498 usertrap_amd64.go:122] [ 398: 398] Allocate a new trap: 0xc000480bd0 11 D0725 14:31:41.341052 75498 usertrap_amd64.go:225] [ 398: 398] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.342269 75498 usertrap_amd64.go:212] [ 398: 398] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.342337 75498 usertrap_amd64.go:122] [ 398: 398] Allocate a new trap: 0xc000480bd0 12 D0725 14:31:41.342415 75498 usertrap_amd64.go:225] [ 398: 398] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.344068 75498 usertrap_amd64.go:212] [ 398: 398] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.344128 75498 usertrap_amd64.go:122] [ 398: 398] Allocate a new trap: 0xc000480bd0 13 D0725 14:31:41.344196 75498 usertrap_amd64.go:225] [ 398: 398] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.344459 75498 usertrap_amd64.go:212] [ 398: 398] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.344522 75498 usertrap_amd64.go:122] [ 398: 398] Allocate a new trap: 0xc000480bd0 14 D0725 14:31:41.344572 75498 usertrap_amd64.go:225] [ 398: 398] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.367903 75498 task_signals.go:470] [ 399: 399] Notified of signal 56 D0725 14:31:41.368058 75498 task_signals.go:204] [ 399: 399] Signal 399, PID: 399, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.368141 75498 task_exit.go:204] [ 399: 399] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.369981 75498 task_exit.go:204] [ 399: 399] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.370665 75498 task_exit.go:204] [ 398: 398] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.372547 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.372629 75498 task_exit.go:204] [ 398: 398] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.372692 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.372753 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.372764 75498 task_exit.go:204] [ 398: 398] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.372813 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.375565 75498 usertrap_amd64.go:212] [ 400: 400] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.375710 75498 usertrap_amd64.go:122] [ 400: 400] Allocate a new trap: 0xc005fc1800 9 D0725 14:31:41.376198 75498 usertrap_amd64.go:225] [ 400: 400] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.378894 75498 usertrap_amd64.go:212] [ 400: 400] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.378947 75498 usertrap_amd64.go:122] [ 400: 400] Allocate a new trap: 0xc005fc1800 10 D0725 14:31:41.378991 75498 usertrap_amd64.go:225] [ 400: 400] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.379771 75498 usertrap_amd64.go:212] [ 400: 400] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.379826 75498 usertrap_amd64.go:122] [ 400: 400] Allocate a new trap: 0xc005fc1800 11 D0725 14:31:41.379878 75498 usertrap_amd64.go:225] [ 400: 400] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.382872 75498 usertrap_amd64.go:212] [ 400: 400] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.382917 75498 usertrap_amd64.go:122] [ 400: 400] Allocate a new trap: 0xc005fc1800 12 D0725 14:31:41.382963 75498 usertrap_amd64.go:225] [ 400: 400] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.385048 75498 usertrap_amd64.go:212] [ 400: 400] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.385098 75498 usertrap_amd64.go:122] [ 400: 400] Allocate a new trap: 0xc005fc1800 13 D0725 14:31:41.385150 75498 usertrap_amd64.go:225] [ 400: 400] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.385304 75498 usertrap_amd64.go:212] [ 400: 400] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.385355 75498 usertrap_amd64.go:122] [ 400: 400] Allocate a new trap: 0xc005fc1800 14 D0725 14:31:41.385403 75498 usertrap_amd64.go:225] [ 400: 400] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.407919 75498 task_signals.go:470] [ 401: 401] Notified of signal 56 D0725 14:31:41.408112 75498 task_signals.go:204] [ 401: 401] Signal 401, PID: 401, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.408207 75498 task_exit.go:204] [ 401: 401] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.409737 75498 task_exit.go:204] [ 401: 401] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.410600 75498 task_exit.go:204] [ 400: 400] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.412790 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.412880 75498 task_exit.go:204] [ 400: 400] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.412944 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.412948 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.413029 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.413794 75498 task_exit.go:204] [ 400: 400] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.416490 75498 usertrap_amd64.go:212] [ 402: 402] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.416556 75498 usertrap_amd64.go:122] [ 402: 402] Allocate a new trap: 0xc0070e61b0 9 D0725 14:31:41.416895 75498 usertrap_amd64.go:225] [ 402: 402] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.418701 75498 usertrap_amd64.go:212] [ 402: 402] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.418741 75498 usertrap_amd64.go:122] [ 402: 402] Allocate a new trap: 0xc0070e61b0 10 D0725 14:31:41.418787 75498 usertrap_amd64.go:225] [ 402: 402] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.419785 75498 usertrap_amd64.go:212] [ 402: 402] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.419835 75498 usertrap_amd64.go:122] [ 402: 402] Allocate a new trap: 0xc0070e61b0 11 D0725 14:31:41.419893 75498 usertrap_amd64.go:225] [ 402: 402] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.421139 75498 usertrap_amd64.go:212] [ 402: 402] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.421192 75498 usertrap_amd64.go:122] [ 402: 402] Allocate a new trap: 0xc0070e61b0 12 D0725 14:31:41.421234 75498 usertrap_amd64.go:225] [ 402: 402] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.422835 75498 usertrap_amd64.go:212] [ 402: 402] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.422878 75498 usertrap_amd64.go:122] [ 402: 402] Allocate a new trap: 0xc0070e61b0 13 D0725 14:31:41.422918 75498 usertrap_amd64.go:225] [ 402: 402] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.423084 75498 usertrap_amd64.go:212] [ 402: 402] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.423128 75498 usertrap_amd64.go:122] [ 402: 402] Allocate a new trap: 0xc0070e61b0 14 D0725 14:31:41.423184 75498 usertrap_amd64.go:225] [ 402: 402] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.464873 75498 task_signals.go:470] [ 403: 403] Notified of signal 56 D0725 14:31:41.465155 75498 task_signals.go:204] [ 403: 403] Signal 403, PID: 403, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.465295 75498 task_exit.go:204] [ 403: 403] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.467060 75498 task_exit.go:204] [ 403: 403] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.468182 75498 task_exit.go:204] [ 402: 402] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.470341 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.470436 75498 task_exit.go:204] [ 402: 402] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.470483 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.470589 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.470662 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.471022 75498 task_exit.go:204] [ 402: 402] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.473762 75498 usertrap_amd64.go:212] [ 404: 404] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.473853 75498 usertrap_amd64.go:122] [ 404: 404] Allocate a new trap: 0xc000480960 9 D0725 14:31:41.474314 75498 usertrap_amd64.go:225] [ 404: 404] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.476589 75498 usertrap_amd64.go:212] [ 404: 404] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.476637 75498 usertrap_amd64.go:122] [ 404: 404] Allocate a new trap: 0xc000480960 10 D0725 14:31:41.476731 75498 usertrap_amd64.go:225] [ 404: 404] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.477573 75498 usertrap_amd64.go:212] [ 404: 404] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.477621 75498 usertrap_amd64.go:122] [ 404: 404] Allocate a new trap: 0xc000480960 11 D0725 14:31:41.477712 75498 usertrap_amd64.go:225] [ 404: 404] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.478749 75498 usertrap_amd64.go:212] [ 404: 404] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.478800 75498 usertrap_amd64.go:122] [ 404: 404] Allocate a new trap: 0xc000480960 12 D0725 14:31:41.478905 75498 usertrap_amd64.go:225] [ 404: 404] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.480445 75498 usertrap_amd64.go:212] [ 404: 404] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.480510 75498 usertrap_amd64.go:122] [ 404: 404] Allocate a new trap: 0xc000480960 13 D0725 14:31:41.480572 75498 usertrap_amd64.go:225] [ 404: 404] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.480771 75498 usertrap_amd64.go:212] [ 404: 404] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.480823 75498 usertrap_amd64.go:122] [ 404: 404] Allocate a new trap: 0xc000480960 14 D0725 14:31:41.480902 75498 usertrap_amd64.go:225] [ 404: 404] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.502398 75498 task_signals.go:470] [ 405: 405] Notified of signal 56 D0725 14:31:41.502558 75498 task_signals.go:204] [ 405: 405] Signal 405, PID: 405, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.502678 75498 task_exit.go:204] [ 405: 405] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.504161 75498 task_exit.go:204] [ 405: 405] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.505117 75498 task_exit.go:204] [ 404: 404] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.507339 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.507496 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.507547 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.507628 75498 task_exit.go:204] [ 404: 404] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.507746 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.508183 75498 task_exit.go:204] [ 404: 404] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.510876 75498 usertrap_amd64.go:212] [ 406: 406] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.510944 75498 usertrap_amd64.go:122] [ 406: 406] Allocate a new trap: 0xc000480ae0 9 D0725 14:31:41.511291 75498 usertrap_amd64.go:225] [ 406: 406] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.513269 75498 usertrap_amd64.go:212] [ 406: 406] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.513331 75498 usertrap_amd64.go:122] [ 406: 406] Allocate a new trap: 0xc000480ae0 10 D0725 14:31:41.513375 75498 usertrap_amd64.go:225] [ 406: 406] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.514267 75498 usertrap_amd64.go:212] [ 406: 406] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.514318 75498 usertrap_amd64.go:122] [ 406: 406] Allocate a new trap: 0xc000480ae0 11 D0725 14:31:41.514358 75498 usertrap_amd64.go:225] [ 406: 406] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.515547 75498 usertrap_amd64.go:212] [ 406: 406] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.515590 75498 usertrap_amd64.go:122] [ 406: 406] Allocate a new trap: 0xc000480ae0 12 D0725 14:31:41.515676 75498 usertrap_amd64.go:225] [ 406: 406] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.517389 75498 usertrap_amd64.go:212] [ 406: 406] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.517468 75498 usertrap_amd64.go:122] [ 406: 406] Allocate a new trap: 0xc000480ae0 13 D0725 14:31:41.517543 75498 usertrap_amd64.go:225] [ 406: 406] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.517769 75498 usertrap_amd64.go:212] [ 406: 406] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.517816 75498 usertrap_amd64.go:122] [ 406: 406] Allocate a new trap: 0xc000480ae0 14 D0725 14:31:41.517860 75498 usertrap_amd64.go:225] [ 406: 406] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.541992 75498 task_signals.go:470] [ 407: 407] Notified of signal 56 D0725 14:31:41.542159 75498 task_signals.go:204] [ 407: 407] Signal 407, PID: 407, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.542227 75498 task_exit.go:204] [ 407: 407] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.575381 75498 task_exit.go:204] [ 407: 407] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.576844 75498 task_exit.go:204] [ 406: 406] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.579264 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.579364 75498 task_exit.go:204] [ 406: 406] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.579483 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.579504 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.579636 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.580142 75498 task_exit.go:204] [ 406: 406] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.582809 75498 usertrap_amd64.go:212] [ 408: 408] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.582885 75498 usertrap_amd64.go:122] [ 408: 408] Allocate a new trap: 0xc0070e6090 9 D0725 14:31:41.583260 75498 usertrap_amd64.go:225] [ 408: 408] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.585425 75498 usertrap_amd64.go:212] [ 408: 408] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.585469 75498 usertrap_amd64.go:122] [ 408: 408] Allocate a new trap: 0xc0070e6090 10 D0725 14:31:41.585530 75498 usertrap_amd64.go:225] [ 408: 408] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.586808 75498 usertrap_amd64.go:212] [ 408: 408] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.586875 75498 usertrap_amd64.go:122] [ 408: 408] Allocate a new trap: 0xc0070e6090 11 D0725 14:31:41.586950 75498 usertrap_amd64.go:225] [ 408: 408] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.589230 75498 usertrap_amd64.go:212] [ 408: 408] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.589321 75498 usertrap_amd64.go:122] [ 408: 408] Allocate a new trap: 0xc0070e6090 12 D0725 14:31:41.589387 75498 usertrap_amd64.go:225] [ 408: 408] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.591188 75498 usertrap_amd64.go:212] [ 408: 408] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.591252 75498 usertrap_amd64.go:122] [ 408: 408] Allocate a new trap: 0xc0070e6090 13 D0725 14:31:41.591299 75498 usertrap_amd64.go:225] [ 408: 408] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.591510 75498 usertrap_amd64.go:212] [ 408: 408] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.591553 75498 usertrap_amd64.go:122] [ 408: 408] Allocate a new trap: 0xc0070e6090 14 D0725 14:31:41.591633 75498 usertrap_amd64.go:225] [ 408: 408] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.615454 75498 task_signals.go:470] [ 409: 409] Notified of signal 56 D0725 14:31:41.615675 75498 task_signals.go:204] [ 409: 409] Signal 409, PID: 409, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.615795 75498 task_exit.go:204] [ 409: 409] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.617221 75498 task_exit.go:204] [ 409: 409] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.618145 75498 task_exit.go:204] [ 408: 408] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.620398 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.620509 75498 task_exit.go:204] [ 408: 408] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.620552 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.620596 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.620588 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.621062 75498 task_exit.go:204] [ 408: 408] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.624131 75498 usertrap_amd64.go:212] [ 410: 410] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.624213 75498 usertrap_amd64.go:122] [ 410: 410] Allocate a new trap: 0xc006d38e70 9 D0725 14:31:41.624582 75498 usertrap_amd64.go:225] [ 410: 410] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.626960 75498 usertrap_amd64.go:212] [ 410: 410] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.627007 75498 usertrap_amd64.go:122] [ 410: 410] Allocate a new trap: 0xc006d38e70 10 D0725 14:31:41.627075 75498 usertrap_amd64.go:225] [ 410: 410] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.627945 75498 usertrap_amd64.go:212] [ 410: 410] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.627989 75498 usertrap_amd64.go:122] [ 410: 410] Allocate a new trap: 0xc006d38e70 11 D0725 14:31:41.628036 75498 usertrap_amd64.go:225] [ 410: 410] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.629125 75498 usertrap_amd64.go:212] [ 410: 410] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.629167 75498 usertrap_amd64.go:122] [ 410: 410] Allocate a new trap: 0xc006d38e70 12 D0725 14:31:41.629208 75498 usertrap_amd64.go:225] [ 410: 410] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.630754 75498 usertrap_amd64.go:212] [ 410: 410] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.630803 75498 usertrap_amd64.go:122] [ 410: 410] Allocate a new trap: 0xc006d38e70 13 D0725 14:31:41.630847 75498 usertrap_amd64.go:225] [ 410: 410] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.631002 75498 usertrap_amd64.go:212] [ 410: 410] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.631037 75498 usertrap_amd64.go:122] [ 410: 410] Allocate a new trap: 0xc006d38e70 14 D0725 14:31:41.631074 75498 usertrap_amd64.go:225] [ 410: 410] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.653420 75498 task_signals.go:470] [ 411: 411] Notified of signal 56 D0725 14:31:41.653608 75498 task_signals.go:204] [ 411: 411] Signal 411, PID: 411, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.653734 75498 task_exit.go:204] [ 411: 411] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.655290 75498 task_exit.go:204] [ 411: 411] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.656240 75498 task_exit.go:204] [ 410: 410] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.658261 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.658352 75498 task_exit.go:204] [ 410: 410] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.658406 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.658420 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.658459 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.659386 75498 task_exit.go:204] [ 410: 410] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.662106 75498 usertrap_amd64.go:212] [ 412: 412] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.662209 75498 usertrap_amd64.go:122] [ 412: 412] Allocate a new trap: 0xc00476a900 9 D0725 14:31:41.662583 75498 usertrap_amd64.go:225] [ 412: 412] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.665446 75498 usertrap_amd64.go:212] [ 412: 412] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.665527 75498 usertrap_amd64.go:122] [ 412: 412] Allocate a new trap: 0xc00476a900 10 D0725 14:31:41.665597 75498 usertrap_amd64.go:225] [ 412: 412] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.666706 75498 usertrap_amd64.go:212] [ 412: 412] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.666771 75498 usertrap_amd64.go:122] [ 412: 412] Allocate a new trap: 0xc00476a900 11 D0725 14:31:41.666847 75498 usertrap_amd64.go:225] [ 412: 412] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.668326 75498 usertrap_amd64.go:212] [ 412: 412] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.668382 75498 usertrap_amd64.go:122] [ 412: 412] Allocate a new trap: 0xc00476a900 12 D0725 14:31:41.668435 75498 usertrap_amd64.go:225] [ 412: 412] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.670301 75498 usertrap_amd64.go:212] [ 412: 412] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.670344 75498 usertrap_amd64.go:122] [ 412: 412] Allocate a new trap: 0xc00476a900 13 D0725 14:31:41.670407 75498 usertrap_amd64.go:225] [ 412: 412] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.670576 75498 usertrap_amd64.go:212] [ 412: 412] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.670619 75498 usertrap_amd64.go:122] [ 412: 412] Allocate a new trap: 0xc00476a900 14 D0725 14:31:41.670680 75498 usertrap_amd64.go:225] [ 412: 412] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.695152 75498 task_signals.go:470] [ 413: 413] Notified of signal 56 D0725 14:31:41.695286 75498 task_signals.go:204] [ 413: 413] Signal 413, PID: 413, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.695400 75498 task_exit.go:204] [ 413: 413] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.696850 75498 task_exit.go:204] [ 413: 413] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.697714 75498 task_exit.go:204] [ 412: 412] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.699684 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.699760 75498 task_exit.go:204] [ 412: 412] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.699819 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.699833 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.699909 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.700375 75498 task_exit.go:204] [ 412: 412] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.703096 75498 usertrap_amd64.go:212] [ 414: 414] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.703188 75498 usertrap_amd64.go:122] [ 414: 414] Allocate a new trap: 0xc006ef2060 9 D0725 14:31:41.703634 75498 usertrap_amd64.go:225] [ 414: 414] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.706144 75498 usertrap_amd64.go:212] [ 414: 414] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.706203 75498 usertrap_amd64.go:122] [ 414: 414] Allocate a new trap: 0xc006ef2060 10 D0725 14:31:41.706299 75498 usertrap_amd64.go:225] [ 414: 414] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.707558 75498 usertrap_amd64.go:212] [ 414: 414] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.707637 75498 usertrap_amd64.go:122] [ 414: 414] Allocate a new trap: 0xc006ef2060 11 D0725 14:31:41.707702 75498 usertrap_amd64.go:225] [ 414: 414] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.709143 75498 usertrap_amd64.go:212] [ 414: 414] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.709202 75498 usertrap_amd64.go:122] [ 414: 414] Allocate a new trap: 0xc006ef2060 12 D0725 14:31:41.709254 75498 usertrap_amd64.go:225] [ 414: 414] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.711098 75498 usertrap_amd64.go:212] [ 414: 414] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.711152 75498 usertrap_amd64.go:122] [ 414: 414] Allocate a new trap: 0xc006ef2060 13 D0725 14:31:41.711227 75498 usertrap_amd64.go:225] [ 414: 414] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.711508 75498 usertrap_amd64.go:212] [ 414: 414] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.711577 75498 usertrap_amd64.go:122] [ 414: 414] Allocate a new trap: 0xc006ef2060 14 D0725 14:31:41.711650 75498 usertrap_amd64.go:225] [ 414: 414] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.734316 75498 task_signals.go:470] [ 415: 415] Notified of signal 56 D0725 14:31:41.734587 75498 task_signals.go:204] [ 415: 415] Signal 415, PID: 415, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.734684 75498 task_exit.go:204] [ 415: 415] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.736504 75498 task_exit.go:204] [ 415: 415] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.737065 75498 task_exit.go:204] [ 414: 414] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.738674 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.738732 75498 task_exit.go:204] [ 414: 414] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.738769 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.738854 75498 task_exit.go:204] [ 414: 414] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.738875 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.738951 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.741992 75498 usertrap_amd64.go:212] [ 416: 416] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.742091 75498 usertrap_amd64.go:122] [ 416: 416] Allocate a new trap: 0xc000481b00 9 D0725 14:31:41.742466 75498 usertrap_amd64.go:225] [ 416: 416] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.745060 75498 usertrap_amd64.go:212] [ 416: 416] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.745113 75498 usertrap_amd64.go:122] [ 416: 416] Allocate a new trap: 0xc000481b00 10 D0725 14:31:41.745160 75498 usertrap_amd64.go:225] [ 416: 416] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.746097 75498 usertrap_amd64.go:212] [ 416: 416] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.746164 75498 usertrap_amd64.go:122] [ 416: 416] Allocate a new trap: 0xc000481b00 11 D0725 14:31:41.746227 75498 usertrap_amd64.go:225] [ 416: 416] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.747408 75498 usertrap_amd64.go:212] [ 416: 416] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.747451 75498 usertrap_amd64.go:122] [ 416: 416] Allocate a new trap: 0xc000481b00 12 D0725 14:31:41.747537 75498 usertrap_amd64.go:225] [ 416: 416] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.749283 75498 usertrap_amd64.go:212] [ 416: 416] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.749328 75498 usertrap_amd64.go:122] [ 416: 416] Allocate a new trap: 0xc000481b00 13 D0725 14:31:41.749377 75498 usertrap_amd64.go:225] [ 416: 416] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.749529 75498 usertrap_amd64.go:212] [ 416: 416] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.749565 75498 usertrap_amd64.go:122] [ 416: 416] Allocate a new trap: 0xc000481b00 14 D0725 14:31:41.749633 75498 usertrap_amd64.go:225] [ 416: 416] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.772321 75498 task_signals.go:470] [ 417: 417] Notified of signal 56 D0725 14:31:41.772529 75498 task_signals.go:204] [ 417: 417] Signal 417, PID: 417, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.772647 75498 task_exit.go:204] [ 417: 417] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.774448 75498 task_exit.go:204] [ 417: 417] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.775238 75498 task_exit.go:204] [ 416: 416] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.777238 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.777323 75498 task_exit.go:204] [ 416: 416] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.777364 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.777421 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.777489 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.777576 75498 task_exit.go:204] [ 416: 416] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.780712 75498 usertrap_amd64.go:212] [ 418: 418] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.780794 75498 usertrap_amd64.go:122] [ 418: 418] Allocate a new trap: 0xc006d39860 9 D0725 14:31:41.781161 75498 usertrap_amd64.go:225] [ 418: 418] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.783489 75498 usertrap_amd64.go:212] [ 418: 418] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.783532 75498 usertrap_amd64.go:122] [ 418: 418] Allocate a new trap: 0xc006d39860 10 D0725 14:31:41.783589 75498 usertrap_amd64.go:225] [ 418: 418] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.784344 75498 usertrap_amd64.go:212] [ 418: 418] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.784383 75498 usertrap_amd64.go:122] [ 418: 418] Allocate a new trap: 0xc006d39860 11 D0725 14:31:41.784433 75498 usertrap_amd64.go:225] [ 418: 418] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.785842 75498 usertrap_amd64.go:212] [ 418: 418] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.785922 75498 usertrap_amd64.go:122] [ 418: 418] Allocate a new trap: 0xc006d39860 12 D0725 14:31:41.785989 75498 usertrap_amd64.go:225] [ 418: 418] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.787676 75498 usertrap_amd64.go:212] [ 418: 418] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.787729 75498 usertrap_amd64.go:122] [ 418: 418] Allocate a new trap: 0xc006d39860 13 D0725 14:31:41.787789 75498 usertrap_amd64.go:225] [ 418: 418] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.788005 75498 usertrap_amd64.go:212] [ 418: 418] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.788065 75498 usertrap_amd64.go:122] [ 418: 418] Allocate a new trap: 0xc006d39860 14 D0725 14:31:41.788109 75498 usertrap_amd64.go:225] [ 418: 418] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.813081 75498 task_signals.go:470] [ 419: 419] Notified of signal 56 D0725 14:31:41.813390 75498 task_signals.go:204] [ 419: 419] Signal 419, PID: 419, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.813529 75498 task_exit.go:204] [ 419: 419] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.815046 75498 task_exit.go:204] [ 419: 419] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.815758 75498 task_exit.go:204] [ 418: 418] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.817864 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.817966 75498 task_exit.go:204] [ 418: 418] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.818018 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.818138 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.818202 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.818684 75498 task_exit.go:204] [ 418: 418] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.821270 75498 usertrap_amd64.go:212] [ 420: 420] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.821356 75498 usertrap_amd64.go:122] [ 420: 420] Allocate a new trap: 0xc00571e840 9 D0725 14:31:41.821727 75498 usertrap_amd64.go:225] [ 420: 420] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.823898 75498 usertrap_amd64.go:212] [ 420: 420] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.823955 75498 usertrap_amd64.go:122] [ 420: 420] Allocate a new trap: 0xc00571e840 10 D0725 14:31:41.824002 75498 usertrap_amd64.go:225] [ 420: 420] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.824930 75498 usertrap_amd64.go:212] [ 420: 420] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.825007 75498 usertrap_amd64.go:122] [ 420: 420] Allocate a new trap: 0xc00571e840 11 D0725 14:31:41.825075 75498 usertrap_amd64.go:225] [ 420: 420] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.826250 75498 usertrap_amd64.go:212] [ 420: 420] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.826303 75498 usertrap_amd64.go:122] [ 420: 420] Allocate a new trap: 0xc00571e840 12 D0725 14:31:41.826365 75498 usertrap_amd64.go:225] [ 420: 420] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.828292 75498 usertrap_amd64.go:212] [ 420: 420] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.828355 75498 usertrap_amd64.go:122] [ 420: 420] Allocate a new trap: 0xc00571e840 13 D0725 14:31:41.828412 75498 usertrap_amd64.go:225] [ 420: 420] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.828666 75498 usertrap_amd64.go:212] [ 420: 420] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.828705 75498 usertrap_amd64.go:122] [ 420: 420] Allocate a new trap: 0xc00571e840 14 D0725 14:31:41.828784 75498 usertrap_amd64.go:225] [ 420: 420] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.852697 75498 task_signals.go:470] [ 421: 421] Notified of signal 56 D0725 14:31:41.852836 75498 task_signals.go:204] [ 421: 421] Signal 421, PID: 421, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.852936 75498 task_exit.go:204] [ 421: 421] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.854466 75498 task_exit.go:204] [ 421: 421] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.855354 75498 task_exit.go:204] [ 420: 420] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.857324 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.857416 75498 task_exit.go:204] [ 420: 420] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.857467 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.857457 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.857559 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.857563 75498 task_exit.go:204] [ 420: 420] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.860881 75498 usertrap_amd64.go:212] [ 422: 422] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.860963 75498 usertrap_amd64.go:122] [ 422: 422] Allocate a new trap: 0xc00571f170 9 D0725 14:31:41.861321 75498 usertrap_amd64.go:225] [ 422: 422] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.863821 75498 usertrap_amd64.go:212] [ 422: 422] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.863902 75498 usertrap_amd64.go:122] [ 422: 422] Allocate a new trap: 0xc00571f170 10 D0725 14:31:41.863980 75498 usertrap_amd64.go:225] [ 422: 422] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.865196 75498 usertrap_amd64.go:212] [ 422: 422] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.865256 75498 usertrap_amd64.go:122] [ 422: 422] Allocate a new trap: 0xc00571f170 11 D0725 14:31:41.865363 75498 usertrap_amd64.go:225] [ 422: 422] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.866766 75498 usertrap_amd64.go:212] [ 422: 422] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.866820 75498 usertrap_amd64.go:122] [ 422: 422] Allocate a new trap: 0xc00571f170 12 D0725 14:31:41.866878 75498 usertrap_amd64.go:225] [ 422: 422] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.868866 75498 usertrap_amd64.go:212] [ 422: 422] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.868928 75498 usertrap_amd64.go:122] [ 422: 422] Allocate a new trap: 0xc00571f170 13 D0725 14:31:41.869013 75498 usertrap_amd64.go:225] [ 422: 422] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.869301 75498 usertrap_amd64.go:212] [ 422: 422] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.869355 75498 usertrap_amd64.go:122] [ 422: 422] Allocate a new trap: 0xc00571f170 14 D0725 14:31:41.869407 75498 usertrap_amd64.go:225] [ 422: 422] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.893871 75498 task_signals.go:470] [ 423: 423] Notified of signal 56 D0725 14:31:41.894083 75498 task_signals.go:204] [ 423: 423] Signal 423, PID: 423, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.894198 75498 task_exit.go:204] [ 423: 423] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.895689 75498 task_exit.go:204] [ 423: 423] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.896779 75498 task_exit.go:204] [ 422: 422] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.898814 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.898915 75498 task_exit.go:204] [ 422: 422] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.899023 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.899073 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.899128 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.899145 75498 task_exit.go:204] [ 422: 422] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.902165 75498 usertrap_amd64.go:212] [ 424: 424] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.902243 75498 usertrap_amd64.go:122] [ 424: 424] Allocate a new trap: 0xc003240810 9 D0725 14:31:41.902626 75498 usertrap_amd64.go:225] [ 424: 424] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.904784 75498 usertrap_amd64.go:212] [ 424: 424] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.904827 75498 usertrap_amd64.go:122] [ 424: 424] Allocate a new trap: 0xc003240810 10 D0725 14:31:41.904870 75498 usertrap_amd64.go:225] [ 424: 424] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.905835 75498 usertrap_amd64.go:212] [ 424: 424] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.905882 75498 usertrap_amd64.go:122] [ 424: 424] Allocate a new trap: 0xc003240810 11 D0725 14:31:41.905930 75498 usertrap_amd64.go:225] [ 424: 424] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.907070 75498 usertrap_amd64.go:212] [ 424: 424] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.907113 75498 usertrap_amd64.go:122] [ 424: 424] Allocate a new trap: 0xc003240810 12 D0725 14:31:41.907167 75498 usertrap_amd64.go:225] [ 424: 424] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.908553 75498 usertrap_amd64.go:212] [ 424: 424] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.908601 75498 usertrap_amd64.go:122] [ 424: 424] Allocate a new trap: 0xc003240810 13 D0725 14:31:41.908648 75498 usertrap_amd64.go:225] [ 424: 424] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.908837 75498 usertrap_amd64.go:212] [ 424: 424] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.908871 75498 usertrap_amd64.go:122] [ 424: 424] Allocate a new trap: 0xc003240810 14 D0725 14:31:41.908907 75498 usertrap_amd64.go:225] [ 424: 424] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.931992 75498 task_signals.go:470] [ 425: 425] Notified of signal 56 D0725 14:31:41.932161 75498 task_signals.go:204] [ 425: 425] Signal 425, PID: 425, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.932255 75498 task_exit.go:204] [ 425: 425] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.933553 75498 task_exit.go:204] [ 425: 425] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.934669 75498 task_exit.go:204] [ 424: 424] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.936622 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.936729 75498 task_exit.go:204] [ 424: 424] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.936795 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.936841 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.936794 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.937556 75498 task_exit.go:204] [ 424: 424] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.940442 75498 usertrap_amd64.go:212] [ 426: 426] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.940532 75498 usertrap_amd64.go:122] [ 426: 426] Allocate a new trap: 0xc0002e5650 9 D0725 14:31:41.940860 75498 usertrap_amd64.go:225] [ 426: 426] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.942795 75498 usertrap_amd64.go:212] [ 426: 426] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.942852 75498 usertrap_amd64.go:122] [ 426: 426] Allocate a new trap: 0xc0002e5650 10 D0725 14:31:41.942896 75498 usertrap_amd64.go:225] [ 426: 426] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.943989 75498 usertrap_amd64.go:212] [ 426: 426] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.944038 75498 usertrap_amd64.go:122] [ 426: 426] Allocate a new trap: 0xc0002e5650 11 D0725 14:31:41.944094 75498 usertrap_amd64.go:225] [ 426: 426] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.945537 75498 usertrap_amd64.go:212] [ 426: 426] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.945599 75498 usertrap_amd64.go:122] [ 426: 426] Allocate a new trap: 0xc0002e5650 12 D0725 14:31:41.945661 75498 usertrap_amd64.go:225] [ 426: 426] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.947325 75498 usertrap_amd64.go:212] [ 426: 426] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.947390 75498 usertrap_amd64.go:122] [ 426: 426] Allocate a new trap: 0xc0002e5650 13 D0725 14:31:41.947467 75498 usertrap_amd64.go:225] [ 426: 426] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.947808 75498 usertrap_amd64.go:212] [ 426: 426] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.947865 75498 usertrap_amd64.go:122] [ 426: 426] Allocate a new trap: 0xc0002e5650 14 D0725 14:31:41.947940 75498 usertrap_amd64.go:225] [ 426: 426] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:41.972388 75498 task_signals.go:470] [ 427: 427] Notified of signal 56 D0725 14:31:41.972517 75498 task_signals.go:204] [ 427: 427] Signal 427, PID: 427, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:41.972592 75498 task_exit.go:204] [ 427: 427] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.973863 75498 task_exit.go:204] [ 427: 427] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.974788 75498 task_exit.go:204] [ 426: 426] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:41.976516 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:41.976585 75498 task_exit.go:204] [ 426: 426] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:41.976628 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:41.976697 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:41.976745 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:41.977452 75498 task_exit.go:204] [ 426: 426] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:41.980056 75498 usertrap_amd64.go:212] [ 428: 428] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:41.980124 75498 usertrap_amd64.go:122] [ 428: 428] Allocate a new trap: 0xc006ef22d0 9 D0725 14:31:41.980422 75498 usertrap_amd64.go:225] [ 428: 428] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:41.982213 75498 usertrap_amd64.go:212] [ 428: 428] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:41.982251 75498 usertrap_amd64.go:122] [ 428: 428] Allocate a new trap: 0xc006ef22d0 10 D0725 14:31:41.982291 75498 usertrap_amd64.go:225] [ 428: 428] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:41.983007 75498 usertrap_amd64.go:212] [ 428: 428] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:41.983044 75498 usertrap_amd64.go:122] [ 428: 428] Allocate a new trap: 0xc006ef22d0 11 D0725 14:31:41.983115 75498 usertrap_amd64.go:225] [ 428: 428] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:41.984113 75498 usertrap_amd64.go:212] [ 428: 428] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:41.984154 75498 usertrap_amd64.go:122] [ 428: 428] Allocate a new trap: 0xc006ef22d0 12 D0725 14:31:41.984193 75498 usertrap_amd64.go:225] [ 428: 428] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:41.985602 75498 usertrap_amd64.go:212] [ 428: 428] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:41.985642 75498 usertrap_amd64.go:122] [ 428: 428] Allocate a new trap: 0xc006ef22d0 13 D0725 14:31:41.985685 75498 usertrap_amd64.go:225] [ 428: 428] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:41.985841 75498 usertrap_amd64.go:212] [ 428: 428] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:41.985894 75498 usertrap_amd64.go:122] [ 428: 428] Allocate a new trap: 0xc006ef22d0 14 D0725 14:31:41.985930 75498 usertrap_amd64.go:225] [ 428: 428] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.006371 75498 task_signals.go:470] [ 429: 429] Notified of signal 56 D0725 14:31:42.006494 75498 task_signals.go:204] [ 429: 429] Signal 429, PID: 429, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.006552 75498 task_exit.go:204] [ 429: 429] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.007933 75498 task_exit.go:204] [ 429: 429] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.008429 75498 task_exit.go:204] [ 428: 428] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.010062 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.010131 75498 task_exit.go:204] [ 428: 428] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.010185 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.010258 75498 task_exit.go:204] [ 428: 428] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.010249 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.010395 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.012750 75498 usertrap_amd64.go:212] [ 430: 430] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.012816 75498 usertrap_amd64.go:122] [ 430: 430] Allocate a new trap: 0xc00476b710 9 D0725 14:31:42.013150 75498 usertrap_amd64.go:225] [ 430: 430] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.015266 75498 usertrap_amd64.go:212] [ 430: 430] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.015329 75498 usertrap_amd64.go:122] [ 430: 430] Allocate a new trap: 0xc00476b710 10 D0725 14:31:42.015381 75498 usertrap_amd64.go:225] [ 430: 430] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.016324 75498 usertrap_amd64.go:212] [ 430: 430] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.016376 75498 usertrap_amd64.go:122] [ 430: 430] Allocate a new trap: 0xc00476b710 11 D0725 14:31:42.016439 75498 usertrap_amd64.go:225] [ 430: 430] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.017631 75498 usertrap_amd64.go:212] [ 430: 430] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.017701 75498 usertrap_amd64.go:122] [ 430: 430] Allocate a new trap: 0xc00476b710 12 D0725 14:31:42.017754 75498 usertrap_amd64.go:225] [ 430: 430] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.019400 75498 usertrap_amd64.go:212] [ 430: 430] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.019443 75498 usertrap_amd64.go:122] [ 430: 430] Allocate a new trap: 0xc00476b710 13 D0725 14:31:42.019485 75498 usertrap_amd64.go:225] [ 430: 430] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.019712 75498 usertrap_amd64.go:212] [ 430: 430] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.019748 75498 usertrap_amd64.go:122] [ 430: 430] Allocate a new trap: 0xc00476b710 14 D0725 14:31:42.019801 75498 usertrap_amd64.go:225] [ 430: 430] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.049086 75498 task_signals.go:470] [ 431: 431] Notified of signal 56 D0725 14:31:42.049223 75498 task_signals.go:204] [ 431: 431] Signal 431, PID: 431, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.049296 75498 task_exit.go:204] [ 431: 431] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.050669 75498 task_exit.go:204] [ 431: 431] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.051500 75498 task_exit.go:204] [ 430: 430] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.053637 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.053728 75498 task_exit.go:204] [ 430: 430] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.053787 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.053791 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.053849 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.054388 75498 task_exit.go:204] [ 430: 430] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.057473 75498 usertrap_amd64.go:212] [ 432: 432] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.057554 75498 usertrap_amd64.go:122] [ 432: 432] Allocate a new trap: 0xc003241470 9 D0725 14:31:42.057827 75498 usertrap_amd64.go:225] [ 432: 432] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.060247 75498 usertrap_amd64.go:212] [ 432: 432] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.060294 75498 usertrap_amd64.go:122] [ 432: 432] Allocate a new trap: 0xc003241470 10 D0725 14:31:42.060348 75498 usertrap_amd64.go:225] [ 432: 432] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.061278 75498 usertrap_amd64.go:212] [ 432: 432] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.061318 75498 usertrap_amd64.go:122] [ 432: 432] Allocate a new trap: 0xc003241470 11 D0725 14:31:42.061364 75498 usertrap_amd64.go:225] [ 432: 432] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.062572 75498 usertrap_amd64.go:212] [ 432: 432] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.062627 75498 usertrap_amd64.go:122] [ 432: 432] Allocate a new trap: 0xc003241470 12 D0725 14:31:42.062693 75498 usertrap_amd64.go:225] [ 432: 432] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.064307 75498 usertrap_amd64.go:212] [ 432: 432] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.064350 75498 usertrap_amd64.go:122] [ 432: 432] Allocate a new trap: 0xc003241470 13 D0725 14:31:42.064402 75498 usertrap_amd64.go:225] [ 432: 432] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.064562 75498 usertrap_amd64.go:212] [ 432: 432] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.064604 75498 usertrap_amd64.go:122] [ 432: 432] Allocate a new trap: 0xc003241470 14 D0725 14:31:42.064676 75498 usertrap_amd64.go:225] [ 432: 432] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.087413 75498 task_signals.go:470] [ 433: 433] Notified of signal 56 D0725 14:31:42.087569 75498 task_signals.go:204] [ 433: 433] Signal 433, PID: 433, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.087690 75498 task_exit.go:204] [ 433: 433] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.089077 75498 task_exit.go:204] [ 433: 433] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.089605 75498 task_exit.go:204] [ 432: 432] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.091396 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.091518 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.091568 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.091597 75498 task_exit.go:204] [ 432: 432] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.091704 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.092680 75498 task_exit.go:204] [ 432: 432] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.095339 75498 usertrap_amd64.go:212] [ 434: 434] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.095406 75498 usertrap_amd64.go:122] [ 434: 434] Allocate a new trap: 0xc00594c0c0 9 D0725 14:31:42.095710 75498 usertrap_amd64.go:225] [ 434: 434] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.097775 75498 usertrap_amd64.go:212] [ 434: 434] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.097824 75498 usertrap_amd64.go:122] [ 434: 434] Allocate a new trap: 0xc00594c0c0 10 D0725 14:31:42.097884 75498 usertrap_amd64.go:225] [ 434: 434] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.098653 75498 usertrap_amd64.go:212] [ 434: 434] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.098692 75498 usertrap_amd64.go:122] [ 434: 434] Allocate a new trap: 0xc00594c0c0 11 D0725 14:31:42.098733 75498 usertrap_amd64.go:225] [ 434: 434] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.099806 75498 usertrap_amd64.go:212] [ 434: 434] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.099847 75498 usertrap_amd64.go:122] [ 434: 434] Allocate a new trap: 0xc00594c0c0 12 D0725 14:31:42.099886 75498 usertrap_amd64.go:225] [ 434: 434] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.101736 75498 usertrap_amd64.go:212] [ 434: 434] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.101799 75498 usertrap_amd64.go:122] [ 434: 434] Allocate a new trap: 0xc00594c0c0 13 D0725 14:31:42.101892 75498 usertrap_amd64.go:225] [ 434: 434] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.102133 75498 usertrap_amd64.go:212] [ 434: 434] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.102215 75498 usertrap_amd64.go:122] [ 434: 434] Allocate a new trap: 0xc00594c0c0 14 D0725 14:31:42.102272 75498 usertrap_amd64.go:225] [ 434: 434] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.126146 75498 task_signals.go:470] [ 435: 435] Notified of signal 56 D0725 14:31:42.126295 75498 task_signals.go:204] [ 435: 435] Signal 435, PID: 435, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.126409 75498 task_exit.go:204] [ 435: 435] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.127701 75498 task_exit.go:204] [ 435: 435] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.128852 75498 task_exit.go:204] [ 434: 434] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.130470 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.130539 75498 task_exit.go:204] [ 434: 434] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.130594 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.130664 75498 task_exit.go:204] [ 434: 434] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.130581 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.130742 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.133152 75498 usertrap_amd64.go:212] [ 436: 436] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.133233 75498 usertrap_amd64.go:122] [ 436: 436] Allocate a new trap: 0xc006ef2cf0 9 D0725 14:31:42.133564 75498 usertrap_amd64.go:225] [ 436: 436] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.135817 75498 usertrap_amd64.go:212] [ 436: 436] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.135877 75498 usertrap_amd64.go:122] [ 436: 436] Allocate a new trap: 0xc006ef2cf0 10 D0725 14:31:42.135927 75498 usertrap_amd64.go:225] [ 436: 436] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.136982 75498 usertrap_amd64.go:212] [ 436: 436] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.137032 75498 usertrap_amd64.go:122] [ 436: 436] Allocate a new trap: 0xc006ef2cf0 11 D0725 14:31:42.137106 75498 usertrap_amd64.go:225] [ 436: 436] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.138265 75498 usertrap_amd64.go:212] [ 436: 436] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.138315 75498 usertrap_amd64.go:122] [ 436: 436] Allocate a new trap: 0xc006ef2cf0 12 D0725 14:31:42.138359 75498 usertrap_amd64.go:225] [ 436: 436] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.139955 75498 usertrap_amd64.go:212] [ 436: 436] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.140021 75498 usertrap_amd64.go:122] [ 436: 436] Allocate a new trap: 0xc006ef2cf0 13 D0725 14:31:42.140077 75498 usertrap_amd64.go:225] [ 436: 436] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.140294 75498 usertrap_amd64.go:212] [ 436: 436] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.140334 75498 usertrap_amd64.go:122] [ 436: 436] Allocate a new trap: 0xc006ef2cf0 14 D0725 14:31:42.140374 75498 usertrap_amd64.go:225] [ 436: 436] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.162225 75498 task_signals.go:470] [ 437: 437] Notified of signal 56 D0725 14:31:42.162366 75498 task_signals.go:204] [ 437: 437] Signal 437, PID: 437, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.162452 75498 task_exit.go:204] [ 437: 437] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.164177 75498 task_exit.go:204] [ 437: 437] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.164717 75498 task_exit.go:204] [ 436: 436] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.166624 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.166707 75498 task_exit.go:204] [ 436: 436] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.166749 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.166782 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.166838 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.166915 75498 task_exit.go:204] [ 436: 436] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.169417 75498 usertrap_amd64.go:212] [ 438: 438] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.169487 75498 usertrap_amd64.go:122] [ 438: 438] Allocate a new trap: 0xc006ef3890 9 D0725 14:31:42.169794 75498 usertrap_amd64.go:225] [ 438: 438] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.171825 75498 usertrap_amd64.go:212] [ 438: 438] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.171887 75498 usertrap_amd64.go:122] [ 438: 438] Allocate a new trap: 0xc006ef3890 10 D0725 14:31:42.171948 75498 usertrap_amd64.go:225] [ 438: 438] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.172938 75498 usertrap_amd64.go:212] [ 438: 438] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.173017 75498 usertrap_amd64.go:122] [ 438: 438] Allocate a new trap: 0xc006ef3890 11 D0725 14:31:42.173104 75498 usertrap_amd64.go:225] [ 438: 438] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.174243 75498 usertrap_amd64.go:212] [ 438: 438] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.174316 75498 usertrap_amd64.go:122] [ 438: 438] Allocate a new trap: 0xc006ef3890 12 D0725 14:31:42.174412 75498 usertrap_amd64.go:225] [ 438: 438] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.176023 75498 usertrap_amd64.go:212] [ 438: 438] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.176087 75498 usertrap_amd64.go:122] [ 438: 438] Allocate a new trap: 0xc006ef3890 13 D0725 14:31:42.176145 75498 usertrap_amd64.go:225] [ 438: 438] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.176372 75498 usertrap_amd64.go:212] [ 438: 438] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.176433 75498 usertrap_amd64.go:122] [ 438: 438] Allocate a new trap: 0xc006ef3890 14 D0725 14:31:42.176506 75498 usertrap_amd64.go:225] [ 438: 438] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.198939 75498 task_signals.go:470] [ 439: 439] Notified of signal 56 D0725 14:31:42.199147 75498 task_signals.go:204] [ 439: 439] Signal 439, PID: 439, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.199252 75498 task_exit.go:204] [ 439: 439] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.200759 75498 task_exit.go:204] [ 439: 439] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.201244 75498 task_exit.go:204] [ 438: 438] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.203083 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.203174 75498 task_exit.go:204] [ 438: 438] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.203230 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.203302 75498 task_exit.go:204] [ 438: 438] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.203296 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.203356 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.205984 75498 usertrap_amd64.go:212] [ 440: 440] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.206058 75498 usertrap_amd64.go:122] [ 440: 440] Allocate a new trap: 0xc00571fc50 9 D0725 14:31:42.206381 75498 usertrap_amd64.go:225] [ 440: 440] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.208251 75498 usertrap_amd64.go:212] [ 440: 440] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.208299 75498 usertrap_amd64.go:122] [ 440: 440] Allocate a new trap: 0xc00571fc50 10 D0725 14:31:42.208345 75498 usertrap_amd64.go:225] [ 440: 440] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.209333 75498 usertrap_amd64.go:212] [ 440: 440] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.209393 75498 usertrap_amd64.go:122] [ 440: 440] Allocate a new trap: 0xc00571fc50 11 D0725 14:31:42.209459 75498 usertrap_amd64.go:225] [ 440: 440] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.210809 75498 usertrap_amd64.go:212] [ 440: 440] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.210859 75498 usertrap_amd64.go:122] [ 440: 440] Allocate a new trap: 0xc00571fc50 12 D0725 14:31:42.210927 75498 usertrap_amd64.go:225] [ 440: 440] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.212920 75498 usertrap_amd64.go:212] [ 440: 440] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.212978 75498 usertrap_amd64.go:122] [ 440: 440] Allocate a new trap: 0xc00571fc50 13 D0725 14:31:42.213034 75498 usertrap_amd64.go:225] [ 440: 440] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.213251 75498 usertrap_amd64.go:212] [ 440: 440] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.213294 75498 usertrap_amd64.go:122] [ 440: 440] Allocate a new trap: 0xc00571fc50 14 D0725 14:31:42.213348 75498 usertrap_amd64.go:225] [ 440: 440] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.236930 75498 task_signals.go:470] [ 441: 441] Notified of signal 56 D0725 14:31:42.237061 75498 task_signals.go:204] [ 441: 441] Signal 441, PID: 441, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.237158 75498 task_exit.go:204] [ 441: 441] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.238676 75498 task_exit.go:204] [ 441: 441] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.239384 75498 task_exit.go:204] [ 440: 440] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.240927 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.241000 75498 task_exit.go:204] [ 440: 440] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.241049 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.241073 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.241137 75498 task_exit.go:204] [ 440: 440] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.241147 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.243695 75498 usertrap_amd64.go:212] [ 442: 442] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.243756 75498 usertrap_amd64.go:122] [ 442: 442] Allocate a new trap: 0xc000049ce0 9 D0725 14:31:42.244040 75498 usertrap_amd64.go:225] [ 442: 442] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.246738 75498 usertrap_amd64.go:212] [ 442: 442] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.246790 75498 usertrap_amd64.go:122] [ 442: 442] Allocate a new trap: 0xc000049ce0 10 D0725 14:31:42.246839 75498 usertrap_amd64.go:225] [ 442: 442] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.247934 75498 usertrap_amd64.go:212] [ 442: 442] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.247979 75498 usertrap_amd64.go:122] [ 442: 442] Allocate a new trap: 0xc000049ce0 11 D0725 14:31:42.248023 75498 usertrap_amd64.go:225] [ 442: 442] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.249471 75498 usertrap_amd64.go:212] [ 442: 442] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.249516 75498 usertrap_amd64.go:122] [ 442: 442] Allocate a new trap: 0xc000049ce0 12 D0725 14:31:42.249562 75498 usertrap_amd64.go:225] [ 442: 442] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.251221 75498 usertrap_amd64.go:212] [ 442: 442] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.251304 75498 usertrap_amd64.go:122] [ 442: 442] Allocate a new trap: 0xc000049ce0 13 D0725 14:31:42.251387 75498 usertrap_amd64.go:225] [ 442: 442] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.251588 75498 usertrap_amd64.go:212] [ 442: 442] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.251645 75498 usertrap_amd64.go:122] [ 442: 442] Allocate a new trap: 0xc000049ce0 14 D0725 14:31:42.251700 75498 usertrap_amd64.go:225] [ 442: 442] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.274782 75498 task_signals.go:470] [ 443: 443] Notified of signal 56 D0725 14:31:42.274951 75498 task_signals.go:204] [ 443: 443] Signal 443, PID: 443, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.275069 75498 task_exit.go:204] [ 443: 443] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.276687 75498 task_exit.go:204] [ 443: 443] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.277753 75498 task_exit.go:204] [ 442: 442] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.279598 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.279716 75498 task_exit.go:204] [ 442: 442] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.279769 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.279828 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.279889 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.280653 75498 task_exit.go:204] [ 442: 442] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.283217 75498 usertrap_amd64.go:212] [ 444: 444] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.283283 75498 usertrap_amd64.go:122] [ 444: 444] Allocate a new trap: 0xc00594d050 9 D0725 14:31:42.283570 75498 usertrap_amd64.go:225] [ 444: 444] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.285663 75498 usertrap_amd64.go:212] [ 444: 444] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.285707 75498 usertrap_amd64.go:122] [ 444: 444] Allocate a new trap: 0xc00594d050 10 D0725 14:31:42.285764 75498 usertrap_amd64.go:225] [ 444: 444] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.286767 75498 usertrap_amd64.go:212] [ 444: 444] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.286807 75498 usertrap_amd64.go:122] [ 444: 444] Allocate a new trap: 0xc00594d050 11 D0725 14:31:42.286848 75498 usertrap_amd64.go:225] [ 444: 444] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.288227 75498 usertrap_amd64.go:212] [ 444: 444] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.288279 75498 usertrap_amd64.go:122] [ 444: 444] Allocate a new trap: 0xc00594d050 12 D0725 14:31:42.288338 75498 usertrap_amd64.go:225] [ 444: 444] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.289971 75498 usertrap_amd64.go:212] [ 444: 444] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.290025 75498 usertrap_amd64.go:122] [ 444: 444] Allocate a new trap: 0xc00594d050 13 D0725 14:31:42.290126 75498 usertrap_amd64.go:225] [ 444: 444] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.290342 75498 usertrap_amd64.go:212] [ 444: 444] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.290400 75498 usertrap_amd64.go:122] [ 444: 444] Allocate a new trap: 0xc00594d050 14 D0725 14:31:42.290448 75498 usertrap_amd64.go:225] [ 444: 444] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.311671 75498 task_signals.go:470] [ 445: 445] Notified of signal 56 D0725 14:31:42.311830 75498 task_signals.go:204] [ 445: 445] Signal 445, PID: 445, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.311908 75498 task_exit.go:204] [ 445: 445] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.313501 75498 task_exit.go:204] [ 445: 445] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.313733 75498 task_exit.go:204] [ 444: 444] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.315593 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.315693 75498 task_exit.go:204] [ 444: 444] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.315759 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.315791 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.315851 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.316330 75498 task_exit.go:204] [ 444: 444] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.318929 75498 usertrap_amd64.go:212] [ 446: 446] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.319007 75498 usertrap_amd64.go:122] [ 446: 446] Allocate a new trap: 0xc001898000 9 D0725 14:31:42.319293 75498 usertrap_amd64.go:225] [ 446: 446] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.321205 75498 usertrap_amd64.go:212] [ 446: 446] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.321261 75498 usertrap_amd64.go:122] [ 446: 446] Allocate a new trap: 0xc001898000 10 D0725 14:31:42.321306 75498 usertrap_amd64.go:225] [ 446: 446] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.322212 75498 usertrap_amd64.go:212] [ 446: 446] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.322252 75498 usertrap_amd64.go:122] [ 446: 446] Allocate a new trap: 0xc001898000 11 D0725 14:31:42.322302 75498 usertrap_amd64.go:225] [ 446: 446] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.323651 75498 usertrap_amd64.go:212] [ 446: 446] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.323723 75498 usertrap_amd64.go:122] [ 446: 446] Allocate a new trap: 0xc001898000 12 D0725 14:31:42.323801 75498 usertrap_amd64.go:225] [ 446: 446] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.326438 75498 usertrap_amd64.go:212] [ 446: 446] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.326503 75498 usertrap_amd64.go:122] [ 446: 446] Allocate a new trap: 0xc001898000 13 D0725 14:31:42.326567 75498 usertrap_amd64.go:225] [ 446: 446] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.326793 75498 usertrap_amd64.go:212] [ 446: 446] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.326831 75498 usertrap_amd64.go:122] [ 446: 446] Allocate a new trap: 0xc001898000 14 D0725 14:31:42.326871 75498 usertrap_amd64.go:225] [ 446: 446] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.348013 75498 task_signals.go:470] [ 447: 447] Notified of signal 56 D0725 14:31:42.348184 75498 task_signals.go:204] [ 447: 447] Signal 447, PID: 447, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.348307 75498 task_exit.go:204] [ 447: 447] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.349945 75498 task_exit.go:204] [ 447: 447] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.350495 75498 task_exit.go:204] [ 446: 446] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.352280 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.352348 75498 task_exit.go:204] [ 446: 446] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.352389 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.352489 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.352575 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.353026 75498 task_exit.go:204] [ 446: 446] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.355851 75498 usertrap_amd64.go:212] [ 448: 448] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.355926 75498 usertrap_amd64.go:122] [ 448: 448] Allocate a new trap: 0xc00476b980 9 D0725 14:31:42.356262 75498 usertrap_amd64.go:225] [ 448: 448] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.358522 75498 usertrap_amd64.go:212] [ 448: 448] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.358570 75498 usertrap_amd64.go:122] [ 448: 448] Allocate a new trap: 0xc00476b980 10 D0725 14:31:42.358630 75498 usertrap_amd64.go:225] [ 448: 448] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.359461 75498 usertrap_amd64.go:212] [ 448: 448] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.359517 75498 usertrap_amd64.go:122] [ 448: 448] Allocate a new trap: 0xc00476b980 11 D0725 14:31:42.359557 75498 usertrap_amd64.go:225] [ 448: 448] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.360807 75498 usertrap_amd64.go:212] [ 448: 448] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.360863 75498 usertrap_amd64.go:122] [ 448: 448] Allocate a new trap: 0xc00476b980 12 D0725 14:31:42.360923 75498 usertrap_amd64.go:225] [ 448: 448] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.362738 75498 usertrap_amd64.go:212] [ 448: 448] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.362793 75498 usertrap_amd64.go:122] [ 448: 448] Allocate a new trap: 0xc00476b980 13 D0725 14:31:42.362868 75498 usertrap_amd64.go:225] [ 448: 448] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.363075 75498 usertrap_amd64.go:212] [ 448: 448] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.363121 75498 usertrap_amd64.go:122] [ 448: 448] Allocate a new trap: 0xc00476b980 14 D0725 14:31:42.363170 75498 usertrap_amd64.go:225] [ 448: 448] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.385652 75498 task_signals.go:470] [ 449: 449] Notified of signal 56 D0725 14:31:42.385876 75498 task_signals.go:204] [ 449: 449] Signal 449, PID: 449, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.385993 75498 task_exit.go:204] [ 449: 449] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.387822 75498 task_exit.go:204] [ 449: 449] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.388314 75498 task_exit.go:204] [ 448: 448] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.390400 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.390477 75498 task_exit.go:204] [ 448: 448] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.390528 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.390656 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.390737 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.391306 75498 task_exit.go:204] [ 448: 448] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.394175 75498 usertrap_amd64.go:212] [ 450: 450] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.394311 75498 usertrap_amd64.go:122] [ 450: 450] Allocate a new trap: 0xc0015bcc00 9 D0725 14:31:42.394606 75498 usertrap_amd64.go:225] [ 450: 450] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.397143 75498 usertrap_amd64.go:212] [ 450: 450] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.397199 75498 usertrap_amd64.go:122] [ 450: 450] Allocate a new trap: 0xc0015bcc00 10 D0725 14:31:42.397288 75498 usertrap_amd64.go:225] [ 450: 450] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.398276 75498 usertrap_amd64.go:212] [ 450: 450] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.398322 75498 usertrap_amd64.go:122] [ 450: 450] Allocate a new trap: 0xc0015bcc00 11 D0725 14:31:42.398376 75498 usertrap_amd64.go:225] [ 450: 450] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.399847 75498 usertrap_amd64.go:212] [ 450: 450] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.399906 75498 usertrap_amd64.go:122] [ 450: 450] Allocate a new trap: 0xc0015bcc00 12 D0725 14:31:42.399982 75498 usertrap_amd64.go:225] [ 450: 450] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.401691 75498 usertrap_amd64.go:212] [ 450: 450] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.401749 75498 usertrap_amd64.go:122] [ 450: 450] Allocate a new trap: 0xc0015bcc00 13 D0725 14:31:42.401791 75498 usertrap_amd64.go:225] [ 450: 450] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.401970 75498 usertrap_amd64.go:212] [ 450: 450] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.402010 75498 usertrap_amd64.go:122] [ 450: 450] Allocate a new trap: 0xc0015bcc00 14 D0725 14:31:42.402089 75498 usertrap_amd64.go:225] [ 450: 450] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.424685 75498 task_signals.go:470] [ 451: 451] Notified of signal 56 D0725 14:31:42.424887 75498 task_signals.go:204] [ 451: 451] Signal 451, PID: 451, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.424990 75498 task_exit.go:204] [ 451: 451] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.426597 75498 task_exit.go:204] [ 451: 451] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.427129 75498 task_exit.go:204] [ 450: 450] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.429238 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.429309 75498 task_exit.go:204] [ 450: 450] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.429388 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.429455 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.429469 75498 task_exit.go:204] [ 450: 450] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.429505 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.431986 75498 usertrap_amd64.go:212] [ 452: 452] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.432044 75498 usertrap_amd64.go:122] [ 452: 452] Allocate a new trap: 0xc001898600 9 D0725 14:31:42.432318 75498 usertrap_amd64.go:225] [ 452: 452] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.434882 75498 usertrap_amd64.go:212] [ 452: 452] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.434941 75498 usertrap_amd64.go:122] [ 452: 452] Allocate a new trap: 0xc001898600 10 D0725 14:31:42.434998 75498 usertrap_amd64.go:225] [ 452: 452] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.435969 75498 usertrap_amd64.go:212] [ 452: 452] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.436014 75498 usertrap_amd64.go:122] [ 452: 452] Allocate a new trap: 0xc001898600 11 D0725 14:31:42.436056 75498 usertrap_amd64.go:225] [ 452: 452] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.437245 75498 usertrap_amd64.go:212] [ 452: 452] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.437302 75498 usertrap_amd64.go:122] [ 452: 452] Allocate a new trap: 0xc001898600 12 D0725 14:31:42.437351 75498 usertrap_amd64.go:225] [ 452: 452] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.438868 75498 usertrap_amd64.go:212] [ 452: 452] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.438912 75498 usertrap_amd64.go:122] [ 452: 452] Allocate a new trap: 0xc001898600 13 D0725 14:31:42.438976 75498 usertrap_amd64.go:225] [ 452: 452] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.439165 75498 usertrap_amd64.go:212] [ 452: 452] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.439211 75498 usertrap_amd64.go:122] [ 452: 452] Allocate a new trap: 0xc001898600 14 D0725 14:31:42.439249 75498 usertrap_amd64.go:225] [ 452: 452] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.461111 75498 task_signals.go:470] [ 453: 453] Notified of signal 56 D0725 14:31:42.461264 75498 task_signals.go:204] [ 453: 453] Signal 453, PID: 453, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.461370 75498 task_exit.go:204] [ 453: 453] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.462688 75498 task_exit.go:204] [ 453: 453] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.463351 75498 task_exit.go:204] [ 452: 452] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.465589 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.465680 75498 task_exit.go:204] [ 452: 452] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.465743 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.465767 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.465796 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.466162 75498 task_exit.go:204] [ 452: 452] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.468905 75498 usertrap_amd64.go:212] [ 454: 454] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.468980 75498 usertrap_amd64.go:122] [ 454: 454] Allocate a new trap: 0xc0036af1d0 9 D0725 14:31:42.469341 75498 usertrap_amd64.go:225] [ 454: 454] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.471666 75498 usertrap_amd64.go:212] [ 454: 454] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.471731 75498 usertrap_amd64.go:122] [ 454: 454] Allocate a new trap: 0xc0036af1d0 10 D0725 14:31:42.471813 75498 usertrap_amd64.go:225] [ 454: 454] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.472782 75498 usertrap_amd64.go:212] [ 454: 454] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.472834 75498 usertrap_amd64.go:122] [ 454: 454] Allocate a new trap: 0xc0036af1d0 11 D0725 14:31:42.472944 75498 usertrap_amd64.go:225] [ 454: 454] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.474205 75498 usertrap_amd64.go:212] [ 454: 454] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.474255 75498 usertrap_amd64.go:122] [ 454: 454] Allocate a new trap: 0xc0036af1d0 12 D0725 14:31:42.474313 75498 usertrap_amd64.go:225] [ 454: 454] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.475929 75498 usertrap_amd64.go:212] [ 454: 454] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.475972 75498 usertrap_amd64.go:122] [ 454: 454] Allocate a new trap: 0xc0036af1d0 13 D0725 14:31:42.476023 75498 usertrap_amd64.go:225] [ 454: 454] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.476302 75498 usertrap_amd64.go:212] [ 454: 454] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.476362 75498 usertrap_amd64.go:122] [ 454: 454] Allocate a new trap: 0xc0036af1d0 14 D0725 14:31:42.476408 75498 usertrap_amd64.go:225] [ 454: 454] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.498770 75498 task_signals.go:470] [ 455: 455] Notified of signal 56 D0725 14:31:42.498964 75498 task_signals.go:204] [ 455: 455] Signal 455, PID: 455, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.499066 75498 task_exit.go:204] [ 455: 455] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.500767 75498 task_exit.go:204] [ 455: 455] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.501346 75498 task_exit.go:204] [ 454: 454] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.502955 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.503037 75498 task_exit.go:204] [ 454: 454] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.503110 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.503095 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.503170 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.503205 75498 task_exit.go:204] [ 454: 454] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.505888 75498 usertrap_amd64.go:212] [ 456: 456] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.505968 75498 usertrap_amd64.go:122] [ 456: 456] Allocate a new trap: 0xc0070e6f60 9 D0725 14:31:42.506346 75498 usertrap_amd64.go:225] [ 456: 456] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.508566 75498 usertrap_amd64.go:212] [ 456: 456] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.508631 75498 usertrap_amd64.go:122] [ 456: 456] Allocate a new trap: 0xc0070e6f60 10 D0725 14:31:42.508717 75498 usertrap_amd64.go:225] [ 456: 456] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.509667 75498 usertrap_amd64.go:212] [ 456: 456] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.509726 75498 usertrap_amd64.go:122] [ 456: 456] Allocate a new trap: 0xc0070e6f60 11 D0725 14:31:42.509794 75498 usertrap_amd64.go:225] [ 456: 456] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.510924 75498 usertrap_amd64.go:212] [ 456: 456] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.510966 75498 usertrap_amd64.go:122] [ 456: 456] Allocate a new trap: 0xc0070e6f60 12 D0725 14:31:42.511018 75498 usertrap_amd64.go:225] [ 456: 456] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.512534 75498 usertrap_amd64.go:212] [ 456: 456] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.512588 75498 usertrap_amd64.go:122] [ 456: 456] Allocate a new trap: 0xc0070e6f60 13 D0725 14:31:42.512633 75498 usertrap_amd64.go:225] [ 456: 456] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.512833 75498 usertrap_amd64.go:212] [ 456: 456] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.512870 75498 usertrap_amd64.go:122] [ 456: 456] Allocate a new trap: 0xc0070e6f60 14 D0725 14:31:42.512926 75498 usertrap_amd64.go:225] [ 456: 456] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.534630 75498 task_signals.go:470] [ 457: 457] Notified of signal 56 D0725 14:31:42.534741 75498 task_signals.go:204] [ 457: 457] Signal 457, PID: 457, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.534805 75498 task_exit.go:204] [ 457: 457] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.536279 75498 task_exit.go:204] [ 457: 457] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.537081 75498 task_exit.go:204] [ 456: 456] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.538533 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.538624 75498 task_exit.go:204] [ 456: 456] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.538695 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.538765 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.538813 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.539123 75498 task_exit.go:204] [ 456: 456] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.541806 75498 usertrap_amd64.go:212] [ 458: 458] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.541869 75498 usertrap_amd64.go:122] [ 458: 458] Allocate a new trap: 0xc0070e7080 9 D0725 14:31:42.542181 75498 usertrap_amd64.go:225] [ 458: 458] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.544461 75498 usertrap_amd64.go:212] [ 458: 458] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.544512 75498 usertrap_amd64.go:122] [ 458: 458] Allocate a new trap: 0xc0070e7080 10 D0725 14:31:42.544582 75498 usertrap_amd64.go:225] [ 458: 458] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.545666 75498 usertrap_amd64.go:212] [ 458: 458] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.545736 75498 usertrap_amd64.go:122] [ 458: 458] Allocate a new trap: 0xc0070e7080 11 D0725 14:31:42.545792 75498 usertrap_amd64.go:225] [ 458: 458] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.547358 75498 usertrap_amd64.go:212] [ 458: 458] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.547420 75498 usertrap_amd64.go:122] [ 458: 458] Allocate a new trap: 0xc0070e7080 12 D0725 14:31:42.547464 75498 usertrap_amd64.go:225] [ 458: 458] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.549262 75498 usertrap_amd64.go:212] [ 458: 458] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.549310 75498 usertrap_amd64.go:122] [ 458: 458] Allocate a new trap: 0xc0070e7080 13 D0725 14:31:42.549388 75498 usertrap_amd64.go:225] [ 458: 458] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.549622 75498 usertrap_amd64.go:212] [ 458: 458] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.549667 75498 usertrap_amd64.go:122] [ 458: 458] Allocate a new trap: 0xc0070e7080 14 D0725 14:31:42.549732 75498 usertrap_amd64.go:225] [ 458: 458] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.573542 75498 task_signals.go:470] [ 459: 459] Notified of signal 56 D0725 14:31:42.573893 75498 task_signals.go:204] [ 459: 459] Signal 459, PID: 459, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.574007 75498 task_exit.go:204] [ 459: 459] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.575982 75498 task_exit.go:204] [ 459: 459] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.576282 75498 task_exit.go:204] [ 458: 458] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.578311 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.578391 75498 task_exit.go:204] [ 458: 458] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.578451 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.578450 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.578507 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.579057 75498 task_exit.go:204] [ 458: 458] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.581742 75498 usertrap_amd64.go:212] [ 460: 460] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.581842 75498 usertrap_amd64.go:122] [ 460: 460] Allocate a new trap: 0xc0018990e0 9 D0725 14:31:42.582209 75498 usertrap_amd64.go:225] [ 460: 460] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.584144 75498 usertrap_amd64.go:212] [ 460: 460] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.584204 75498 usertrap_amd64.go:122] [ 460: 460] Allocate a new trap: 0xc0018990e0 10 D0725 14:31:42.584256 75498 usertrap_amd64.go:225] [ 460: 460] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.585359 75498 usertrap_amd64.go:212] [ 460: 460] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.585419 75498 usertrap_amd64.go:122] [ 460: 460] Allocate a new trap: 0xc0018990e0 11 D0725 14:31:42.585466 75498 usertrap_amd64.go:225] [ 460: 460] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.586852 75498 usertrap_amd64.go:212] [ 460: 460] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.586924 75498 usertrap_amd64.go:122] [ 460: 460] Allocate a new trap: 0xc0018990e0 12 D0725 14:31:42.587003 75498 usertrap_amd64.go:225] [ 460: 460] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.588634 75498 usertrap_amd64.go:212] [ 460: 460] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.588691 75498 usertrap_amd64.go:122] [ 460: 460] Allocate a new trap: 0xc0018990e0 13 D0725 14:31:42.588784 75498 usertrap_amd64.go:225] [ 460: 460] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.589075 75498 usertrap_amd64.go:212] [ 460: 460] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.589146 75498 usertrap_amd64.go:122] [ 460: 460] Allocate a new trap: 0xc0018990e0 14 D0725 14:31:42.589250 75498 usertrap_amd64.go:225] [ 460: 460] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.613449 75498 task_signals.go:470] [ 461: 461] Notified of signal 56 D0725 14:31:42.613579 75498 task_signals.go:204] [ 461: 461] Signal 461, PID: 461, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.613666 75498 task_exit.go:204] [ 461: 461] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.615033 75498 task_exit.go:204] [ 461: 461] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.616026 75498 task_exit.go:204] [ 460: 460] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.617922 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.618012 75498 task_exit.go:204] [ 460: 460] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.618083 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.618066 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.618161 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.619070 75498 task_exit.go:204] [ 460: 460] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.621583 75498 usertrap_amd64.go:212] [ 462: 462] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.621659 75498 usertrap_amd64.go:122] [ 462: 462] Allocate a new trap: 0xc0018993b0 9 D0725 14:31:42.622057 75498 usertrap_amd64.go:225] [ 462: 462] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.624401 75498 usertrap_amd64.go:212] [ 462: 462] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.624457 75498 usertrap_amd64.go:122] [ 462: 462] Allocate a new trap: 0xc0018993b0 10 D0725 14:31:42.624545 75498 usertrap_amd64.go:225] [ 462: 462] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.625561 75498 usertrap_amd64.go:212] [ 462: 462] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.625604 75498 usertrap_amd64.go:122] [ 462: 462] Allocate a new trap: 0xc0018993b0 11 D0725 14:31:42.625686 75498 usertrap_amd64.go:225] [ 462: 462] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.626958 75498 usertrap_amd64.go:212] [ 462: 462] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.627015 75498 usertrap_amd64.go:122] [ 462: 462] Allocate a new trap: 0xc0018993b0 12 D0725 14:31:42.627086 75498 usertrap_amd64.go:225] [ 462: 462] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.628896 75498 usertrap_amd64.go:212] [ 462: 462] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.628969 75498 usertrap_amd64.go:122] [ 462: 462] Allocate a new trap: 0xc0018993b0 13 D0725 14:31:42.629044 75498 usertrap_amd64.go:225] [ 462: 462] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.629276 75498 usertrap_amd64.go:212] [ 462: 462] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.629323 75498 usertrap_amd64.go:122] [ 462: 462] Allocate a new trap: 0xc0018993b0 14 D0725 14:31:42.629396 75498 usertrap_amd64.go:225] [ 462: 462] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.655663 75498 task_signals.go:470] [ 463: 463] Notified of signal 56 D0725 14:31:42.655914 75498 task_signals.go:204] [ 463: 463] Signal 463, PID: 463, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.656012 75498 task_exit.go:204] [ 463: 463] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.657507 75498 task_exit.go:204] [ 463: 463] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.658454 75498 task_exit.go:204] [ 462: 462] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.660162 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.660241 75498 task_exit.go:204] [ 462: 462] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.660314 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.660378 75498 task_exit.go:204] [ 462: 462] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.660396 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.660452 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.662908 75498 usertrap_amd64.go:212] [ 464: 464] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.662987 75498 usertrap_amd64.go:122] [ 464: 464] Allocate a new trap: 0xc0036afe00 9 D0725 14:31:42.663328 75498 usertrap_amd64.go:225] [ 464: 464] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.665373 75498 usertrap_amd64.go:212] [ 464: 464] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.665428 75498 usertrap_amd64.go:122] [ 464: 464] Allocate a new trap: 0xc0036afe00 10 D0725 14:31:42.665513 75498 usertrap_amd64.go:225] [ 464: 464] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.666433 75498 usertrap_amd64.go:212] [ 464: 464] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.666491 75498 usertrap_amd64.go:122] [ 464: 464] Allocate a new trap: 0xc0036afe00 11 D0725 14:31:42.666547 75498 usertrap_amd64.go:225] [ 464: 464] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.667562 75498 usertrap_amd64.go:212] [ 464: 464] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.667632 75498 usertrap_amd64.go:122] [ 464: 464] Allocate a new trap: 0xc0036afe00 12 D0725 14:31:42.667716 75498 usertrap_amd64.go:225] [ 464: 464] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.669212 75498 usertrap_amd64.go:212] [ 464: 464] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.669255 75498 usertrap_amd64.go:122] [ 464: 464] Allocate a new trap: 0xc0036afe00 13 D0725 14:31:42.669301 75498 usertrap_amd64.go:225] [ 464: 464] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.669544 75498 usertrap_amd64.go:212] [ 464: 464] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.669586 75498 usertrap_amd64.go:122] [ 464: 464] Allocate a new trap: 0xc0036afe00 14 D0725 14:31:42.669660 75498 usertrap_amd64.go:225] [ 464: 464] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.693242 75498 task_signals.go:470] [ 465: 465] Notified of signal 56 D0725 14:31:42.693438 75498 task_signals.go:204] [ 465: 465] Signal 465, PID: 465, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.693536 75498 task_exit.go:204] [ 465: 465] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.695092 75498 task_exit.go:204] [ 465: 465] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.695917 75498 task_exit.go:204] [ 464: 464] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.697935 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.698002 75498 task_exit.go:204] [ 464: 464] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.698050 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.698157 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.698206 75498 task_exit.go:204] [ 464: 464] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.698224 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.700886 75498 usertrap_amd64.go:212] [ 466: 466] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.700964 75498 usertrap_amd64.go:122] [ 466: 466] Allocate a new trap: 0xc0070e7a10 9 D0725 14:31:42.701305 75498 usertrap_amd64.go:225] [ 466: 466] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.703294 75498 usertrap_amd64.go:212] [ 466: 466] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.703354 75498 usertrap_amd64.go:122] [ 466: 466] Allocate a new trap: 0xc0070e7a10 10 D0725 14:31:42.703429 75498 usertrap_amd64.go:225] [ 466: 466] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.704428 75498 usertrap_amd64.go:212] [ 466: 466] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.704471 75498 usertrap_amd64.go:122] [ 466: 466] Allocate a new trap: 0xc0070e7a10 11 D0725 14:31:42.704564 75498 usertrap_amd64.go:225] [ 466: 466] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.706055 75498 usertrap_amd64.go:212] [ 466: 466] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.706108 75498 usertrap_amd64.go:122] [ 466: 466] Allocate a new trap: 0xc0070e7a10 12 D0725 14:31:42.706193 75498 usertrap_amd64.go:225] [ 466: 466] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.707888 75498 usertrap_amd64.go:212] [ 466: 466] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.707950 75498 usertrap_amd64.go:122] [ 466: 466] Allocate a new trap: 0xc0070e7a10 13 D0725 14:31:42.708020 75498 usertrap_amd64.go:225] [ 466: 466] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.708273 75498 usertrap_amd64.go:212] [ 466: 466] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.708311 75498 usertrap_amd64.go:122] [ 466: 466] Allocate a new trap: 0xc0070e7a10 14 D0725 14:31:42.708352 75498 usertrap_amd64.go:225] [ 466: 466] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.731936 75498 task_signals.go:470] [ 467: 467] Notified of signal 56 D0725 14:31:42.732064 75498 task_signals.go:204] [ 467: 467] Signal 467, PID: 467, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.732154 75498 task_exit.go:204] [ 467: 467] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.733594 75498 task_exit.go:204] [ 467: 467] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.734281 75498 task_exit.go:204] [ 466: 466] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.735859 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.735948 75498 task_exit.go:204] [ 466: 466] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.736016 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.736079 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.736155 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.737030 75498 task_exit.go:204] [ 466: 466] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.739638 75498 usertrap_amd64.go:212] [ 468: 468] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.739742 75498 usertrap_amd64.go:122] [ 468: 468] Allocate a new trap: 0xc0002de6f0 9 D0725 14:31:42.740076 75498 usertrap_amd64.go:225] [ 468: 468] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.742237 75498 usertrap_amd64.go:212] [ 468: 468] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.742280 75498 usertrap_amd64.go:122] [ 468: 468] Allocate a new trap: 0xc0002de6f0 10 D0725 14:31:42.742326 75498 usertrap_amd64.go:225] [ 468: 468] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.743088 75498 usertrap_amd64.go:212] [ 468: 468] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.743132 75498 usertrap_amd64.go:122] [ 468: 468] Allocate a new trap: 0xc0002de6f0 11 D0725 14:31:42.743171 75498 usertrap_amd64.go:225] [ 468: 468] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.744413 75498 usertrap_amd64.go:212] [ 468: 468] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.744463 75498 usertrap_amd64.go:122] [ 468: 468] Allocate a new trap: 0xc0002de6f0 12 D0725 14:31:42.744520 75498 usertrap_amd64.go:225] [ 468: 468] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.746055 75498 usertrap_amd64.go:212] [ 468: 468] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.746100 75498 usertrap_amd64.go:122] [ 468: 468] Allocate a new trap: 0xc0002de6f0 13 D0725 14:31:42.746153 75498 usertrap_amd64.go:225] [ 468: 468] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.746309 75498 usertrap_amd64.go:212] [ 468: 468] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.746343 75498 usertrap_amd64.go:122] [ 468: 468] Allocate a new trap: 0xc0002de6f0 14 D0725 14:31:42.746403 75498 usertrap_amd64.go:225] [ 468: 468] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.767778 75498 task_signals.go:470] [ 469: 469] Notified of signal 56 D0725 14:31:42.768066 75498 task_signals.go:204] [ 469: 469] Signal 469, PID: 469, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.768209 75498 task_exit.go:204] [ 469: 469] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.769851 75498 task_exit.go:204] [ 469: 469] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.770278 75498 task_exit.go:204] [ 468: 468] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.772136 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.772197 75498 task_exit.go:204] [ 468: 468] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.772243 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.772255 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.772368 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.772329 75498 task_exit.go:204] [ 468: 468] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.775112 75498 usertrap_amd64.go:212] [ 470: 470] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.775173 75498 usertrap_amd64.go:122] [ 470: 470] Allocate a new trap: 0xc001899950 9 D0725 14:31:42.775506 75498 usertrap_amd64.go:225] [ 470: 470] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.777856 75498 usertrap_amd64.go:212] [ 470: 470] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.777917 75498 usertrap_amd64.go:122] [ 470: 470] Allocate a new trap: 0xc001899950 10 D0725 14:31:42.778009 75498 usertrap_amd64.go:225] [ 470: 470] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.779065 75498 usertrap_amd64.go:212] [ 470: 470] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.779124 75498 usertrap_amd64.go:122] [ 470: 470] Allocate a new trap: 0xc001899950 11 D0725 14:31:42.779167 75498 usertrap_amd64.go:225] [ 470: 470] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.780558 75498 usertrap_amd64.go:212] [ 470: 470] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.780634 75498 usertrap_amd64.go:122] [ 470: 470] Allocate a new trap: 0xc001899950 12 D0725 14:31:42.780707 75498 usertrap_amd64.go:225] [ 470: 470] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.782227 75498 usertrap_amd64.go:212] [ 470: 470] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.782280 75498 usertrap_amd64.go:122] [ 470: 470] Allocate a new trap: 0xc001899950 13 D0725 14:31:42.782324 75498 usertrap_amd64.go:225] [ 470: 470] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.782533 75498 usertrap_amd64.go:212] [ 470: 470] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.782568 75498 usertrap_amd64.go:122] [ 470: 470] Allocate a new trap: 0xc001899950 14 D0725 14:31:42.782612 75498 usertrap_amd64.go:225] [ 470: 470] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.808089 75498 task_signals.go:470] [ 471: 471] Notified of signal 56 D0725 14:31:42.808360 75498 task_signals.go:204] [ 471: 471] Signal 471, PID: 471, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.808475 75498 task_exit.go:204] [ 471: 471] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.810106 75498 task_exit.go:204] [ 471: 471] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.811281 75498 task_exit.go:204] [ 470: 470] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.813563 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.813650 75498 task_exit.go:204] [ 470: 470] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.813692 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.813702 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.813744 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.813877 75498 task_exit.go:204] [ 470: 470] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.816779 75498 usertrap_amd64.go:212] [ 472: 472] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.816858 75498 usertrap_amd64.go:122] [ 472: 472] Allocate a new trap: 0xc000bdd8c0 9 D0725 14:31:42.817316 75498 usertrap_amd64.go:225] [ 472: 472] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.820157 75498 usertrap_amd64.go:212] [ 472: 472] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.820230 75498 usertrap_amd64.go:122] [ 472: 472] Allocate a new trap: 0xc000bdd8c0 10 D0725 14:31:42.820296 75498 usertrap_amd64.go:225] [ 472: 472] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.821395 75498 usertrap_amd64.go:212] [ 472: 472] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.821451 75498 usertrap_amd64.go:122] [ 472: 472] Allocate a new trap: 0xc000bdd8c0 11 D0725 14:31:42.821511 75498 usertrap_amd64.go:225] [ 472: 472] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.823088 75498 usertrap_amd64.go:212] [ 472: 472] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.823152 75498 usertrap_amd64.go:122] [ 472: 472] Allocate a new trap: 0xc000bdd8c0 12 D0725 14:31:42.823230 75498 usertrap_amd64.go:225] [ 472: 472] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.825360 75498 usertrap_amd64.go:212] [ 472: 472] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.825415 75498 usertrap_amd64.go:122] [ 472: 472] Allocate a new trap: 0xc000bdd8c0 13 D0725 14:31:42.825489 75498 usertrap_amd64.go:225] [ 472: 472] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.825805 75498 usertrap_amd64.go:212] [ 472: 472] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.825867 75498 usertrap_amd64.go:122] [ 472: 472] Allocate a new trap: 0xc000bdd8c0 14 D0725 14:31:42.825936 75498 usertrap_amd64.go:225] [ 472: 472] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.852816 75498 task_signals.go:470] [ 473: 473] Notified of signal 56 D0725 14:31:42.852974 75498 task_signals.go:204] [ 473: 473] Signal 473, PID: 473, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.853092 75498 task_exit.go:204] [ 473: 473] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.854928 75498 task_exit.go:204] [ 473: 473] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.855958 75498 task_exit.go:204] [ 472: 472] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.857936 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.858019 75498 task_exit.go:204] [ 472: 472] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.858106 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.858225 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.858308 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.859082 75498 task_exit.go:204] [ 472: 472] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.862482 75498 usertrap_amd64.go:212] [ 474: 474] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.862549 75498 usertrap_amd64.go:122] [ 474: 474] Allocate a new trap: 0xc003e0db00 9 D0725 14:31:42.862965 75498 usertrap_amd64.go:225] [ 474: 474] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.865452 75498 usertrap_amd64.go:212] [ 474: 474] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.865496 75498 usertrap_amd64.go:122] [ 474: 474] Allocate a new trap: 0xc003e0db00 10 D0725 14:31:42.865541 75498 usertrap_amd64.go:225] [ 474: 474] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.866553 75498 usertrap_amd64.go:212] [ 474: 474] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.866639 75498 usertrap_amd64.go:122] [ 474: 474] Allocate a new trap: 0xc003e0db00 11 D0725 14:31:42.866714 75498 usertrap_amd64.go:225] [ 474: 474] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.868224 75498 usertrap_amd64.go:212] [ 474: 474] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.868288 75498 usertrap_amd64.go:122] [ 474: 474] Allocate a new trap: 0xc003e0db00 12 D0725 14:31:42.868348 75498 usertrap_amd64.go:225] [ 474: 474] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.870156 75498 usertrap_amd64.go:212] [ 474: 474] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.870207 75498 usertrap_amd64.go:122] [ 474: 474] Allocate a new trap: 0xc003e0db00 13 D0725 14:31:42.870284 75498 usertrap_amd64.go:225] [ 474: 474] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.870506 75498 usertrap_amd64.go:212] [ 474: 474] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.870549 75498 usertrap_amd64.go:122] [ 474: 474] Allocate a new trap: 0xc003e0db00 14 D0725 14:31:42.870594 75498 usertrap_amd64.go:225] [ 474: 474] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.897842 75498 task_signals.go:470] [ 475: 475] Notified of signal 56 D0725 14:31:42.898035 75498 task_signals.go:204] [ 475: 475] Signal 475, PID: 475, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.898154 75498 task_exit.go:204] [ 475: 475] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.899446 75498 task_exit.go:204] [ 475: 475] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.900427 75498 task_exit.go:204] [ 474: 474] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.902294 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.902372 75498 task_exit.go:204] [ 474: 474] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.902413 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.902452 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.902520 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.903034 75498 task_exit.go:204] [ 474: 474] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.906018 75498 usertrap_amd64.go:212] [ 476: 476] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.906129 75498 usertrap_amd64.go:122] [ 476: 476] Allocate a new trap: 0xc0002de060 9 D0725 14:31:42.906451 75498 usertrap_amd64.go:225] [ 476: 476] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.908731 75498 usertrap_amd64.go:212] [ 476: 476] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.908777 75498 usertrap_amd64.go:122] [ 476: 476] Allocate a new trap: 0xc0002de060 10 D0725 14:31:42.908826 75498 usertrap_amd64.go:225] [ 476: 476] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.909777 75498 usertrap_amd64.go:212] [ 476: 476] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.909843 75498 usertrap_amd64.go:122] [ 476: 476] Allocate a new trap: 0xc0002de060 11 D0725 14:31:42.909906 75498 usertrap_amd64.go:225] [ 476: 476] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.911171 75498 usertrap_amd64.go:212] [ 476: 476] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.911230 75498 usertrap_amd64.go:122] [ 476: 476] Allocate a new trap: 0xc0002de060 12 D0725 14:31:42.911314 75498 usertrap_amd64.go:225] [ 476: 476] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.912967 75498 usertrap_amd64.go:212] [ 476: 476] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.913011 75498 usertrap_amd64.go:122] [ 476: 476] Allocate a new trap: 0xc0002de060 13 D0725 14:31:42.913052 75498 usertrap_amd64.go:225] [ 476: 476] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.913211 75498 usertrap_amd64.go:212] [ 476: 476] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.913252 75498 usertrap_amd64.go:122] [ 476: 476] Allocate a new trap: 0xc0002de060 14 D0725 14:31:42.913296 75498 usertrap_amd64.go:225] [ 476: 476] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.936167 75498 task_signals.go:470] [ 477: 477] Notified of signal 56 D0725 14:31:42.936427 75498 task_signals.go:204] [ 477: 477] Signal 477, PID: 477, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.936523 75498 task_exit.go:204] [ 477: 477] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.937820 75498 task_exit.go:204] [ 477: 477] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.938746 75498 task_exit.go:204] [ 476: 476] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.940771 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.940903 75498 task_exit.go:204] [ 476: 476] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.941036 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.941048 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.941091 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.941672 75498 task_exit.go:204] [ 476: 476] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.944647 75498 usertrap_amd64.go:212] [ 478: 478] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.944750 75498 usertrap_amd64.go:122] [ 478: 478] Allocate a new trap: 0xc004bcc210 9 D0725 14:31:42.945152 75498 usertrap_amd64.go:225] [ 478: 478] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.947907 75498 usertrap_amd64.go:212] [ 478: 478] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.947974 75498 usertrap_amd64.go:122] [ 478: 478] Allocate a new trap: 0xc004bcc210 10 D0725 14:31:42.948047 75498 usertrap_amd64.go:225] [ 478: 478] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.949179 75498 usertrap_amd64.go:212] [ 478: 478] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.949236 75498 usertrap_amd64.go:122] [ 478: 478] Allocate a new trap: 0xc004bcc210 11 D0725 14:31:42.949283 75498 usertrap_amd64.go:225] [ 478: 478] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.950609 75498 usertrap_amd64.go:212] [ 478: 478] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.950665 75498 usertrap_amd64.go:122] [ 478: 478] Allocate a new trap: 0xc004bcc210 12 D0725 14:31:42.950733 75498 usertrap_amd64.go:225] [ 478: 478] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.952918 75498 usertrap_amd64.go:212] [ 478: 478] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.952967 75498 usertrap_amd64.go:122] [ 478: 478] Allocate a new trap: 0xc004bcc210 13 D0725 14:31:42.953014 75498 usertrap_amd64.go:225] [ 478: 478] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.953202 75498 usertrap_amd64.go:212] [ 478: 478] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.953240 75498 usertrap_amd64.go:122] [ 478: 478] Allocate a new trap: 0xc004bcc210 14 D0725 14:31:42.953280 75498 usertrap_amd64.go:225] [ 478: 478] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:42.975651 75498 task_signals.go:470] [ 479: 479] Notified of signal 56 D0725 14:31:42.975795 75498 task_signals.go:204] [ 479: 479] Signal 479, PID: 479, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:42.975912 75498 task_exit.go:204] [ 479: 479] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.977391 75498 task_exit.go:204] [ 479: 479] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.978136 75498 task_exit.go:204] [ 478: 478] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:42.980067 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:42.980152 75498 task_exit.go:204] [ 478: 478] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:42.980221 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:42.980244 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:42.980309 75498 task_exit.go:204] [ 478: 478] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:42.980323 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:42.982810 75498 usertrap_amd64.go:212] [ 480: 480] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:42.982869 75498 usertrap_amd64.go:122] [ 480: 480] Allocate a new trap: 0xc006ef21e0 9 D0725 14:31:42.983189 75498 usertrap_amd64.go:225] [ 480: 480] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:42.985286 75498 usertrap_amd64.go:212] [ 480: 480] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:42.985345 75498 usertrap_amd64.go:122] [ 480: 480] Allocate a new trap: 0xc006ef21e0 10 D0725 14:31:42.985394 75498 usertrap_amd64.go:225] [ 480: 480] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:42.986445 75498 usertrap_amd64.go:212] [ 480: 480] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:42.986495 75498 usertrap_amd64.go:122] [ 480: 480] Allocate a new trap: 0xc006ef21e0 11 D0725 14:31:42.986546 75498 usertrap_amd64.go:225] [ 480: 480] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:42.987770 75498 usertrap_amd64.go:212] [ 480: 480] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:42.987832 75498 usertrap_amd64.go:122] [ 480: 480] Allocate a new trap: 0xc006ef21e0 12 D0725 14:31:42.987911 75498 usertrap_amd64.go:225] [ 480: 480] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:42.989491 75498 usertrap_amd64.go:212] [ 480: 480] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:42.989544 75498 usertrap_amd64.go:122] [ 480: 480] Allocate a new trap: 0xc006ef21e0 13 D0725 14:31:42.989597 75498 usertrap_amd64.go:225] [ 480: 480] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:42.989764 75498 usertrap_amd64.go:212] [ 480: 480] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:42.989803 75498 usertrap_amd64.go:122] [ 480: 480] Allocate a new trap: 0xc006ef21e0 14 D0725 14:31:42.989862 75498 usertrap_amd64.go:225] [ 480: 480] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.012750 75498 task_signals.go:470] [ 481: 481] Notified of signal 56 D0725 14:31:43.012929 75498 task_signals.go:204] [ 481: 481] Signal 481, PID: 481, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.013014 75498 task_exit.go:204] [ 481: 481] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.014481 75498 task_exit.go:204] [ 481: 481] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.015303 75498 task_exit.go:204] [ 480: 480] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.017396 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.017497 75498 task_exit.go:204] [ 480: 480] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.017554 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.017628 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.017697 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.018067 75498 task_exit.go:204] [ 480: 480] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.020898 75498 usertrap_amd64.go:212] [ 482: 482] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.020985 75498 usertrap_amd64.go:122] [ 482: 482] Allocate a new trap: 0xc0015bcc00 9 D0725 14:31:43.021375 75498 usertrap_amd64.go:225] [ 482: 482] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.024253 75498 usertrap_amd64.go:212] [ 482: 482] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.024313 75498 usertrap_amd64.go:122] [ 482: 482] Allocate a new trap: 0xc0015bcc00 10 D0725 14:31:43.024368 75498 usertrap_amd64.go:225] [ 482: 482] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.025522 75498 usertrap_amd64.go:212] [ 482: 482] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.025565 75498 usertrap_amd64.go:122] [ 482: 482] Allocate a new trap: 0xc0015bcc00 11 D0725 14:31:43.025612 75498 usertrap_amd64.go:225] [ 482: 482] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.027108 75498 usertrap_amd64.go:212] [ 482: 482] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.027188 75498 usertrap_amd64.go:122] [ 482: 482] Allocate a new trap: 0xc0015bcc00 12 D0725 14:31:43.027239 75498 usertrap_amd64.go:225] [ 482: 482] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.029416 75498 usertrap_amd64.go:212] [ 482: 482] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.029490 75498 usertrap_amd64.go:122] [ 482: 482] Allocate a new trap: 0xc0015bcc00 13 D0725 14:31:43.029579 75498 usertrap_amd64.go:225] [ 482: 482] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.029813 75498 usertrap_amd64.go:212] [ 482: 482] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.029868 75498 usertrap_amd64.go:122] [ 482: 482] Allocate a new trap: 0xc0015bcc00 14 D0725 14:31:43.029945 75498 usertrap_amd64.go:225] [ 482: 482] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.051989 75498 task_signals.go:470] [ 483: 483] Notified of signal 56 D0725 14:31:43.052100 75498 task_signals.go:204] [ 483: 483] Signal 483, PID: 483, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.052180 75498 task_exit.go:204] [ 483: 483] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.053603 75498 task_exit.go:204] [ 483: 483] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.054416 75498 task_exit.go:204] [ 482: 482] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.056246 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.056345 75498 task_exit.go:204] [ 482: 482] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.056417 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.056405 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.056483 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.056961 75498 task_exit.go:204] [ 482: 482] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.059770 75498 usertrap_amd64.go:212] [ 484: 484] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.059879 75498 usertrap_amd64.go:122] [ 484: 484] Allocate a new trap: 0xc0015bd170 9 D0725 14:31:43.060307 75498 usertrap_amd64.go:225] [ 484: 484] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.063190 75498 usertrap_amd64.go:212] [ 484: 484] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.063247 75498 usertrap_amd64.go:122] [ 484: 484] Allocate a new trap: 0xc0015bd170 10 D0725 14:31:43.063314 75498 usertrap_amd64.go:225] [ 484: 484] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.064482 75498 usertrap_amd64.go:212] [ 484: 484] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.064534 75498 usertrap_amd64.go:122] [ 484: 484] Allocate a new trap: 0xc0015bd170 11 D0725 14:31:43.064592 75498 usertrap_amd64.go:225] [ 484: 484] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.066058 75498 usertrap_amd64.go:212] [ 484: 484] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.066124 75498 usertrap_amd64.go:122] [ 484: 484] Allocate a new trap: 0xc0015bd170 12 D0725 14:31:43.066181 75498 usertrap_amd64.go:225] [ 484: 484] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.068098 75498 usertrap_amd64.go:212] [ 484: 484] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.068153 75498 usertrap_amd64.go:122] [ 484: 484] Allocate a new trap: 0xc0015bd170 13 D0725 14:31:43.068204 75498 usertrap_amd64.go:225] [ 484: 484] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.068361 75498 usertrap_amd64.go:212] [ 484: 484] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.068396 75498 usertrap_amd64.go:122] [ 484: 484] Allocate a new trap: 0xc0015bd170 14 D0725 14:31:43.068450 75498 usertrap_amd64.go:225] [ 484: 484] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.091820 75498 task_signals.go:470] [ 485: 485] Notified of signal 56 D0725 14:31:43.091924 75498 task_signals.go:204] [ 485: 485] Signal 485, PID: 485, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.092014 75498 task_exit.go:204] [ 485: 485] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.093677 75498 task_exit.go:204] [ 485: 485] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.094355 75498 task_exit.go:204] [ 484: 484] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.096712 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.096823 75498 task_exit.go:204] [ 484: 484] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.096868 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.096962 75498 task_exit.go:204] [ 484: 484] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.096970 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.097043 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.099803 75498 usertrap_amd64.go:212] [ 486: 486] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.099903 75498 usertrap_amd64.go:122] [ 486: 486] Allocate a new trap: 0xc0002df650 9 D0725 14:31:43.100282 75498 usertrap_amd64.go:225] [ 486: 486] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.102650 75498 usertrap_amd64.go:212] [ 486: 486] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.102707 75498 usertrap_amd64.go:122] [ 486: 486] Allocate a new trap: 0xc0002df650 10 D0725 14:31:43.102758 75498 usertrap_amd64.go:225] [ 486: 486] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.103574 75498 usertrap_amd64.go:212] [ 486: 486] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.103649 75498 usertrap_amd64.go:122] [ 486: 486] Allocate a new trap: 0xc0002df650 11 D0725 14:31:43.103701 75498 usertrap_amd64.go:225] [ 486: 486] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.104774 75498 usertrap_amd64.go:212] [ 486: 486] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.104816 75498 usertrap_amd64.go:122] [ 486: 486] Allocate a new trap: 0xc0002df650 12 D0725 14:31:43.104857 75498 usertrap_amd64.go:225] [ 486: 486] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.106280 75498 usertrap_amd64.go:212] [ 486: 486] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.106338 75498 usertrap_amd64.go:122] [ 486: 486] Allocate a new trap: 0xc0002df650 13 D0725 14:31:43.106389 75498 usertrap_amd64.go:225] [ 486: 486] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.106605 75498 usertrap_amd64.go:212] [ 486: 486] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.106665 75498 usertrap_amd64.go:122] [ 486: 486] Allocate a new trap: 0xc0002df650 14 D0725 14:31:43.106732 75498 usertrap_amd64.go:225] [ 486: 486] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.129422 75498 task_signals.go:470] [ 487: 487] Notified of signal 56 D0725 14:31:43.129671 75498 task_signals.go:204] [ 487: 487] Signal 487, PID: 487, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.129792 75498 task_exit.go:204] [ 487: 487] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.131312 75498 task_exit.go:204] [ 487: 487] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.132376 75498 task_exit.go:204] [ 486: 486] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.134155 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.134268 75498 task_exit.go:204] [ 486: 486] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.134324 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.134411 75498 task_exit.go:204] [ 486: 486] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.134512 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.134570 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.137343 75498 usertrap_amd64.go:212] [ 488: 488] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.137441 75498 usertrap_amd64.go:122] [ 488: 488] Allocate a new trap: 0xc006ef2780 9 D0725 14:31:43.137827 75498 usertrap_amd64.go:225] [ 488: 488] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.140090 75498 usertrap_amd64.go:212] [ 488: 488] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.140141 75498 usertrap_amd64.go:122] [ 488: 488] Allocate a new trap: 0xc006ef2780 10 D0725 14:31:43.140185 75498 usertrap_amd64.go:225] [ 488: 488] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.141189 75498 usertrap_amd64.go:212] [ 488: 488] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.141231 75498 usertrap_amd64.go:122] [ 488: 488] Allocate a new trap: 0xc006ef2780 11 D0725 14:31:43.141272 75498 usertrap_amd64.go:225] [ 488: 488] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.142495 75498 usertrap_amd64.go:212] [ 488: 488] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.142544 75498 usertrap_amd64.go:122] [ 488: 488] Allocate a new trap: 0xc006ef2780 12 D0725 14:31:43.142592 75498 usertrap_amd64.go:225] [ 488: 488] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.144214 75498 usertrap_amd64.go:212] [ 488: 488] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.144260 75498 usertrap_amd64.go:122] [ 488: 488] Allocate a new trap: 0xc006ef2780 13 D0725 14:31:43.144323 75498 usertrap_amd64.go:225] [ 488: 488] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.144501 75498 usertrap_amd64.go:212] [ 488: 488] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.144564 75498 usertrap_amd64.go:122] [ 488: 488] Allocate a new trap: 0xc006ef2780 14 D0725 14:31:43.144623 75498 usertrap_amd64.go:225] [ 488: 488] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.167780 75498 task_signals.go:470] [ 489: 489] Notified of signal 56 D0725 14:31:43.167908 75498 task_signals.go:204] [ 489: 489] Signal 489, PID: 489, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.167982 75498 task_exit.go:204] [ 489: 489] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.169302 75498 task_exit.go:204] [ 489: 489] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.170378 75498 task_exit.go:204] [ 488: 488] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.172236 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.172336 75498 task_exit.go:204] [ 488: 488] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.172411 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.172463 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.172514 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.173308 75498 task_exit.go:204] [ 488: 488] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.176069 75498 usertrap_amd64.go:212] [ 490: 490] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.176146 75498 usertrap_amd64.go:122] [ 490: 490] Allocate a new trap: 0xc000bdc000 9 D0725 14:31:43.176554 75498 usertrap_amd64.go:225] [ 490: 490] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.179013 75498 usertrap_amd64.go:212] [ 490: 490] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.179071 75498 usertrap_amd64.go:122] [ 490: 490] Allocate a new trap: 0xc000bdc000 10 D0725 14:31:43.179127 75498 usertrap_amd64.go:225] [ 490: 490] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.180054 75498 usertrap_amd64.go:212] [ 490: 490] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.180106 75498 usertrap_amd64.go:122] [ 490: 490] Allocate a new trap: 0xc000bdc000 11 D0725 14:31:43.180199 75498 usertrap_amd64.go:225] [ 490: 490] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.181288 75498 usertrap_amd64.go:212] [ 490: 490] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.181338 75498 usertrap_amd64.go:122] [ 490: 490] Allocate a new trap: 0xc000bdc000 12 D0725 14:31:43.181385 75498 usertrap_amd64.go:225] [ 490: 490] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.182940 75498 usertrap_amd64.go:212] [ 490: 490] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.182980 75498 usertrap_amd64.go:122] [ 490: 490] Allocate a new trap: 0xc000bdc000 13 D0725 14:31:43.183058 75498 usertrap_amd64.go:225] [ 490: 490] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.183258 75498 usertrap_amd64.go:212] [ 490: 490] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.183299 75498 usertrap_amd64.go:122] [ 490: 490] Allocate a new trap: 0xc000bdc000 14 D0725 14:31:43.183338 75498 usertrap_amd64.go:225] [ 490: 490] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.205805 75498 task_signals.go:470] [ 491: 491] Notified of signal 56 D0725 14:31:43.205995 75498 task_signals.go:204] [ 491: 491] Signal 491, PID: 491, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.206074 75498 task_exit.go:204] [ 491: 491] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.207321 75498 task_exit.go:204] [ 491: 491] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.208251 75498 task_exit.go:204] [ 490: 490] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.210316 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.210392 75498 task_exit.go:204] [ 490: 490] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.210439 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.210540 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.210592 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.210992 75498 task_exit.go:204] [ 490: 490] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.213831 75498 usertrap_amd64.go:212] [ 492: 492] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.213900 75498 usertrap_amd64.go:122] [ 492: 492] Allocate a new trap: 0xc006ef2870 9 D0725 14:31:43.214278 75498 usertrap_amd64.go:225] [ 492: 492] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.216546 75498 usertrap_amd64.go:212] [ 492: 492] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.216622 75498 usertrap_amd64.go:122] [ 492: 492] Allocate a new trap: 0xc006ef2870 10 D0725 14:31:43.216702 75498 usertrap_amd64.go:225] [ 492: 492] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.217735 75498 usertrap_amd64.go:212] [ 492: 492] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.217776 75498 usertrap_amd64.go:122] [ 492: 492] Allocate a new trap: 0xc006ef2870 11 D0725 14:31:43.217847 75498 usertrap_amd64.go:225] [ 492: 492] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.219231 75498 usertrap_amd64.go:212] [ 492: 492] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.219277 75498 usertrap_amd64.go:122] [ 492: 492] Allocate a new trap: 0xc006ef2870 12 D0725 14:31:43.219336 75498 usertrap_amd64.go:225] [ 492: 492] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.221153 75498 usertrap_amd64.go:212] [ 492: 492] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.221213 75498 usertrap_amd64.go:122] [ 492: 492] Allocate a new trap: 0xc006ef2870 13 D0725 14:31:43.221313 75498 usertrap_amd64.go:225] [ 492: 492] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.221526 75498 usertrap_amd64.go:212] [ 492: 492] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.221562 75498 usertrap_amd64.go:122] [ 492: 492] Allocate a new trap: 0xc006ef2870 14 D0725 14:31:43.221603 75498 usertrap_amd64.go:225] [ 492: 492] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.243825 75498 task_signals.go:470] [ 493: 493] Notified of signal 56 D0725 14:31:43.244001 75498 task_signals.go:204] [ 493: 493] Signal 493, PID: 493, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.244078 75498 task_exit.go:204] [ 493: 493] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.245447 75498 task_exit.go:204] [ 493: 493] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.246402 75498 task_exit.go:204] [ 492: 492] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.248162 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.248234 75498 task_exit.go:204] [ 492: 492] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.248290 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.248297 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.248371 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.249060 75498 task_exit.go:204] [ 492: 492] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.251665 75498 usertrap_amd64.go:212] [ 494: 494] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.251740 75498 usertrap_amd64.go:122] [ 494: 494] Allocate a new trap: 0xc000480750 9 D0725 14:31:43.252042 75498 usertrap_amd64.go:225] [ 494: 494] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.254279 75498 usertrap_amd64.go:212] [ 494: 494] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.254341 75498 usertrap_amd64.go:122] [ 494: 494] Allocate a new trap: 0xc000480750 10 D0725 14:31:43.254404 75498 usertrap_amd64.go:225] [ 494: 494] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.255314 75498 usertrap_amd64.go:212] [ 494: 494] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.255387 75498 usertrap_amd64.go:122] [ 494: 494] Allocate a new trap: 0xc000480750 11 D0725 14:31:43.255439 75498 usertrap_amd64.go:225] [ 494: 494] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.256640 75498 usertrap_amd64.go:212] [ 494: 494] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.256703 75498 usertrap_amd64.go:122] [ 494: 494] Allocate a new trap: 0xc000480750 12 D0725 14:31:43.256759 75498 usertrap_amd64.go:225] [ 494: 494] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.258173 75498 usertrap_amd64.go:212] [ 494: 494] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.258224 75498 usertrap_amd64.go:122] [ 494: 494] Allocate a new trap: 0xc000480750 13 D0725 14:31:43.258270 75498 usertrap_amd64.go:225] [ 494: 494] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.258431 75498 usertrap_amd64.go:212] [ 494: 494] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.258479 75498 usertrap_amd64.go:122] [ 494: 494] Allocate a new trap: 0xc000480750 14 D0725 14:31:43.258532 75498 usertrap_amd64.go:225] [ 494: 494] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.278583 75498 task_signals.go:470] [ 495: 495] Notified of signal 56 D0725 14:31:43.278751 75498 task_signals.go:204] [ 495: 495] Signal 495, PID: 495, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.278866 75498 task_exit.go:204] [ 495: 495] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.280380 75498 task_exit.go:204] [ 495: 495] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.280825 75498 task_exit.go:204] [ 494: 494] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.282392 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.282457 75498 task_exit.go:204] [ 494: 494] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.282523 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.282535 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.282581 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.282654 75498 task_exit.go:204] [ 494: 494] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.285392 75498 usertrap_amd64.go:212] [ 496: 496] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.285464 75498 usertrap_amd64.go:122] [ 496: 496] Allocate a new trap: 0xc005fc1380 9 D0725 14:31:43.285765 75498 usertrap_amd64.go:225] [ 496: 496] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.287720 75498 usertrap_amd64.go:212] [ 496: 496] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.287771 75498 usertrap_amd64.go:122] [ 496: 496] Allocate a new trap: 0xc005fc1380 10 D0725 14:31:43.287825 75498 usertrap_amd64.go:225] [ 496: 496] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.288874 75498 usertrap_amd64.go:212] [ 496: 496] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.288917 75498 usertrap_amd64.go:122] [ 496: 496] Allocate a new trap: 0xc005fc1380 11 D0725 14:31:43.288962 75498 usertrap_amd64.go:225] [ 496: 496] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.290067 75498 usertrap_amd64.go:212] [ 496: 496] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.290107 75498 usertrap_amd64.go:122] [ 496: 496] Allocate a new trap: 0xc005fc1380 12 D0725 14:31:43.290147 75498 usertrap_amd64.go:225] [ 496: 496] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.291574 75498 usertrap_amd64.go:212] [ 496: 496] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.291640 75498 usertrap_amd64.go:122] [ 496: 496] Allocate a new trap: 0xc005fc1380 13 D0725 14:31:43.291683 75498 usertrap_amd64.go:225] [ 496: 496] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.291842 75498 usertrap_amd64.go:212] [ 496: 496] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.291886 75498 usertrap_amd64.go:122] [ 496: 496] Allocate a new trap: 0xc005fc1380 14 D0725 14:31:43.291934 75498 usertrap_amd64.go:225] [ 496: 496] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.313417 75498 task_signals.go:470] [ 497: 497] Notified of signal 56 D0725 14:31:43.313551 75498 task_signals.go:204] [ 497: 497] Signal 497, PID: 497, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.313615 75498 task_exit.go:204] [ 497: 497] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.315156 75498 task_exit.go:204] [ 497: 497] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.315728 75498 task_exit.go:204] [ 496: 496] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.317475 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.317560 75498 task_exit.go:204] [ 496: 496] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.317614 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.317675 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.317624 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.318074 75498 task_exit.go:204] [ 496: 496] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.320612 75498 usertrap_amd64.go:212] [ 498: 498] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.320690 75498 usertrap_amd64.go:122] [ 498: 498] Allocate a new trap: 0xc005fc1c80 9 D0725 14:31:43.321052 75498 usertrap_amd64.go:225] [ 498: 498] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.323336 75498 usertrap_amd64.go:212] [ 498: 498] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.323392 75498 usertrap_amd64.go:122] [ 498: 498] Allocate a new trap: 0xc005fc1c80 10 D0725 14:31:43.323465 75498 usertrap_amd64.go:225] [ 498: 498] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.324615 75498 usertrap_amd64.go:212] [ 498: 498] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.324674 75498 usertrap_amd64.go:122] [ 498: 498] Allocate a new trap: 0xc005fc1c80 11 D0725 14:31:43.324729 75498 usertrap_amd64.go:225] [ 498: 498] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.326125 75498 usertrap_amd64.go:212] [ 498: 498] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.326175 75498 usertrap_amd64.go:122] [ 498: 498] Allocate a new trap: 0xc005fc1c80 12 D0725 14:31:43.326231 75498 usertrap_amd64.go:225] [ 498: 498] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.328016 75498 usertrap_amd64.go:212] [ 498: 498] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.328076 75498 usertrap_amd64.go:122] [ 498: 498] Allocate a new trap: 0xc005fc1c80 13 D0725 14:31:43.328140 75498 usertrap_amd64.go:225] [ 498: 498] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.328372 75498 usertrap_amd64.go:212] [ 498: 498] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.328421 75498 usertrap_amd64.go:122] [ 498: 498] Allocate a new trap: 0xc005fc1c80 14 D0725 14:31:43.328471 75498 usertrap_amd64.go:225] [ 498: 498] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.352333 75498 task_signals.go:470] [ 499: 499] Notified of signal 56 D0725 14:31:43.352569 75498 task_signals.go:204] [ 499: 499] Signal 499, PID: 499, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.352672 75498 task_exit.go:204] [ 499: 499] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.354074 75498 task_exit.go:204] [ 499: 499] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.354578 75498 task_exit.go:204] [ 498: 498] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.356480 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.356554 75498 task_exit.go:204] [ 498: 498] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.356592 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.356617 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.356677 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.357220 75498 task_exit.go:204] [ 498: 498] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.359667 75498 usertrap_amd64.go:212] [ 500: 500] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.359736 75498 usertrap_amd64.go:122] [ 500: 500] Allocate a new trap: 0xc0002dfe30 9 D0725 14:31:43.360067 75498 usertrap_amd64.go:225] [ 500: 500] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.361886 75498 usertrap_amd64.go:212] [ 500: 500] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.361926 75498 usertrap_amd64.go:122] [ 500: 500] Allocate a new trap: 0xc0002dfe30 10 D0725 14:31:43.361972 75498 usertrap_amd64.go:225] [ 500: 500] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.362736 75498 usertrap_amd64.go:212] [ 500: 500] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.362790 75498 usertrap_amd64.go:122] [ 500: 500] Allocate a new trap: 0xc0002dfe30 11 D0725 14:31:43.362838 75498 usertrap_amd64.go:225] [ 500: 500] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.363905 75498 usertrap_amd64.go:212] [ 500: 500] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.363963 75498 usertrap_amd64.go:122] [ 500: 500] Allocate a new trap: 0xc0002dfe30 12 D0725 14:31:43.364016 75498 usertrap_amd64.go:225] [ 500: 500] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.365435 75498 usertrap_amd64.go:212] [ 500: 500] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.365478 75498 usertrap_amd64.go:122] [ 500: 500] Allocate a new trap: 0xc0002dfe30 13 D0725 14:31:43.365530 75498 usertrap_amd64.go:225] [ 500: 500] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.365722 75498 usertrap_amd64.go:212] [ 500: 500] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.365755 75498 usertrap_amd64.go:122] [ 500: 500] Allocate a new trap: 0xc0002dfe30 14 D0725 14:31:43.365808 75498 usertrap_amd64.go:225] [ 500: 500] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.386982 75498 task_signals.go:470] [ 501: 501] Notified of signal 56 D0725 14:31:43.387114 75498 task_signals.go:204] [ 501: 501] Signal 501, PID: 501, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.387220 75498 task_exit.go:204] [ 501: 501] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.388618 75498 task_exit.go:204] [ 501: 501] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.389557 75498 task_exit.go:204] [ 500: 500] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.391283 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.391360 75498 task_exit.go:204] [ 500: 500] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.391422 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.391439 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.391505 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.391865 75498 task_exit.go:204] [ 500: 500] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.394470 75498 usertrap_amd64.go:212] [ 502: 502] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.394549 75498 usertrap_amd64.go:122] [ 502: 502] Allocate a new trap: 0xc0002e4450 9 D0725 14:31:43.394815 75498 usertrap_amd64.go:225] [ 502: 502] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.397135 75498 usertrap_amd64.go:212] [ 502: 502] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.397188 75498 usertrap_amd64.go:122] [ 502: 502] Allocate a new trap: 0xc0002e4450 10 D0725 14:31:43.397246 75498 usertrap_amd64.go:225] [ 502: 502] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.397979 75498 usertrap_amd64.go:212] [ 502: 502] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.398023 75498 usertrap_amd64.go:122] [ 502: 502] Allocate a new trap: 0xc0002e4450 11 D0725 14:31:43.398064 75498 usertrap_amd64.go:225] [ 502: 502] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.399335 75498 usertrap_amd64.go:212] [ 502: 502] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.399389 75498 usertrap_amd64.go:122] [ 502: 502] Allocate a new trap: 0xc0002e4450 12 D0725 14:31:43.399457 75498 usertrap_amd64.go:225] [ 502: 502] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.401042 75498 usertrap_amd64.go:212] [ 502: 502] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.401095 75498 usertrap_amd64.go:122] [ 502: 502] Allocate a new trap: 0xc0002e4450 13 D0725 14:31:43.401147 75498 usertrap_amd64.go:225] [ 502: 502] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.401354 75498 usertrap_amd64.go:212] [ 502: 502] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.401398 75498 usertrap_amd64.go:122] [ 502: 502] Allocate a new trap: 0xc0002e4450 14 D0725 14:31:43.401444 75498 usertrap_amd64.go:225] [ 502: 502] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.422589 75498 task_signals.go:470] [ 503: 503] Notified of signal 56 D0725 14:31:43.422942 75498 task_signals.go:204] [ 503: 503] Signal 503, PID: 503, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.423055 75498 task_exit.go:204] [ 503: 503] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.424707 75498 task_exit.go:204] [ 503: 503] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.425915 75498 task_exit.go:204] [ 502: 502] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.428262 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.428365 75498 task_exit.go:204] [ 502: 502] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.428430 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.428457 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.428484 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.428970 75498 task_exit.go:204] [ 502: 502] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.431852 75498 usertrap_amd64.go:212] [ 504: 504] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.431925 75498 usertrap_amd64.go:122] [ 504: 504] Allocate a new trap: 0xc0002e4990 9 D0725 14:31:43.432256 75498 usertrap_amd64.go:225] [ 504: 504] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.434146 75498 usertrap_amd64.go:212] [ 504: 504] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.434190 75498 usertrap_amd64.go:122] [ 504: 504] Allocate a new trap: 0xc0002e4990 10 D0725 14:31:43.434242 75498 usertrap_amd64.go:225] [ 504: 504] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.435085 75498 usertrap_amd64.go:212] [ 504: 504] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.435143 75498 usertrap_amd64.go:122] [ 504: 504] Allocate a new trap: 0xc0002e4990 11 D0725 14:31:43.435203 75498 usertrap_amd64.go:225] [ 504: 504] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.436575 75498 usertrap_amd64.go:212] [ 504: 504] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.436628 75498 usertrap_amd64.go:122] [ 504: 504] Allocate a new trap: 0xc0002e4990 12 D0725 14:31:43.436670 75498 usertrap_amd64.go:225] [ 504: 504] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.438558 75498 usertrap_amd64.go:212] [ 504: 504] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.438613 75498 usertrap_amd64.go:122] [ 504: 504] Allocate a new trap: 0xc0002e4990 13 D0725 14:31:43.438675 75498 usertrap_amd64.go:225] [ 504: 504] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.438938 75498 usertrap_amd64.go:212] [ 504: 504] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.438986 75498 usertrap_amd64.go:122] [ 504: 504] Allocate a new trap: 0xc0002e4990 14 D0725 14:31:43.439044 75498 usertrap_amd64.go:225] [ 504: 504] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.460641 75498 task_signals.go:470] [ 505: 505] Notified of signal 56 D0725 14:31:43.460783 75498 task_signals.go:204] [ 505: 505] Signal 505, PID: 505, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.460872 75498 task_exit.go:204] [ 505: 505] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.462421 75498 task_exit.go:204] [ 505: 505] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.463087 75498 task_exit.go:204] [ 504: 504] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.464914 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.465024 75498 task_exit.go:204] [ 504: 504] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.465070 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.465199 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.465257 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.465553 75498 task_exit.go:204] [ 504: 504] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.468400 75498 usertrap_amd64.go:212] [ 506: 506] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.468469 75498 usertrap_amd64.go:122] [ 506: 506] Allocate a new trap: 0xc003240c00 9 D0725 14:31:43.468900 75498 usertrap_amd64.go:225] [ 506: 506] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.471044 75498 usertrap_amd64.go:212] [ 506: 506] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.471098 75498 usertrap_amd64.go:122] [ 506: 506] Allocate a new trap: 0xc003240c00 10 D0725 14:31:43.471157 75498 usertrap_amd64.go:225] [ 506: 506] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.472220 75498 usertrap_amd64.go:212] [ 506: 506] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.472280 75498 usertrap_amd64.go:122] [ 506: 506] Allocate a new trap: 0xc003240c00 11 D0725 14:31:43.472340 75498 usertrap_amd64.go:225] [ 506: 506] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.473445 75498 usertrap_amd64.go:212] [ 506: 506] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.473486 75498 usertrap_amd64.go:122] [ 506: 506] Allocate a new trap: 0xc003240c00 12 D0725 14:31:43.473548 75498 usertrap_amd64.go:225] [ 506: 506] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.475377 75498 usertrap_amd64.go:212] [ 506: 506] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.475435 75498 usertrap_amd64.go:122] [ 506: 506] Allocate a new trap: 0xc003240c00 13 D0725 14:31:43.475503 75498 usertrap_amd64.go:225] [ 506: 506] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.475789 75498 usertrap_amd64.go:212] [ 506: 506] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.475831 75498 usertrap_amd64.go:122] [ 506: 506] Allocate a new trap: 0xc003240c00 14 D0725 14:31:43.475876 75498 usertrap_amd64.go:225] [ 506: 506] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.497862 75498 task_signals.go:470] [ 507: 507] Notified of signal 56 D0725 14:31:43.497991 75498 task_signals.go:204] [ 507: 507] Signal 507, PID: 507, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.498071 75498 task_exit.go:204] [ 507: 507] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.499470 75498 task_exit.go:204] [ 507: 507] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.500280 75498 task_exit.go:204] [ 506: 506] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.502238 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.502322 75498 task_exit.go:204] [ 506: 506] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.502376 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.502399 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.502425 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.502852 75498 task_exit.go:204] [ 506: 506] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.506191 75498 usertrap_amd64.go:212] [ 508: 508] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.506274 75498 usertrap_amd64.go:122] [ 508: 508] Allocate a new trap: 0xc000bdd9e0 9 D0725 14:31:43.506626 75498 usertrap_amd64.go:225] [ 508: 508] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.508655 75498 usertrap_amd64.go:212] [ 508: 508] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.508715 75498 usertrap_amd64.go:122] [ 508: 508] Allocate a new trap: 0xc000bdd9e0 10 D0725 14:31:43.508780 75498 usertrap_amd64.go:225] [ 508: 508] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.509667 75498 usertrap_amd64.go:212] [ 508: 508] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.509722 75498 usertrap_amd64.go:122] [ 508: 508] Allocate a new trap: 0xc000bdd9e0 11 D0725 14:31:43.509777 75498 usertrap_amd64.go:225] [ 508: 508] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.510809 75498 usertrap_amd64.go:212] [ 508: 508] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.510850 75498 usertrap_amd64.go:122] [ 508: 508] Allocate a new trap: 0xc000bdd9e0 12 D0725 14:31:43.510910 75498 usertrap_amd64.go:225] [ 508: 508] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.512285 75498 usertrap_amd64.go:212] [ 508: 508] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.512326 75498 usertrap_amd64.go:122] [ 508: 508] Allocate a new trap: 0xc000bdd9e0 13 D0725 14:31:43.512377 75498 usertrap_amd64.go:225] [ 508: 508] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.512588 75498 usertrap_amd64.go:212] [ 508: 508] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.512629 75498 usertrap_amd64.go:122] [ 508: 508] Allocate a new trap: 0xc000bdd9e0 14 D0725 14:31:43.512704 75498 usertrap_amd64.go:225] [ 508: 508] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.533664 75498 task_signals.go:470] [ 509: 509] Notified of signal 56 D0725 14:31:43.533829 75498 task_signals.go:204] [ 509: 509] Signal 509, PID: 509, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.533918 75498 task_exit.go:204] [ 509: 509] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.535286 75498 task_exit.go:204] [ 509: 509] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.535930 75498 task_exit.go:204] [ 508: 508] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.537584 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.537655 75498 task_exit.go:204] [ 508: 508] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.537729 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.537713 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.537818 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.537876 75498 task_exit.go:204] [ 508: 508] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.540600 75498 usertrap_amd64.go:212] [ 510: 510] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.540664 75498 usertrap_amd64.go:122] [ 510: 510] Allocate a new trap: 0xc000480ba0 9 D0725 14:31:43.540991 75498 usertrap_amd64.go:225] [ 510: 510] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.542620 75498 usertrap_amd64.go:212] [ 510: 510] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.542660 75498 usertrap_amd64.go:122] [ 510: 510] Allocate a new trap: 0xc000480ba0 10 D0725 14:31:43.542729 75498 usertrap_amd64.go:225] [ 510: 510] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.543447 75498 usertrap_amd64.go:212] [ 510: 510] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.543485 75498 usertrap_amd64.go:122] [ 510: 510] Allocate a new trap: 0xc000480ba0 11 D0725 14:31:43.543558 75498 usertrap_amd64.go:225] [ 510: 510] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.544613 75498 usertrap_amd64.go:212] [ 510: 510] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.544656 75498 usertrap_amd64.go:122] [ 510: 510] Allocate a new trap: 0xc000480ba0 12 D0725 14:31:43.544715 75498 usertrap_amd64.go:225] [ 510: 510] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.546340 75498 usertrap_amd64.go:212] [ 510: 510] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.546398 75498 usertrap_amd64.go:122] [ 510: 510] Allocate a new trap: 0xc000480ba0 13 D0725 14:31:43.546446 75498 usertrap_amd64.go:225] [ 510: 510] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.546608 75498 usertrap_amd64.go:212] [ 510: 510] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.546644 75498 usertrap_amd64.go:122] [ 510: 510] Allocate a new trap: 0xc000480ba0 14 D0725 14:31:43.546685 75498 usertrap_amd64.go:225] [ 510: 510] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.567317 75498 task_signals.go:470] [ 511: 511] Notified of signal 56 D0725 14:31:43.567457 75498 task_signals.go:204] [ 511: 511] Signal 511, PID: 511, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.567559 75498 task_exit.go:204] [ 511: 511] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.569012 75498 task_exit.go:204] [ 511: 511] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.569438 75498 task_exit.go:204] [ 510: 510] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.571174 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.571262 75498 task_exit.go:204] [ 510: 510] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.571335 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.571340 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.571406 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.572168 75498 task_exit.go:204] [ 510: 510] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.574665 75498 usertrap_amd64.go:212] [ 512: 512] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.574733 75498 usertrap_amd64.go:122] [ 512: 512] Allocate a new trap: 0xc0032413b0 9 D0725 14:31:43.575111 75498 usertrap_amd64.go:225] [ 512: 512] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.577087 75498 usertrap_amd64.go:212] [ 512: 512] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.577134 75498 usertrap_amd64.go:122] [ 512: 512] Allocate a new trap: 0xc0032413b0 10 D0725 14:31:43.577188 75498 usertrap_amd64.go:225] [ 512: 512] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.578014 75498 usertrap_amd64.go:212] [ 512: 512] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.578055 75498 usertrap_amd64.go:122] [ 512: 512] Allocate a new trap: 0xc0032413b0 11 D0725 14:31:43.578107 75498 usertrap_amd64.go:225] [ 512: 512] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.579126 75498 usertrap_amd64.go:212] [ 512: 512] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.579181 75498 usertrap_amd64.go:122] [ 512: 512] Allocate a new trap: 0xc0032413b0 12 D0725 14:31:43.579236 75498 usertrap_amd64.go:225] [ 512: 512] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.580961 75498 usertrap_amd64.go:212] [ 512: 512] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.581006 75498 usertrap_amd64.go:122] [ 512: 512] Allocate a new trap: 0xc0032413b0 13 D0725 14:31:43.581049 75498 usertrap_amd64.go:225] [ 512: 512] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.581324 75498 usertrap_amd64.go:212] [ 512: 512] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.581449 75498 usertrap_amd64.go:122] [ 512: 512] Allocate a new trap: 0xc0032413b0 14 D0725 14:31:43.581544 75498 usertrap_amd64.go:225] [ 512: 512] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.602359 75498 task_signals.go:470] [ 513: 513] Notified of signal 56 D0725 14:31:43.602477 75498 task_signals.go:204] [ 513: 513] Signal 513, PID: 513, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.602580 75498 task_exit.go:204] [ 513: 513] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.604282 75498 task_exit.go:204] [ 513: 513] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.604924 75498 task_exit.go:204] [ 512: 512] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.606804 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.606896 75498 task_exit.go:204] [ 512: 512] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.606955 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.606951 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.607003 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.607372 75498 task_exit.go:204] [ 512: 512] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.609831 75498 usertrap_amd64.go:212] [ 514: 514] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.609905 75498 usertrap_amd64.go:122] [ 514: 514] Allocate a new trap: 0xc003241950 9 D0725 14:31:43.610180 75498 usertrap_amd64.go:225] [ 514: 514] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.612021 75498 usertrap_amd64.go:212] [ 514: 514] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.612062 75498 usertrap_amd64.go:122] [ 514: 514] Allocate a new trap: 0xc003241950 10 D0725 14:31:43.612113 75498 usertrap_amd64.go:225] [ 514: 514] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.612941 75498 usertrap_amd64.go:212] [ 514: 514] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.613000 75498 usertrap_amd64.go:122] [ 514: 514] Allocate a new trap: 0xc003241950 11 D0725 14:31:43.613075 75498 usertrap_amd64.go:225] [ 514: 514] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.614048 75498 usertrap_amd64.go:212] [ 514: 514] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.614090 75498 usertrap_amd64.go:122] [ 514: 514] Allocate a new trap: 0xc003241950 12 D0725 14:31:43.614149 75498 usertrap_amd64.go:225] [ 514: 514] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.615504 75498 usertrap_amd64.go:212] [ 514: 514] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.615559 75498 usertrap_amd64.go:122] [ 514: 514] Allocate a new trap: 0xc003241950 13 D0725 14:31:43.615616 75498 usertrap_amd64.go:225] [ 514: 514] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.615779 75498 usertrap_amd64.go:212] [ 514: 514] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.615822 75498 usertrap_amd64.go:122] [ 514: 514] Allocate a new trap: 0xc003241950 14 D0725 14:31:43.615877 75498 usertrap_amd64.go:225] [ 514: 514] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.637523 75498 task_signals.go:470] [ 515: 515] Notified of signal 56 D0725 14:31:43.637672 75498 task_signals.go:204] [ 515: 515] Signal 515, PID: 515, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.637773 75498 task_exit.go:204] [ 515: 515] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.639567 75498 task_exit.go:204] [ 515: 515] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.640059 75498 task_exit.go:204] [ 514: 514] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.641895 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.641998 75498 task_exit.go:204] [ 514: 514] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.642056 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.642117 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.642136 75498 task_exit.go:204] [ 514: 514] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.642190 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.644785 75498 usertrap_amd64.go:212] [ 516: 516] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.644869 75498 usertrap_amd64.go:122] [ 516: 516] Allocate a new trap: 0xc006ef32c0 9 D0725 14:31:43.645214 75498 usertrap_amd64.go:225] [ 516: 516] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.647080 75498 usertrap_amd64.go:212] [ 516: 516] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.647131 75498 usertrap_amd64.go:122] [ 516: 516] Allocate a new trap: 0xc006ef32c0 10 D0725 14:31:43.647187 75498 usertrap_amd64.go:225] [ 516: 516] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.648068 75498 usertrap_amd64.go:212] [ 516: 516] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.648126 75498 usertrap_amd64.go:122] [ 516: 516] Allocate a new trap: 0xc006ef32c0 11 D0725 14:31:43.648187 75498 usertrap_amd64.go:225] [ 516: 516] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.649136 75498 usertrap_amd64.go:212] [ 516: 516] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.649194 75498 usertrap_amd64.go:122] [ 516: 516] Allocate a new trap: 0xc006ef32c0 12 D0725 14:31:43.649235 75498 usertrap_amd64.go:225] [ 516: 516] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.650600 75498 usertrap_amd64.go:212] [ 516: 516] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.650664 75498 usertrap_amd64.go:122] [ 516: 516] Allocate a new trap: 0xc006ef32c0 13 D0725 14:31:43.650706 75498 usertrap_amd64.go:225] [ 516: 516] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.650929 75498 usertrap_amd64.go:212] [ 516: 516] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.650973 75498 usertrap_amd64.go:122] [ 516: 516] Allocate a new trap: 0xc006ef32c0 14 D0725 14:31:43.651021 75498 usertrap_amd64.go:225] [ 516: 516] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.672101 75498 task_signals.go:470] [ 517: 517] Notified of signal 56 D0725 14:31:43.672403 75498 task_signals.go:204] [ 517: 517] Signal 517, PID: 517, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.672488 75498 task_exit.go:204] [ 517: 517] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.674129 75498 task_exit.go:204] [ 517: 517] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.675337 75498 task_exit.go:204] [ 516: 516] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.676994 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.677099 75498 task_exit.go:204] [ 516: 516] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.677143 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.677257 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.677318 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.677310 75498 task_exit.go:204] [ 516: 516] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.679843 75498 usertrap_amd64.go:212] [ 518: 518] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.679932 75498 usertrap_amd64.go:122] [ 518: 518] Allocate a new trap: 0xc000481620 9 D0725 14:31:43.680306 75498 usertrap_amd64.go:225] [ 518: 518] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.682189 75498 usertrap_amd64.go:212] [ 518: 518] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.682241 75498 usertrap_amd64.go:122] [ 518: 518] Allocate a new trap: 0xc000481620 10 D0725 14:31:43.682334 75498 usertrap_amd64.go:225] [ 518: 518] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.683129 75498 usertrap_amd64.go:212] [ 518: 518] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.683169 75498 usertrap_amd64.go:122] [ 518: 518] Allocate a new trap: 0xc000481620 11 D0725 14:31:43.683263 75498 usertrap_amd64.go:225] [ 518: 518] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.684410 75498 usertrap_amd64.go:212] [ 518: 518] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.684478 75498 usertrap_amd64.go:122] [ 518: 518] Allocate a new trap: 0xc000481620 12 D0725 14:31:43.684565 75498 usertrap_amd64.go:225] [ 518: 518] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.686016 75498 usertrap_amd64.go:212] [ 518: 518] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.686059 75498 usertrap_amd64.go:122] [ 518: 518] Allocate a new trap: 0xc000481620 13 D0725 14:31:43.686135 75498 usertrap_amd64.go:225] [ 518: 518] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.686338 75498 usertrap_amd64.go:212] [ 518: 518] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.686394 75498 usertrap_amd64.go:122] [ 518: 518] Allocate a new trap: 0xc000481620 14 D0725 14:31:43.686456 75498 usertrap_amd64.go:225] [ 518: 518] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.708118 75498 task_signals.go:470] [ 519: 519] Notified of signal 56 D0725 14:31:43.708291 75498 task_signals.go:204] [ 519: 519] Signal 519, PID: 519, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.708390 75498 task_exit.go:204] [ 519: 519] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.710184 75498 task_exit.go:204] [ 519: 519] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.711107 75498 task_exit.go:204] [ 518: 518] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.713134 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.713222 75498 task_exit.go:204] [ 518: 518] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.713286 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.713296 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.713338 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.714230 75498 task_exit.go:204] [ 518: 518] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.717004 75498 usertrap_amd64.go:212] [ 520: 520] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.717065 75498 usertrap_amd64.go:122] [ 520: 520] Allocate a new trap: 0xc006d39500 9 D0725 14:31:43.717368 75498 usertrap_amd64.go:225] [ 520: 520] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.719341 75498 usertrap_amd64.go:212] [ 520: 520] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.719388 75498 usertrap_amd64.go:122] [ 520: 520] Allocate a new trap: 0xc006d39500 10 D0725 14:31:43.719442 75498 usertrap_amd64.go:225] [ 520: 520] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.720322 75498 usertrap_amd64.go:212] [ 520: 520] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.720379 75498 usertrap_amd64.go:122] [ 520: 520] Allocate a new trap: 0xc006d39500 11 D0725 14:31:43.720422 75498 usertrap_amd64.go:225] [ 520: 520] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.721532 75498 usertrap_amd64.go:212] [ 520: 520] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.721577 75498 usertrap_amd64.go:122] [ 520: 520] Allocate a new trap: 0xc006d39500 12 D0725 14:31:43.721626 75498 usertrap_amd64.go:225] [ 520: 520] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.723073 75498 usertrap_amd64.go:212] [ 520: 520] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.723126 75498 usertrap_amd64.go:122] [ 520: 520] Allocate a new trap: 0xc006d39500 13 D0725 14:31:43.723170 75498 usertrap_amd64.go:225] [ 520: 520] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.723348 75498 usertrap_amd64.go:212] [ 520: 520] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.723384 75498 usertrap_amd64.go:122] [ 520: 520] Allocate a new trap: 0xc006d39500 14 D0725 14:31:43.723441 75498 usertrap_amd64.go:225] [ 520: 520] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.745805 75498 task_signals.go:470] [ 521: 521] Notified of signal 56 D0725 14:31:43.745977 75498 task_signals.go:204] [ 521: 521] Signal 521, PID: 521, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.746069 75498 task_exit.go:204] [ 521: 521] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.747715 75498 task_exit.go:204] [ 521: 521] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.747846 75498 task_exit.go:204] [ 520: 520] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.749474 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.749569 75498 task_exit.go:204] [ 520: 520] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.749614 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.749648 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.749689 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.750456 75498 task_exit.go:204] [ 520: 520] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.753165 75498 usertrap_amd64.go:212] [ 522: 522] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.753228 75498 usertrap_amd64.go:122] [ 522: 522] Allocate a new trap: 0xc00476a240 9 D0725 14:31:43.753612 75498 usertrap_amd64.go:225] [ 522: 522] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.755776 75498 usertrap_amd64.go:212] [ 522: 522] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.755822 75498 usertrap_amd64.go:122] [ 522: 522] Allocate a new trap: 0xc00476a240 10 D0725 14:31:43.755867 75498 usertrap_amd64.go:225] [ 522: 522] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.756697 75498 usertrap_amd64.go:212] [ 522: 522] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.756737 75498 usertrap_amd64.go:122] [ 522: 522] Allocate a new trap: 0xc00476a240 11 D0725 14:31:43.756783 75498 usertrap_amd64.go:225] [ 522: 522] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.757916 75498 usertrap_amd64.go:212] [ 522: 522] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.757963 75498 usertrap_amd64.go:122] [ 522: 522] Allocate a new trap: 0xc00476a240 12 D0725 14:31:43.758007 75498 usertrap_amd64.go:225] [ 522: 522] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.759567 75498 usertrap_amd64.go:212] [ 522: 522] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.759649 75498 usertrap_amd64.go:122] [ 522: 522] Allocate a new trap: 0xc00476a240 13 D0725 14:31:43.759718 75498 usertrap_amd64.go:225] [ 522: 522] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.759967 75498 usertrap_amd64.go:212] [ 522: 522] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.760029 75498 usertrap_amd64.go:122] [ 522: 522] Allocate a new trap: 0xc00476a240 14 D0725 14:31:43.760078 75498 usertrap_amd64.go:225] [ 522: 522] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.781636 75498 task_signals.go:470] [ 523: 523] Notified of signal 56 D0725 14:31:43.781803 75498 task_signals.go:204] [ 523: 523] Signal 523, PID: 523, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.781920 75498 task_exit.go:204] [ 523: 523] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.783308 75498 task_exit.go:204] [ 523: 523] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.783981 75498 task_exit.go:204] [ 522: 522] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.785711 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.785797 75498 task_exit.go:204] [ 522: 522] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.785846 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.785932 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.786004 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.786286 75498 task_exit.go:204] [ 522: 522] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.788799 75498 usertrap_amd64.go:212] [ 524: 524] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.788857 75498 usertrap_amd64.go:122] [ 524: 524] Allocate a new trap: 0xc006ef3e60 9 D0725 14:31:43.789131 75498 usertrap_amd64.go:225] [ 524: 524] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.791458 75498 usertrap_amd64.go:212] [ 524: 524] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.791508 75498 usertrap_amd64.go:122] [ 524: 524] Allocate a new trap: 0xc006ef3e60 10 D0725 14:31:43.791564 75498 usertrap_amd64.go:225] [ 524: 524] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.792628 75498 usertrap_amd64.go:212] [ 524: 524] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.792682 75498 usertrap_amd64.go:122] [ 524: 524] Allocate a new trap: 0xc006ef3e60 11 D0725 14:31:43.792749 75498 usertrap_amd64.go:225] [ 524: 524] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.793990 75498 usertrap_amd64.go:212] [ 524: 524] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.794042 75498 usertrap_amd64.go:122] [ 524: 524] Allocate a new trap: 0xc006ef3e60 12 D0725 14:31:43.794109 75498 usertrap_amd64.go:225] [ 524: 524] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.795699 75498 usertrap_amd64.go:212] [ 524: 524] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.795757 75498 usertrap_amd64.go:122] [ 524: 524] Allocate a new trap: 0xc006ef3e60 13 D0725 14:31:43.795841 75498 usertrap_amd64.go:225] [ 524: 524] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.796010 75498 usertrap_amd64.go:212] [ 524: 524] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.796045 75498 usertrap_amd64.go:122] [ 524: 524] Allocate a new trap: 0xc006ef3e60 14 D0725 14:31:43.796085 75498 usertrap_amd64.go:225] [ 524: 524] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.818322 75498 task_signals.go:470] [ 525: 525] Notified of signal 56 D0725 14:31:43.818659 75498 task_signals.go:204] [ 525: 525] Signal 525, PID: 525, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.818767 75498 task_exit.go:204] [ 525: 525] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.820392 75498 task_exit.go:204] [ 525: 525] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.820836 75498 task_exit.go:204] [ 524: 524] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.822364 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.822422 75498 task_exit.go:204] [ 524: 524] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.822492 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.822537 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.822592 75498 task_exit.go:204] [ 524: 524] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.822603 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.825002 75498 usertrap_amd64.go:212] [ 526: 526] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.825080 75498 usertrap_amd64.go:122] [ 526: 526] Allocate a new trap: 0xc00571e360 9 D0725 14:31:43.825450 75498 usertrap_amd64.go:225] [ 526: 526] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.827401 75498 usertrap_amd64.go:212] [ 526: 526] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.827446 75498 usertrap_amd64.go:122] [ 526: 526] Allocate a new trap: 0xc00571e360 10 D0725 14:31:43.827488 75498 usertrap_amd64.go:225] [ 526: 526] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.828394 75498 usertrap_amd64.go:212] [ 526: 526] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.828437 75498 usertrap_amd64.go:122] [ 526: 526] Allocate a new trap: 0xc00571e360 11 D0725 14:31:43.828480 75498 usertrap_amd64.go:225] [ 526: 526] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.829532 75498 usertrap_amd64.go:212] [ 526: 526] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.829575 75498 usertrap_amd64.go:122] [ 526: 526] Allocate a new trap: 0xc00571e360 12 D0725 14:31:43.829627 75498 usertrap_amd64.go:225] [ 526: 526] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.831045 75498 usertrap_amd64.go:212] [ 526: 526] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.831086 75498 usertrap_amd64.go:122] [ 526: 526] Allocate a new trap: 0xc00571e360 13 D0725 14:31:43.831140 75498 usertrap_amd64.go:225] [ 526: 526] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.831325 75498 usertrap_amd64.go:212] [ 526: 526] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.831362 75498 usertrap_amd64.go:122] [ 526: 526] Allocate a new trap: 0xc00571e360 14 D0725 14:31:43.831405 75498 usertrap_amd64.go:225] [ 526: 526] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.853808 75498 task_signals.go:470] [ 527: 527] Notified of signal 56 D0725 14:31:43.854083 75498 task_signals.go:204] [ 527: 527] Signal 527, PID: 527, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.854194 75498 task_exit.go:204] [ 527: 527] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.856190 75498 task_exit.go:204] [ 527: 527] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.856810 75498 task_exit.go:204] [ 526: 526] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.859033 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.859124 75498 task_exit.go:204] [ 526: 526] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.859166 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.859181 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.859208 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.859270 75498 task_exit.go:204] [ 526: 526] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.862559 75498 usertrap_amd64.go:212] [ 528: 528] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.862623 75498 usertrap_amd64.go:122] [ 528: 528] Allocate a new trap: 0xc000481a10 9 D0725 14:31:43.862917 75498 usertrap_amd64.go:225] [ 528: 528] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.865342 75498 usertrap_amd64.go:212] [ 528: 528] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.865414 75498 usertrap_amd64.go:122] [ 528: 528] Allocate a new trap: 0xc000481a10 10 D0725 14:31:43.865465 75498 usertrap_amd64.go:225] [ 528: 528] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.866404 75498 usertrap_amd64.go:212] [ 528: 528] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.866469 75498 usertrap_amd64.go:122] [ 528: 528] Allocate a new trap: 0xc000481a10 11 D0725 14:31:43.866527 75498 usertrap_amd64.go:225] [ 528: 528] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.867657 75498 usertrap_amd64.go:212] [ 528: 528] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.867702 75498 usertrap_amd64.go:122] [ 528: 528] Allocate a new trap: 0xc000481a10 12 D0725 14:31:43.867753 75498 usertrap_amd64.go:225] [ 528: 528] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.869229 75498 usertrap_amd64.go:212] [ 528: 528] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.869280 75498 usertrap_amd64.go:122] [ 528: 528] Allocate a new trap: 0xc000481a10 13 D0725 14:31:43.869335 75498 usertrap_amd64.go:225] [ 528: 528] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.869555 75498 usertrap_amd64.go:212] [ 528: 528] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.869591 75498 usertrap_amd64.go:122] [ 528: 528] Allocate a new trap: 0xc000481a10 14 D0725 14:31:43.869648 75498 usertrap_amd64.go:225] [ 528: 528] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.893201 75498 task_signals.go:470] [ 529: 529] Notified of signal 56 D0725 14:31:43.893385 75498 task_signals.go:204] [ 529: 529] Signal 529, PID: 529, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.893500 75498 task_exit.go:204] [ 529: 529] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.895307 75498 task_exit.go:204] [ 529: 529] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.895963 75498 task_exit.go:204] [ 528: 528] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.897945 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.898005 75498 task_exit.go:204] [ 528: 528] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.898063 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.898106 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.898158 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.898906 75498 task_exit.go:204] [ 528: 528] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.901408 75498 usertrap_amd64.go:212] [ 530: 530] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.901537 75498 usertrap_amd64.go:122] [ 530: 530] Allocate a new trap: 0xc0070e6150 9 D0725 14:31:43.901944 75498 usertrap_amd64.go:225] [ 530: 530] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.904158 75498 usertrap_amd64.go:212] [ 530: 530] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.904206 75498 usertrap_amd64.go:122] [ 530: 530] Allocate a new trap: 0xc0070e6150 10 D0725 14:31:43.904287 75498 usertrap_amd64.go:225] [ 530: 530] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.905107 75498 usertrap_amd64.go:212] [ 530: 530] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.905148 75498 usertrap_amd64.go:122] [ 530: 530] Allocate a new trap: 0xc0070e6150 11 D0725 14:31:43.905211 75498 usertrap_amd64.go:225] [ 530: 530] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.906223 75498 usertrap_amd64.go:212] [ 530: 530] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.906278 75498 usertrap_amd64.go:122] [ 530: 530] Allocate a new trap: 0xc0070e6150 12 D0725 14:31:43.906327 75498 usertrap_amd64.go:225] [ 530: 530] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.907776 75498 usertrap_amd64.go:212] [ 530: 530] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.907829 75498 usertrap_amd64.go:122] [ 530: 530] Allocate a new trap: 0xc0070e6150 13 D0725 14:31:43.907898 75498 usertrap_amd64.go:225] [ 530: 530] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.908109 75498 usertrap_amd64.go:212] [ 530: 530] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.908148 75498 usertrap_amd64.go:122] [ 530: 530] Allocate a new trap: 0xc0070e6150 14 D0725 14:31:43.908206 75498 usertrap_amd64.go:225] [ 530: 530] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.932241 75498 task_signals.go:470] [ 531: 531] Notified of signal 56 D0725 14:31:43.932454 75498 task_signals.go:204] [ 531: 531] Signal 531, PID: 531, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.932550 75498 task_exit.go:204] [ 531: 531] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.934417 75498 task_exit.go:204] [ 531: 531] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.935013 75498 task_exit.go:204] [ 530: 530] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.937140 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.937245 75498 task_exit.go:204] [ 530: 530] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.937316 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.937381 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.937438 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.938304 75498 task_exit.go:204] [ 530: 530] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.940959 75498 usertrap_amd64.go:212] [ 532: 532] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.941032 75498 usertrap_amd64.go:122] [ 532: 532] Allocate a new trap: 0xc00571fe90 9 D0725 14:31:43.941462 75498 usertrap_amd64.go:225] [ 532: 532] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.943986 75498 usertrap_amd64.go:212] [ 532: 532] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.944047 75498 usertrap_amd64.go:122] [ 532: 532] Allocate a new trap: 0xc00571fe90 10 D0725 14:31:43.944132 75498 usertrap_amd64.go:225] [ 532: 532] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.945048 75498 usertrap_amd64.go:212] [ 532: 532] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.945090 75498 usertrap_amd64.go:122] [ 532: 532] Allocate a new trap: 0xc00571fe90 11 D0725 14:31:43.945140 75498 usertrap_amd64.go:225] [ 532: 532] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.946309 75498 usertrap_amd64.go:212] [ 532: 532] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.946350 75498 usertrap_amd64.go:122] [ 532: 532] Allocate a new trap: 0xc00571fe90 12 D0725 14:31:43.946398 75498 usertrap_amd64.go:225] [ 532: 532] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.947930 75498 usertrap_amd64.go:212] [ 532: 532] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.947998 75498 usertrap_amd64.go:122] [ 532: 532] Allocate a new trap: 0xc00571fe90 13 D0725 14:31:43.948085 75498 usertrap_amd64.go:225] [ 532: 532] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.948311 75498 usertrap_amd64.go:212] [ 532: 532] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.948353 75498 usertrap_amd64.go:122] [ 532: 532] Allocate a new trap: 0xc00571fe90 14 D0725 14:31:43.948411 75498 usertrap_amd64.go:225] [ 532: 532] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:43.970528 75498 task_signals.go:470] [ 533: 533] Notified of signal 56 D0725 14:31:43.970847 75498 task_signals.go:204] [ 533: 533] Signal 533, PID: 533, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:43.970937 75498 task_exit.go:204] [ 533: 533] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.972634 75498 task_exit.go:204] [ 533: 533] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.973115 75498 task_exit.go:204] [ 532: 532] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:43.974691 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:43.974749 75498 task_exit.go:204] [ 532: 532] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:43.974789 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:43.974821 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:43.974840 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:43.976050 75498 task_exit.go:204] [ 532: 532] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:43.978583 75498 usertrap_amd64.go:212] [ 534: 534] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:43.978646 75498 usertrap_amd64.go:122] [ 534: 534] Allocate a new trap: 0xc00594cd20 9 D0725 14:31:43.978939 75498 usertrap_amd64.go:225] [ 534: 534] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:43.981019 75498 usertrap_amd64.go:212] [ 534: 534] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:43.981074 75498 usertrap_amd64.go:122] [ 534: 534] Allocate a new trap: 0xc00594cd20 10 D0725 14:31:43.981144 75498 usertrap_amd64.go:225] [ 534: 534] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:43.982283 75498 usertrap_amd64.go:212] [ 534: 534] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:43.982339 75498 usertrap_amd64.go:122] [ 534: 534] Allocate a new trap: 0xc00594cd20 11 D0725 14:31:43.982431 75498 usertrap_amd64.go:225] [ 534: 534] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:43.983798 75498 usertrap_amd64.go:212] [ 534: 534] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:43.983846 75498 usertrap_amd64.go:122] [ 534: 534] Allocate a new trap: 0xc00594cd20 12 D0725 14:31:43.983916 75498 usertrap_amd64.go:225] [ 534: 534] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:43.985517 75498 usertrap_amd64.go:212] [ 534: 534] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:43.985575 75498 usertrap_amd64.go:122] [ 534: 534] Allocate a new trap: 0xc00594cd20 13 D0725 14:31:43.985624 75498 usertrap_amd64.go:225] [ 534: 534] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:43.985958 75498 usertrap_amd64.go:212] [ 534: 534] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:43.986005 75498 usertrap_amd64.go:122] [ 534: 534] Allocate a new trap: 0xc00594cd20 14 D0725 14:31:43.986070 75498 usertrap_amd64.go:225] [ 534: 534] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.007399 75498 task_signals.go:470] [ 535: 535] Notified of signal 56 D0725 14:31:44.007521 75498 task_signals.go:204] [ 535: 535] Signal 535, PID: 535, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.007633 75498 task_exit.go:204] [ 535: 535] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.009049 75498 task_exit.go:204] [ 535: 535] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.009511 75498 task_exit.go:204] [ 534: 534] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.011027 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.011081 75498 task_exit.go:204] [ 534: 534] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.011118 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.011236 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.011312 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.012150 75498 task_exit.go:204] [ 534: 534] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.014783 75498 usertrap_amd64.go:212] [ 536: 536] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.014864 75498 usertrap_amd64.go:122] [ 536: 536] Allocate a new trap: 0xc001898ed0 9 D0725 14:31:44.015169 75498 usertrap_amd64.go:225] [ 536: 536] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.017301 75498 usertrap_amd64.go:212] [ 536: 536] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.017364 75498 usertrap_amd64.go:122] [ 536: 536] Allocate a new trap: 0xc001898ed0 10 D0725 14:31:44.017424 75498 usertrap_amd64.go:225] [ 536: 536] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.018474 75498 usertrap_amd64.go:212] [ 536: 536] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.018555 75498 usertrap_amd64.go:122] [ 536: 536] Allocate a new trap: 0xc001898ed0 11 D0725 14:31:44.018620 75498 usertrap_amd64.go:225] [ 536: 536] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.020072 75498 usertrap_amd64.go:212] [ 536: 536] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.020152 75498 usertrap_amd64.go:122] [ 536: 536] Allocate a new trap: 0xc001898ed0 12 D0725 14:31:44.020221 75498 usertrap_amd64.go:225] [ 536: 536] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.022225 75498 usertrap_amd64.go:212] [ 536: 536] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.022282 75498 usertrap_amd64.go:122] [ 536: 536] Allocate a new trap: 0xc001898ed0 13 D0725 14:31:44.022338 75498 usertrap_amd64.go:225] [ 536: 536] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.022499 75498 usertrap_amd64.go:212] [ 536: 536] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.022534 75498 usertrap_amd64.go:122] [ 536: 536] Allocate a new trap: 0xc001898ed0 14 D0725 14:31:44.022574 75498 usertrap_amd64.go:225] [ 536: 536] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.045326 75498 task_signals.go:470] [ 537: 537] Notified of signal 56 D0725 14:31:44.045506 75498 task_signals.go:204] [ 537: 537] Signal 537, PID: 537, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.045594 75498 task_exit.go:204] [ 537: 537] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.047360 75498 task_exit.go:204] [ 537: 537] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.050628 75498 task_exit.go:204] [ 536: 536] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.052755 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.052861 75498 task_exit.go:204] [ 536: 536] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.052929 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.053015 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.053071 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.053070 75498 task_exit.go:204] [ 536: 536] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.055824 75498 usertrap_amd64.go:212] [ 538: 538] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.055886 75498 usertrap_amd64.go:122] [ 538: 538] Allocate a new trap: 0xc0070e6d50 9 D0725 14:31:44.056181 75498 usertrap_amd64.go:225] [ 538: 538] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.058484 75498 usertrap_amd64.go:212] [ 538: 538] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.058542 75498 usertrap_amd64.go:122] [ 538: 538] Allocate a new trap: 0xc0070e6d50 10 D0725 14:31:44.058596 75498 usertrap_amd64.go:225] [ 538: 538] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.059419 75498 usertrap_amd64.go:212] [ 538: 538] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.059464 75498 usertrap_amd64.go:122] [ 538: 538] Allocate a new trap: 0xc0070e6d50 11 D0725 14:31:44.059515 75498 usertrap_amd64.go:225] [ 538: 538] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.060559 75498 usertrap_amd64.go:212] [ 538: 538] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.060603 75498 usertrap_amd64.go:122] [ 538: 538] Allocate a new trap: 0xc0070e6d50 12 D0725 14:31:44.060662 75498 usertrap_amd64.go:225] [ 538: 538] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.062971 75498 usertrap_amd64.go:212] [ 538: 538] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.063027 75498 usertrap_amd64.go:122] [ 538: 538] Allocate a new trap: 0xc0070e6d50 13 D0725 14:31:44.063112 75498 usertrap_amd64.go:225] [ 538: 538] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.063432 75498 usertrap_amd64.go:212] [ 538: 538] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.063496 75498 usertrap_amd64.go:122] [ 538: 538] Allocate a new trap: 0xc0070e6d50 14 D0725 14:31:44.063631 75498 usertrap_amd64.go:225] [ 538: 538] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.087228 75498 task_signals.go:470] [ 539: 539] Notified of signal 56 D0725 14:31:44.087347 75498 task_signals.go:204] [ 539: 539] Signal 539, PID: 539, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.087448 75498 task_exit.go:204] [ 539: 539] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.089846 75498 task_exit.go:204] [ 539: 539] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.090647 75498 task_exit.go:204] [ 538: 538] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.092441 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.092503 75498 task_exit.go:204] [ 538: 538] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.092545 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.092590 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.092639 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.093637 75498 task_exit.go:204] [ 538: 538] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.096223 75498 usertrap_amd64.go:212] [ 540: 540] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.096283 75498 usertrap_amd64.go:122] [ 540: 540] Allocate a new trap: 0xc00476b860 9 D0725 14:31:44.096542 75498 usertrap_amd64.go:225] [ 540: 540] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.099008 75498 usertrap_amd64.go:212] [ 540: 540] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.099065 75498 usertrap_amd64.go:122] [ 540: 540] Allocate a new trap: 0xc00476b860 10 D0725 14:31:44.099133 75498 usertrap_amd64.go:225] [ 540: 540] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.100134 75498 usertrap_amd64.go:212] [ 540: 540] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.100185 75498 usertrap_amd64.go:122] [ 540: 540] Allocate a new trap: 0xc00476b860 11 D0725 14:31:44.100233 75498 usertrap_amd64.go:225] [ 540: 540] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.101576 75498 usertrap_amd64.go:212] [ 540: 540] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.101633 75498 usertrap_amd64.go:122] [ 540: 540] Allocate a new trap: 0xc00476b860 12 D0725 14:31:44.101680 75498 usertrap_amd64.go:225] [ 540: 540] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.103535 75498 usertrap_amd64.go:212] [ 540: 540] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.103628 75498 usertrap_amd64.go:122] [ 540: 540] Allocate a new trap: 0xc00476b860 13 D0725 14:31:44.103712 75498 usertrap_amd64.go:225] [ 540: 540] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.103922 75498 usertrap_amd64.go:212] [ 540: 540] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.103965 75498 usertrap_amd64.go:122] [ 540: 540] Allocate a new trap: 0xc00476b860 14 D0725 14:31:44.104011 75498 usertrap_amd64.go:225] [ 540: 540] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.128301 75498 task_signals.go:470] [ 541: 541] Notified of signal 56 D0725 14:31:44.128400 75498 task_signals.go:204] [ 541: 541] Signal 541, PID: 541, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.128482 75498 task_exit.go:204] [ 541: 541] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.130047 75498 task_exit.go:204] [ 541: 541] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.130886 75498 task_exit.go:204] [ 540: 540] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.132789 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.132871 75498 task_exit.go:204] [ 540: 540] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.132921 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.132975 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.132975 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.133435 75498 task_exit.go:204] [ 540: 540] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.136066 75498 usertrap_amd64.go:212] [ 542: 542] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.136177 75498 usertrap_amd64.go:122] [ 542: 542] Allocate a new trap: 0xc003e0c480 9 D0725 14:31:44.136573 75498 usertrap_amd64.go:225] [ 542: 542] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.139285 75498 usertrap_amd64.go:212] [ 542: 542] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.139365 75498 usertrap_amd64.go:122] [ 542: 542] Allocate a new trap: 0xc003e0c480 10 D0725 14:31:44.139431 75498 usertrap_amd64.go:225] [ 542: 542] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.140537 75498 usertrap_amd64.go:212] [ 542: 542] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.140603 75498 usertrap_amd64.go:122] [ 542: 542] Allocate a new trap: 0xc003e0c480 11 D0725 14:31:44.140659 75498 usertrap_amd64.go:225] [ 542: 542] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.142117 75498 usertrap_amd64.go:212] [ 542: 542] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.142178 75498 usertrap_amd64.go:122] [ 542: 542] Allocate a new trap: 0xc003e0c480 12 D0725 14:31:44.142225 75498 usertrap_amd64.go:225] [ 542: 542] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.144026 75498 usertrap_amd64.go:212] [ 542: 542] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.144072 75498 usertrap_amd64.go:122] [ 542: 542] Allocate a new trap: 0xc003e0c480 13 D0725 14:31:44.144132 75498 usertrap_amd64.go:225] [ 542: 542] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.144486 75498 usertrap_amd64.go:212] [ 542: 542] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.144559 75498 usertrap_amd64.go:122] [ 542: 542] Allocate a new trap: 0xc003e0c480 14 D0725 14:31:44.144635 75498 usertrap_amd64.go:225] [ 542: 542] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.170097 75498 task_signals.go:470] [ 543: 543] Notified of signal 56 D0725 14:31:44.170448 75498 task_signals.go:204] [ 543: 543] Signal 543, PID: 543, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.170553 75498 task_exit.go:204] [ 543: 543] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.172427 75498 task_exit.go:204] [ 543: 543] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.173547 75498 task_exit.go:204] [ 542: 542] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.175733 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.175814 75498 task_exit.go:204] [ 542: 542] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.175900 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.175952 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.176013 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.176403 75498 task_exit.go:204] [ 542: 542] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.179680 75498 usertrap_amd64.go:212] [ 544: 544] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.179762 75498 usertrap_amd64.go:122] [ 544: 544] Allocate a new trap: 0xc003e0c540 9 D0725 14:31:44.180206 75498 usertrap_amd64.go:225] [ 544: 544] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.182956 75498 usertrap_amd64.go:212] [ 544: 544] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.183021 75498 usertrap_amd64.go:122] [ 544: 544] Allocate a new trap: 0xc003e0c540 10 D0725 14:31:44.183086 75498 usertrap_amd64.go:225] [ 544: 544] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.184293 75498 usertrap_amd64.go:212] [ 544: 544] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.184361 75498 usertrap_amd64.go:122] [ 544: 544] Allocate a new trap: 0xc003e0c540 11 D0725 14:31:44.184428 75498 usertrap_amd64.go:225] [ 544: 544] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.185997 75498 usertrap_amd64.go:212] [ 544: 544] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.186064 75498 usertrap_amd64.go:122] [ 544: 544] Allocate a new trap: 0xc003e0c540 12 D0725 14:31:44.186122 75498 usertrap_amd64.go:225] [ 544: 544] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.188040 75498 usertrap_amd64.go:212] [ 544: 544] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.188114 75498 usertrap_amd64.go:122] [ 544: 544] Allocate a new trap: 0xc003e0c540 13 D0725 14:31:44.188170 75498 usertrap_amd64.go:225] [ 544: 544] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.188381 75498 usertrap_amd64.go:212] [ 544: 544] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.188430 75498 usertrap_amd64.go:122] [ 544: 544] Allocate a new trap: 0xc003e0c540 14 D0725 14:31:44.188483 75498 usertrap_amd64.go:225] [ 544: 544] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.210232 75498 task_signals.go:470] [ 545: 545] Notified of signal 56 D0725 14:31:44.210437 75498 task_signals.go:204] [ 545: 545] Signal 545, PID: 545, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.210583 75498 task_exit.go:204] [ 545: 545] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.212439 75498 task_exit.go:204] [ 545: 545] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.213732 75498 task_exit.go:204] [ 544: 544] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.215693 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.215782 75498 task_exit.go:204] [ 544: 544] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.215865 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.215908 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.215951 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.216011 75498 task_exit.go:204] [ 544: 544] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.218679 75498 usertrap_amd64.go:212] [ 546: 546] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.218762 75498 usertrap_amd64.go:122] [ 546: 546] Allocate a new trap: 0xc00594cea0 9 D0725 14:31:44.219113 75498 usertrap_amd64.go:225] [ 546: 546] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.221123 75498 usertrap_amd64.go:212] [ 546: 546] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.221169 75498 usertrap_amd64.go:122] [ 546: 546] Allocate a new trap: 0xc00594cea0 10 D0725 14:31:44.221213 75498 usertrap_amd64.go:225] [ 546: 546] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.222201 75498 usertrap_amd64.go:212] [ 546: 546] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.222248 75498 usertrap_amd64.go:122] [ 546: 546] Allocate a new trap: 0xc00594cea0 11 D0725 14:31:44.222303 75498 usertrap_amd64.go:225] [ 546: 546] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.223590 75498 usertrap_amd64.go:212] [ 546: 546] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.223674 75498 usertrap_amd64.go:122] [ 546: 546] Allocate a new trap: 0xc00594cea0 12 D0725 14:31:44.223733 75498 usertrap_amd64.go:225] [ 546: 546] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.225901 75498 usertrap_amd64.go:212] [ 546: 546] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.225957 75498 usertrap_amd64.go:122] [ 546: 546] Allocate a new trap: 0xc00594cea0 13 D0725 14:31:44.226006 75498 usertrap_amd64.go:225] [ 546: 546] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.226172 75498 usertrap_amd64.go:212] [ 546: 546] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.226206 75498 usertrap_amd64.go:122] [ 546: 546] Allocate a new trap: 0xc00594cea0 14 D0725 14:31:44.226247 75498 usertrap_amd64.go:225] [ 546: 546] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.251219 75498 task_signals.go:470] [ 547: 547] Notified of signal 56 D0725 14:31:44.251489 75498 task_signals.go:204] [ 547: 547] Signal 547, PID: 547, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.251581 75498 task_exit.go:204] [ 547: 547] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.253451 75498 task_exit.go:204] [ 547: 547] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.254016 75498 task_exit.go:204] [ 546: 546] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.255743 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.255808 75498 task_exit.go:204] [ 546: 546] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.255850 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.255863 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.255920 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.256191 75498 task_exit.go:204] [ 546: 546] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.259528 75498 usertrap_amd64.go:212] [ 548: 548] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.259637 75498 usertrap_amd64.go:122] [ 548: 548] Allocate a new trap: 0xc008822240 9 D0725 14:31:44.260025 75498 usertrap_amd64.go:225] [ 548: 548] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.262520 75498 usertrap_amd64.go:212] [ 548: 548] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.262601 75498 usertrap_amd64.go:122] [ 548: 548] Allocate a new trap: 0xc008822240 10 D0725 14:31:44.262672 75498 usertrap_amd64.go:225] [ 548: 548] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.263778 75498 usertrap_amd64.go:212] [ 548: 548] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.263845 75498 usertrap_amd64.go:122] [ 548: 548] Allocate a new trap: 0xc008822240 11 D0725 14:31:44.263916 75498 usertrap_amd64.go:225] [ 548: 548] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.265491 75498 usertrap_amd64.go:212] [ 548: 548] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.265536 75498 usertrap_amd64.go:122] [ 548: 548] Allocate a new trap: 0xc008822240 12 D0725 14:31:44.265580 75498 usertrap_amd64.go:225] [ 548: 548] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.267416 75498 usertrap_amd64.go:212] [ 548: 548] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.267470 75498 usertrap_amd64.go:122] [ 548: 548] Allocate a new trap: 0xc008822240 13 D0725 14:31:44.267528 75498 usertrap_amd64.go:225] [ 548: 548] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.267768 75498 usertrap_amd64.go:212] [ 548: 548] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.267817 75498 usertrap_amd64.go:122] [ 548: 548] Allocate a new trap: 0xc008822240 14 D0725 14:31:44.267860 75498 usertrap_amd64.go:225] [ 548: 548] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.291071 75498 task_signals.go:470] [ 549: 549] Notified of signal 56 D0725 14:31:44.291172 75498 task_signals.go:204] [ 549: 549] Signal 549, PID: 549, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.291249 75498 task_exit.go:204] [ 549: 549] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.292826 75498 task_exit.go:204] [ 549: 549] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.293613 75498 task_exit.go:204] [ 548: 548] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.295395 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.295468 75498 task_exit.go:204] [ 548: 548] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.295549 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.295639 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.295701 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.295725 75498 task_exit.go:204] [ 548: 548] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.298681 75498 usertrap_amd64.go:212] [ 550: 550] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.298747 75498 usertrap_amd64.go:122] [ 550: 550] Allocate a new trap: 0xc0070e7860 9 D0725 14:31:44.299054 75498 usertrap_amd64.go:225] [ 550: 550] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.301175 75498 usertrap_amd64.go:212] [ 550: 550] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.301219 75498 usertrap_amd64.go:122] [ 550: 550] Allocate a new trap: 0xc0070e7860 10 D0725 14:31:44.301272 75498 usertrap_amd64.go:225] [ 550: 550] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.302216 75498 usertrap_amd64.go:212] [ 550: 550] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.302258 75498 usertrap_amd64.go:122] [ 550: 550] Allocate a new trap: 0xc0070e7860 11 D0725 14:31:44.302312 75498 usertrap_amd64.go:225] [ 550: 550] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.303509 75498 usertrap_amd64.go:212] [ 550: 550] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.303550 75498 usertrap_amd64.go:122] [ 550: 550] Allocate a new trap: 0xc0070e7860 12 D0725 14:31:44.303599 75498 usertrap_amd64.go:225] [ 550: 550] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.305379 75498 usertrap_amd64.go:212] [ 550: 550] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.305422 75498 usertrap_amd64.go:122] [ 550: 550] Allocate a new trap: 0xc0070e7860 13 D0725 14:31:44.305463 75498 usertrap_amd64.go:225] [ 550: 550] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.305734 75498 usertrap_amd64.go:212] [ 550: 550] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.305799 75498 usertrap_amd64.go:122] [ 550: 550] Allocate a new trap: 0xc0070e7860 14 D0725 14:31:44.305848 75498 usertrap_amd64.go:225] [ 550: 550] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.327903 75498 task_signals.go:470] [ 551: 551] Notified of signal 56 D0725 14:31:44.328065 75498 task_signals.go:204] [ 551: 551] Signal 551, PID: 551, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.328177 75498 task_exit.go:204] [ 551: 551] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.330089 75498 task_exit.go:204] [ 551: 551] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.330614 75498 task_exit.go:204] [ 550: 550] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.332346 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.332417 75498 task_exit.go:204] [ 550: 550] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.332456 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.332487 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.332548 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.332993 75498 task_exit.go:204] [ 550: 550] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.335917 75498 usertrap_amd64.go:212] [ 552: 552] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.335979 75498 usertrap_amd64.go:122] [ 552: 552] Allocate a new trap: 0xc0036af170 9 D0725 14:31:44.336325 75498 usertrap_amd64.go:225] [ 552: 552] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.338645 75498 usertrap_amd64.go:212] [ 552: 552] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.338725 75498 usertrap_amd64.go:122] [ 552: 552] Allocate a new trap: 0xc0036af170 10 D0725 14:31:44.338835 75498 usertrap_amd64.go:225] [ 552: 552] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.340116 75498 usertrap_amd64.go:212] [ 552: 552] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.340193 75498 usertrap_amd64.go:122] [ 552: 552] Allocate a new trap: 0xc0036af170 11 D0725 14:31:44.340263 75498 usertrap_amd64.go:225] [ 552: 552] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.341798 75498 usertrap_amd64.go:212] [ 552: 552] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.341860 75498 usertrap_amd64.go:122] [ 552: 552] Allocate a new trap: 0xc0036af170 12 D0725 14:31:44.341932 75498 usertrap_amd64.go:225] [ 552: 552] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.343771 75498 usertrap_amd64.go:212] [ 552: 552] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.343817 75498 usertrap_amd64.go:122] [ 552: 552] Allocate a new trap: 0xc0036af170 13 D0725 14:31:44.343867 75498 usertrap_amd64.go:225] [ 552: 552] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.344042 75498 usertrap_amd64.go:212] [ 552: 552] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.344086 75498 usertrap_amd64.go:122] [ 552: 552] Allocate a new trap: 0xc0036af170 14 D0725 14:31:44.344123 75498 usertrap_amd64.go:225] [ 552: 552] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.366749 75498 task_signals.go:470] [ 553: 553] Notified of signal 56 D0725 14:31:44.366876 75498 task_signals.go:204] [ 553: 553] Signal 553, PID: 553, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.367016 75498 task_exit.go:204] [ 553: 553] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.368933 75498 task_exit.go:204] [ 553: 553] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.369756 75498 task_exit.go:204] [ 552: 552] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.371480 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.371555 75498 task_exit.go:204] [ 552: 552] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.371669 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.371695 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.371751 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.372173 75498 task_exit.go:204] [ 552: 552] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.375520 75498 usertrap_amd64.go:212] [ 554: 554] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.375591 75498 usertrap_amd64.go:122] [ 554: 554] Allocate a new trap: 0xc009086480 9 D0725 14:31:44.375896 75498 usertrap_amd64.go:225] [ 554: 554] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.377762 75498 usertrap_amd64.go:212] [ 554: 554] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.377812 75498 usertrap_amd64.go:122] [ 554: 554] Allocate a new trap: 0xc009086480 10 D0725 14:31:44.377855 75498 usertrap_amd64.go:225] [ 554: 554] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.378647 75498 usertrap_amd64.go:212] [ 554: 554] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.378688 75498 usertrap_amd64.go:122] [ 554: 554] Allocate a new trap: 0xc009086480 11 D0725 14:31:44.378727 75498 usertrap_amd64.go:225] [ 554: 554] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.379749 75498 usertrap_amd64.go:212] [ 554: 554] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.379783 75498 usertrap_amd64.go:122] [ 554: 554] Allocate a new trap: 0xc009086480 12 D0725 14:31:44.379835 75498 usertrap_amd64.go:225] [ 554: 554] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.381413 75498 usertrap_amd64.go:212] [ 554: 554] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.381472 75498 usertrap_amd64.go:122] [ 554: 554] Allocate a new trap: 0xc009086480 13 D0725 14:31:44.381533 75498 usertrap_amd64.go:225] [ 554: 554] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.381734 75498 usertrap_amd64.go:212] [ 554: 554] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.381772 75498 usertrap_amd64.go:122] [ 554: 554] Allocate a new trap: 0xc009086480 14 D0725 14:31:44.381833 75498 usertrap_amd64.go:225] [ 554: 554] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.404383 75498 task_signals.go:470] [ 555: 555] Notified of signal 56 D0725 14:31:44.404541 75498 task_signals.go:204] [ 555: 555] Signal 555, PID: 555, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.404664 75498 task_exit.go:204] [ 555: 555] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.406430 75498 task_exit.go:204] [ 555: 555] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.407790 75498 task_exit.go:204] [ 554: 554] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.409316 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.409408 75498 task_exit.go:204] [ 554: 554] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.409453 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.409521 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.409570 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.410369 75498 task_exit.go:204] [ 554: 554] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.412860 75498 usertrap_amd64.go:212] [ 556: 556] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.412933 75498 usertrap_amd64.go:122] [ 556: 556] Allocate a new trap: 0xc00594dbf0 9 D0725 14:31:44.413232 75498 usertrap_amd64.go:225] [ 556: 556] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.415354 75498 usertrap_amd64.go:212] [ 556: 556] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.415407 75498 usertrap_amd64.go:122] [ 556: 556] Allocate a new trap: 0xc00594dbf0 10 D0725 14:31:44.415450 75498 usertrap_amd64.go:225] [ 556: 556] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.416576 75498 usertrap_amd64.go:212] [ 556: 556] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.416626 75498 usertrap_amd64.go:122] [ 556: 556] Allocate a new trap: 0xc00594dbf0 11 D0725 14:31:44.416683 75498 usertrap_amd64.go:225] [ 556: 556] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.417985 75498 usertrap_amd64.go:212] [ 556: 556] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.418033 75498 usertrap_amd64.go:122] [ 556: 556] Allocate a new trap: 0xc00594dbf0 12 D0725 14:31:44.418108 75498 usertrap_amd64.go:225] [ 556: 556] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.420307 75498 usertrap_amd64.go:212] [ 556: 556] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.420365 75498 usertrap_amd64.go:122] [ 556: 556] Allocate a new trap: 0xc00594dbf0 13 D0725 14:31:44.420451 75498 usertrap_amd64.go:225] [ 556: 556] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.420648 75498 usertrap_amd64.go:212] [ 556: 556] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.420686 75498 usertrap_amd64.go:122] [ 556: 556] Allocate a new trap: 0xc00594dbf0 14 D0725 14:31:44.420748 75498 usertrap_amd64.go:225] [ 556: 556] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.444016 75498 task_signals.go:470] [ 557: 557] Notified of signal 56 D0725 14:31:44.444289 75498 task_signals.go:204] [ 557: 557] Signal 557, PID: 557, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.444413 75498 task_exit.go:204] [ 557: 557] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.446494 75498 task_exit.go:204] [ 557: 557] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.447118 75498 task_exit.go:204] [ 556: 556] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.449148 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.449220 75498 task_exit.go:204] [ 556: 556] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.449278 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.449287 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.449360 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.450069 75498 task_exit.go:204] [ 556: 556] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.452799 75498 usertrap_amd64.go:212] [ 558: 558] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.452881 75498 usertrap_amd64.go:122] [ 558: 558] Allocate a new trap: 0xc008822cf0 9 D0725 14:31:44.453209 75498 usertrap_amd64.go:225] [ 558: 558] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.455309 75498 usertrap_amd64.go:212] [ 558: 558] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.455353 75498 usertrap_amd64.go:122] [ 558: 558] Allocate a new trap: 0xc008822cf0 10 D0725 14:31:44.455406 75498 usertrap_amd64.go:225] [ 558: 558] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.456388 75498 usertrap_amd64.go:212] [ 558: 558] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.456446 75498 usertrap_amd64.go:122] [ 558: 558] Allocate a new trap: 0xc008822cf0 11 D0725 14:31:44.456499 75498 usertrap_amd64.go:225] [ 558: 558] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.457760 75498 usertrap_amd64.go:212] [ 558: 558] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.457806 75498 usertrap_amd64.go:122] [ 558: 558] Allocate a new trap: 0xc008822cf0 12 D0725 14:31:44.457865 75498 usertrap_amd64.go:225] [ 558: 558] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.459442 75498 usertrap_amd64.go:212] [ 558: 558] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.459487 75498 usertrap_amd64.go:122] [ 558: 558] Allocate a new trap: 0xc008822cf0 13 D0725 14:31:44.459527 75498 usertrap_amd64.go:225] [ 558: 558] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.459789 75498 usertrap_amd64.go:212] [ 558: 558] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.459851 75498 usertrap_amd64.go:122] [ 558: 558] Allocate a new trap: 0xc008822cf0 14 D0725 14:31:44.459915 75498 usertrap_amd64.go:225] [ 558: 558] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.482485 75498 task_signals.go:470] [ 559: 559] Notified of signal 56 D0725 14:31:44.482603 75498 task_signals.go:204] [ 559: 559] Signal 559, PID: 559, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.482696 75498 task_exit.go:204] [ 559: 559] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.484750 75498 task_exit.go:204] [ 559: 559] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.485862 75498 task_exit.go:204] [ 558: 558] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.487763 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.487845 75498 task_exit.go:204] [ 558: 558] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.487895 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.487915 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.487958 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.488778 75498 task_exit.go:204] [ 558: 558] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.491287 75498 usertrap_amd64.go:212] [ 560: 560] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.491351 75498 usertrap_amd64.go:122] [ 560: 560] Allocate a new trap: 0xc0093f0210 9 D0725 14:31:44.491734 75498 usertrap_amd64.go:225] [ 560: 560] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.493951 75498 usertrap_amd64.go:212] [ 560: 560] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.494004 75498 usertrap_amd64.go:122] [ 560: 560] Allocate a new trap: 0xc0093f0210 10 D0725 14:31:44.494050 75498 usertrap_amd64.go:225] [ 560: 560] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.495158 75498 usertrap_amd64.go:212] [ 560: 560] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.495211 75498 usertrap_amd64.go:122] [ 560: 560] Allocate a new trap: 0xc0093f0210 11 D0725 14:31:44.495271 75498 usertrap_amd64.go:225] [ 560: 560] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.496509 75498 usertrap_amd64.go:212] [ 560: 560] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.496561 75498 usertrap_amd64.go:122] [ 560: 560] Allocate a new trap: 0xc0093f0210 12 D0725 14:31:44.496605 75498 usertrap_amd64.go:225] [ 560: 560] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.498312 75498 usertrap_amd64.go:212] [ 560: 560] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.498365 75498 usertrap_amd64.go:122] [ 560: 560] Allocate a new trap: 0xc0093f0210 13 D0725 14:31:44.498406 75498 usertrap_amd64.go:225] [ 560: 560] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.498576 75498 usertrap_amd64.go:212] [ 560: 560] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.498611 75498 usertrap_amd64.go:122] [ 560: 560] Allocate a new trap: 0xc0093f0210 14 D0725 14:31:44.498656 75498 usertrap_amd64.go:225] [ 560: 560] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.521462 75498 task_signals.go:470] [ 561: 561] Notified of signal 56 D0725 14:31:44.521646 75498 task_signals.go:204] [ 561: 561] Signal 561, PID: 561, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.521771 75498 task_exit.go:204] [ 561: 561] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.523511 75498 task_exit.go:204] [ 561: 561] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.524176 75498 task_exit.go:204] [ 560: 560] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.525796 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.525885 75498 task_exit.go:204] [ 560: 560] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.525948 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.526013 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.526108 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.526139 75498 task_exit.go:204] [ 560: 560] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.534807 75498 usertrap_amd64.go:212] [ 562: 562] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.534904 75498 usertrap_amd64.go:122] [ 562: 562] Allocate a new trap: 0xc008822000 9 D0725 14:31:44.535243 75498 usertrap_amd64.go:225] [ 562: 562] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.537538 75498 usertrap_amd64.go:212] [ 562: 562] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.537587 75498 usertrap_amd64.go:122] [ 562: 562] Allocate a new trap: 0xc008822000 10 D0725 14:31:44.537656 75498 usertrap_amd64.go:225] [ 562: 562] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.538598 75498 usertrap_amd64.go:212] [ 562: 562] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.538648 75498 usertrap_amd64.go:122] [ 562: 562] Allocate a new trap: 0xc008822000 11 D0725 14:31:44.538705 75498 usertrap_amd64.go:225] [ 562: 562] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.540035 75498 usertrap_amd64.go:212] [ 562: 562] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.540082 75498 usertrap_amd64.go:122] [ 562: 562] Allocate a new trap: 0xc008822000 12 D0725 14:31:44.540127 75498 usertrap_amd64.go:225] [ 562: 562] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.544234 75498 usertrap_amd64.go:212] [ 562: 562] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.544290 75498 usertrap_amd64.go:122] [ 562: 562] Allocate a new trap: 0xc008822000 13 D0725 14:31:44.544358 75498 usertrap_amd64.go:225] [ 562: 562] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.544543 75498 usertrap_amd64.go:212] [ 562: 562] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.544579 75498 usertrap_amd64.go:122] [ 562: 562] Allocate a new trap: 0xc008822000 14 D0725 14:31:44.544625 75498 usertrap_amd64.go:225] [ 562: 562] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.573364 75498 task_signals.go:470] [ 563: 563] Notified of signal 56 D0725 14:31:44.573568 75498 task_signals.go:204] [ 563: 563] Signal 563, PID: 563, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.573690 75498 task_exit.go:204] [ 563: 563] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.575385 75498 task_exit.go:204] [ 563: 563] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.577378 75498 task_exit.go:204] [ 562: 562] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.579241 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.579338 75498 task_exit.go:204] [ 562: 562] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.579418 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.579536 75498 task_exit.go:204] [ 562: 562] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.579545 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.579586 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.582427 75498 usertrap_amd64.go:212] [ 564: 564] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.582489 75498 usertrap_amd64.go:122] [ 564: 564] Allocate a new trap: 0xc008bb2930 9 D0725 14:31:44.582803 75498 usertrap_amd64.go:225] [ 564: 564] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.584724 75498 usertrap_amd64.go:212] [ 564: 564] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.584780 75498 usertrap_amd64.go:122] [ 564: 564] Allocate a new trap: 0xc008bb2930 10 D0725 14:31:44.584825 75498 usertrap_amd64.go:225] [ 564: 564] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.585751 75498 usertrap_amd64.go:212] [ 564: 564] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.585801 75498 usertrap_amd64.go:122] [ 564: 564] Allocate a new trap: 0xc008bb2930 11 D0725 14:31:44.585841 75498 usertrap_amd64.go:225] [ 564: 564] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.587063 75498 usertrap_amd64.go:212] [ 564: 564] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.587110 75498 usertrap_amd64.go:122] [ 564: 564] Allocate a new trap: 0xc008bb2930 12 D0725 14:31:44.587167 75498 usertrap_amd64.go:225] [ 564: 564] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.590120 75498 usertrap_amd64.go:212] [ 564: 564] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.590174 75498 usertrap_amd64.go:122] [ 564: 564] Allocate a new trap: 0xc008bb2930 13 D0725 14:31:44.590234 75498 usertrap_amd64.go:225] [ 564: 564] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.590432 75498 usertrap_amd64.go:212] [ 564: 564] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.590470 75498 usertrap_amd64.go:122] [ 564: 564] Allocate a new trap: 0xc008bb2930 14 D0725 14:31:44.590512 75498 usertrap_amd64.go:225] [ 564: 564] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.614991 75498 task_signals.go:470] [ 565: 565] Notified of signal 56 D0725 14:31:44.615232 75498 task_signals.go:204] [ 565: 565] Signal 565, PID: 565, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.615323 75498 task_exit.go:204] [ 565: 565] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.617017 75498 task_exit.go:204] [ 565: 565] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.618249 75498 task_exit.go:204] [ 564: 564] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.620479 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.620571 75498 task_exit.go:204] [ 564: 564] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.620629 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.620753 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.620819 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.621468 75498 task_exit.go:204] [ 564: 564] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.624454 75498 usertrap_amd64.go:212] [ 566: 566] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.624529 75498 usertrap_amd64.go:122] [ 566: 566] Allocate a new trap: 0xc0093f00f0 9 D0725 14:31:44.624911 75498 usertrap_amd64.go:225] [ 566: 566] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.627638 75498 usertrap_amd64.go:212] [ 566: 566] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.627690 75498 usertrap_amd64.go:122] [ 566: 566] Allocate a new trap: 0xc0093f00f0 10 D0725 14:31:44.627769 75498 usertrap_amd64.go:225] [ 566: 566] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.628804 75498 usertrap_amd64.go:212] [ 566: 566] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.628873 75498 usertrap_amd64.go:122] [ 566: 566] Allocate a new trap: 0xc0093f00f0 11 D0725 14:31:44.628950 75498 usertrap_amd64.go:225] [ 566: 566] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.630217 75498 usertrap_amd64.go:212] [ 566: 566] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.630268 75498 usertrap_amd64.go:122] [ 566: 566] Allocate a new trap: 0xc0093f00f0 12 D0725 14:31:44.630341 75498 usertrap_amd64.go:225] [ 566: 566] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.632156 75498 usertrap_amd64.go:212] [ 566: 566] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.632207 75498 usertrap_amd64.go:122] [ 566: 566] Allocate a new trap: 0xc0093f00f0 13 D0725 14:31:44.632253 75498 usertrap_amd64.go:225] [ 566: 566] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.632479 75498 usertrap_amd64.go:212] [ 566: 566] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.632527 75498 usertrap_amd64.go:122] [ 566: 566] Allocate a new trap: 0xc0093f00f0 14 D0725 14:31:44.632578 75498 usertrap_amd64.go:225] [ 566: 566] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.656239 75498 task_signals.go:470] [ 567: 567] Notified of signal 56 D0725 14:31:44.656430 75498 task_signals.go:204] [ 567: 567] Signal 567, PID: 567, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.656509 75498 task_exit.go:204] [ 567: 567] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.658482 75498 task_exit.go:204] [ 567: 567] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.659510 75498 task_exit.go:204] [ 566: 566] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.661472 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.661550 75498 task_exit.go:204] [ 566: 566] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.661620 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.661622 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.661697 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.661800 75498 task_exit.go:204] [ 566: 566] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.664786 75498 usertrap_amd64.go:212] [ 568: 568] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.664860 75498 usertrap_amd64.go:122] [ 568: 568] Allocate a new trap: 0xc00594c0c0 9 D0725 14:31:44.665228 75498 usertrap_amd64.go:225] [ 568: 568] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.667326 75498 usertrap_amd64.go:212] [ 568: 568] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.667369 75498 usertrap_amd64.go:122] [ 568: 568] Allocate a new trap: 0xc00594c0c0 10 D0725 14:31:44.667426 75498 usertrap_amd64.go:225] [ 568: 568] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.668352 75498 usertrap_amd64.go:212] [ 568: 568] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.668415 75498 usertrap_amd64.go:122] [ 568: 568] Allocate a new trap: 0xc00594c0c0 11 D0725 14:31:44.668467 75498 usertrap_amd64.go:225] [ 568: 568] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.669898 75498 usertrap_amd64.go:212] [ 568: 568] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.669943 75498 usertrap_amd64.go:122] [ 568: 568] Allocate a new trap: 0xc00594c0c0 12 D0725 14:31:44.669988 75498 usertrap_amd64.go:225] [ 568: 568] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.672190 75498 usertrap_amd64.go:212] [ 568: 568] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.672243 75498 usertrap_amd64.go:122] [ 568: 568] Allocate a new trap: 0xc00594c0c0 13 D0725 14:31:44.672302 75498 usertrap_amd64.go:225] [ 568: 568] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.672540 75498 usertrap_amd64.go:212] [ 568: 568] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.672597 75498 usertrap_amd64.go:122] [ 568: 568] Allocate a new trap: 0xc00594c0c0 14 D0725 14:31:44.672662 75498 usertrap_amd64.go:225] [ 568: 568] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.697474 75498 task_signals.go:470] [ 569: 569] Notified of signal 56 D0725 14:31:44.697610 75498 task_signals.go:204] [ 569: 569] Signal 569, PID: 569, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.697707 75498 task_exit.go:204] [ 569: 569] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.699140 75498 task_exit.go:204] [ 569: 569] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.700474 75498 task_exit.go:204] [ 568: 568] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.702457 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.702562 75498 task_exit.go:204] [ 568: 568] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.702635 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.702663 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.702718 75498 task_exit.go:204] [ 568: 568] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.702730 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.705380 75498 usertrap_amd64.go:212] [ 570: 570] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.705460 75498 usertrap_amd64.go:122] [ 570: 570] Allocate a new trap: 0xc008bb3e00 9 D0725 14:31:44.705812 75498 usertrap_amd64.go:225] [ 570: 570] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.708886 75498 usertrap_amd64.go:212] [ 570: 570] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.708954 75498 usertrap_amd64.go:122] [ 570: 570] Allocate a new trap: 0xc008bb3e00 10 D0725 14:31:44.709062 75498 usertrap_amd64.go:225] [ 570: 570] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.710279 75498 usertrap_amd64.go:212] [ 570: 570] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.710321 75498 usertrap_amd64.go:122] [ 570: 570] Allocate a new trap: 0xc008bb3e00 11 D0725 14:31:44.710364 75498 usertrap_amd64.go:225] [ 570: 570] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.711741 75498 usertrap_amd64.go:212] [ 570: 570] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.711812 75498 usertrap_amd64.go:122] [ 570: 570] Allocate a new trap: 0xc008bb3e00 12 D0725 14:31:44.711870 75498 usertrap_amd64.go:225] [ 570: 570] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.713853 75498 usertrap_amd64.go:212] [ 570: 570] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.713901 75498 usertrap_amd64.go:122] [ 570: 570] Allocate a new trap: 0xc008bb3e00 13 D0725 14:31:44.713972 75498 usertrap_amd64.go:225] [ 570: 570] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.714192 75498 usertrap_amd64.go:212] [ 570: 570] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.714268 75498 usertrap_amd64.go:122] [ 570: 570] Allocate a new trap: 0xc008bb3e00 14 D0725 14:31:44.714339 75498 usertrap_amd64.go:225] [ 570: 570] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.737316 75498 task_signals.go:470] [ 571: 571] Notified of signal 56 D0725 14:31:44.737594 75498 task_signals.go:204] [ 571: 571] Signal 571, PID: 571, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.737724 75498 task_exit.go:204] [ 571: 571] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.739186 75498 task_exit.go:204] [ 571: 571] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.739756 75498 task_exit.go:204] [ 570: 570] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.741523 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.741582 75498 task_exit.go:204] [ 570: 570] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.741635 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.741649 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.741697 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.742153 75498 task_exit.go:204] [ 570: 570] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.745027 75498 usertrap_amd64.go:212] [ 572: 572] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.745125 75498 usertrap_amd64.go:122] [ 572: 572] Allocate a new trap: 0xc003e0cb70 9 D0725 14:31:44.745483 75498 usertrap_amd64.go:225] [ 572: 572] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.747925 75498 usertrap_amd64.go:212] [ 572: 572] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.747973 75498 usertrap_amd64.go:122] [ 572: 572] Allocate a new trap: 0xc003e0cb70 10 D0725 14:31:44.748028 75498 usertrap_amd64.go:225] [ 572: 572] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.748962 75498 usertrap_amd64.go:212] [ 572: 572] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.749010 75498 usertrap_amd64.go:122] [ 572: 572] Allocate a new trap: 0xc003e0cb70 11 D0725 14:31:44.749068 75498 usertrap_amd64.go:225] [ 572: 572] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.750428 75498 usertrap_amd64.go:212] [ 572: 572] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.750476 75498 usertrap_amd64.go:122] [ 572: 572] Allocate a new trap: 0xc003e0cb70 12 D0725 14:31:44.750527 75498 usertrap_amd64.go:225] [ 572: 572] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.752315 75498 usertrap_amd64.go:212] [ 572: 572] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.752378 75498 usertrap_amd64.go:122] [ 572: 572] Allocate a new trap: 0xc003e0cb70 13 D0725 14:31:44.752430 75498 usertrap_amd64.go:225] [ 572: 572] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.752743 75498 usertrap_amd64.go:212] [ 572: 572] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.752794 75498 usertrap_amd64.go:122] [ 572: 572] Allocate a new trap: 0xc003e0cb70 14 D0725 14:31:44.752840 75498 usertrap_amd64.go:225] [ 572: 572] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.774858 75498 task_signals.go:470] [ 573: 573] Notified of signal 56 D0725 14:31:44.775009 75498 task_signals.go:204] [ 573: 573] Signal 573, PID: 573, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.775097 75498 task_exit.go:204] [ 573: 573] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.776528 75498 task_exit.go:204] [ 573: 573] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.777436 75498 task_exit.go:204] [ 572: 572] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.778943 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.779028 75498 task_exit.go:204] [ 572: 572] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.779097 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.779090 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.779188 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.780058 75498 task_exit.go:204] [ 572: 572] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.782609 75498 usertrap_amd64.go:212] [ 574: 574] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.782682 75498 usertrap_amd64.go:122] [ 574: 574] Allocate a new trap: 0xc0090862a0 9 D0725 14:31:44.783011 75498 usertrap_amd64.go:225] [ 574: 574] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.785895 75498 usertrap_amd64.go:212] [ 574: 574] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.785944 75498 usertrap_amd64.go:122] [ 574: 574] Allocate a new trap: 0xc0090862a0 10 D0725 14:31:44.785993 75498 usertrap_amd64.go:225] [ 574: 574] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.787148 75498 usertrap_amd64.go:212] [ 574: 574] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.787214 75498 usertrap_amd64.go:122] [ 574: 574] Allocate a new trap: 0xc0090862a0 11 D0725 14:31:44.787281 75498 usertrap_amd64.go:225] [ 574: 574] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.788631 75498 usertrap_amd64.go:212] [ 574: 574] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.788688 75498 usertrap_amd64.go:122] [ 574: 574] Allocate a new trap: 0xc0090862a0 12 D0725 14:31:44.788744 75498 usertrap_amd64.go:225] [ 574: 574] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.790271 75498 usertrap_amd64.go:212] [ 574: 574] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.790313 75498 usertrap_amd64.go:122] [ 574: 574] Allocate a new trap: 0xc0090862a0 13 D0725 14:31:44.790364 75498 usertrap_amd64.go:225] [ 574: 574] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.790550 75498 usertrap_amd64.go:212] [ 574: 574] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.790611 75498 usertrap_amd64.go:122] [ 574: 574] Allocate a new trap: 0xc0090862a0 14 D0725 14:31:44.790681 75498 usertrap_amd64.go:225] [ 574: 574] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.815397 75498 task_signals.go:470] [ 575: 575] Notified of signal 56 D0725 14:31:44.815596 75498 task_signals.go:204] [ 575: 575] Signal 575, PID: 575, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.815714 75498 task_exit.go:204] [ 575: 575] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.817286 75498 task_exit.go:204] [ 575: 575] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.818250 75498 task_exit.go:204] [ 574: 574] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.819962 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.820037 75498 task_exit.go:204] [ 574: 574] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.820090 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.820147 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.820211 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.820492 75498 task_exit.go:204] [ 574: 574] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.823196 75498 usertrap_amd64.go:212] [ 576: 576] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.823273 75498 usertrap_amd64.go:122] [ 576: 576] Allocate a new trap: 0xc003e0cd20 9 D0725 14:31:44.823637 75498 usertrap_amd64.go:225] [ 576: 576] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.825873 75498 usertrap_amd64.go:212] [ 576: 576] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.825929 75498 usertrap_amd64.go:122] [ 576: 576] Allocate a new trap: 0xc003e0cd20 10 D0725 14:31:44.826000 75498 usertrap_amd64.go:225] [ 576: 576] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.826849 75498 usertrap_amd64.go:212] [ 576: 576] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.826898 75498 usertrap_amd64.go:122] [ 576: 576] Allocate a new trap: 0xc003e0cd20 11 D0725 14:31:44.826972 75498 usertrap_amd64.go:225] [ 576: 576] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.828329 75498 usertrap_amd64.go:212] [ 576: 576] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.828371 75498 usertrap_amd64.go:122] [ 576: 576] Allocate a new trap: 0xc003e0cd20 12 D0725 14:31:44.828421 75498 usertrap_amd64.go:225] [ 576: 576] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.830123 75498 usertrap_amd64.go:212] [ 576: 576] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.830183 75498 usertrap_amd64.go:122] [ 576: 576] Allocate a new trap: 0xc003e0cd20 13 D0725 14:31:44.830239 75498 usertrap_amd64.go:225] [ 576: 576] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.830459 75498 usertrap_amd64.go:212] [ 576: 576] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.830494 75498 usertrap_amd64.go:122] [ 576: 576] Allocate a new trap: 0xc003e0cd20 14 D0725 14:31:44.830533 75498 usertrap_amd64.go:225] [ 576: 576] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.852730 75498 task_signals.go:470] [ 577: 577] Notified of signal 56 D0725 14:31:44.852833 75498 task_signals.go:204] [ 577: 577] Signal 577, PID: 577, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.852928 75498 task_exit.go:204] [ 577: 577] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.854629 75498 task_exit.go:204] [ 577: 577] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.855788 75498 task_exit.go:204] [ 576: 576] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.857513 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.857568 75498 task_exit.go:204] [ 576: 576] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.857615 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.857613 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.857672 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.858140 75498 task_exit.go:204] [ 576: 576] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.860810 75498 usertrap_amd64.go:212] [ 578: 578] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.860872 75498 usertrap_amd64.go:122] [ 578: 578] Allocate a new trap: 0xc00594c2d0 9 D0725 14:31:44.861159 75498 usertrap_amd64.go:225] [ 578: 578] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.862899 75498 usertrap_amd64.go:212] [ 578: 578] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.862949 75498 usertrap_amd64.go:122] [ 578: 578] Allocate a new trap: 0xc00594c2d0 10 D0725 14:31:44.863000 75498 usertrap_amd64.go:225] [ 578: 578] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.863907 75498 usertrap_amd64.go:212] [ 578: 578] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.863952 75498 usertrap_amd64.go:122] [ 578: 578] Allocate a new trap: 0xc00594c2d0 11 D0725 14:31:44.864001 75498 usertrap_amd64.go:225] [ 578: 578] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.865040 75498 usertrap_amd64.go:212] [ 578: 578] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.865095 75498 usertrap_amd64.go:122] [ 578: 578] Allocate a new trap: 0xc00594c2d0 12 D0725 14:31:44.865138 75498 usertrap_amd64.go:225] [ 578: 578] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.866852 75498 usertrap_amd64.go:212] [ 578: 578] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.866899 75498 usertrap_amd64.go:122] [ 578: 578] Allocate a new trap: 0xc00594c2d0 13 D0725 14:31:44.866941 75498 usertrap_amd64.go:225] [ 578: 578] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.867130 75498 usertrap_amd64.go:212] [ 578: 578] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.867171 75498 usertrap_amd64.go:122] [ 578: 578] Allocate a new trap: 0xc00594c2d0 14 D0725 14:31:44.867210 75498 usertrap_amd64.go:225] [ 578: 578] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.889656 75498 task_signals.go:470] [ 579: 579] Notified of signal 56 D0725 14:31:44.889770 75498 task_signals.go:204] [ 579: 579] Signal 579, PID: 579, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.889878 75498 task_exit.go:204] [ 579: 579] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.891548 75498 task_exit.go:204] [ 579: 579] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.892933 75498 task_exit.go:204] [ 578: 578] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.894711 75498 task_signals.go:470] [ 1: 1] Notified of signal 17 D0725 14:31:44.894807 75498 task_exit.go:204] [ 578: 578] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0725 14:31:44.894872 75498 task_signals.go:443] [ 7: 7] Discarding ignored signal 17 D0725 14:31:44.894967 75498 task_signals.go:179] [ 1: 1] Restarting syscall 202: interrupted by signal 17 D0725 14:31:44.895024 75498 task_signals.go:220] [ 1: 1] Signal 17: delivering to handler D0725 14:31:44.895064 75498 task_exit.go:204] [ 578: 578] Transitioning from exit state TaskExitZombie to TaskExitDead D0725 14:31:44.897893 75498 usertrap_amd64.go:212] [ 580: 580] Found the pattern at ip 558c2ef48c36:sysno 273 D0725 14:31:44.897978 75498 usertrap_amd64.go:122] [ 580: 580] Allocate a new trap: 0xc003e0ce70 9 D0725 14:31:44.898278 75498 usertrap_amd64.go:225] [ 580: 580] Apply the binary patch addr 558c2ef48c36 trap addr 642d0 ([184 17 1 0 0 15 5] -> [255 36 37 208 66 6 0]) D0725 14:31:44.900294 75498 usertrap_amd64.go:212] [ 580: 580] Found the pattern at ip 558c2ef4bdd6:sysno 157 D0725 14:31:44.900348 75498 usertrap_amd64.go:122] [ 580: 580] Allocate a new trap: 0xc003e0ce70 10 D0725 14:31:44.900396 75498 usertrap_amd64.go:225] [ 580: 580] Apply the binary patch addr 558c2ef4bdd6 trap addr 64320 ([184 157 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0725 14:31:44.901295 75498 usertrap_amd64.go:212] [ 580: 580] Found the pattern at ip 558c2ef722d0:sysno 109 D0725 14:31:44.901339 75498 usertrap_amd64.go:122] [ 580: 580] Allocate a new trap: 0xc003e0ce70 11 D0725 14:31:44.901396 75498 usertrap_amd64.go:225] [ 580: 580] Apply the binary patch addr 558c2ef722d0 trap addr 64370 ([184 109 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0725 14:31:44.902612 75498 usertrap_amd64.go:212] [ 580: 580] Found the pattern at ip 558c2ef49bda:sysno 257 D0725 14:31:44.902654 75498 usertrap_amd64.go:122] [ 580: 580] Allocate a new trap: 0xc003e0ce70 12 D0725 14:31:44.902698 75498 usertrap_amd64.go:225] [ 580: 580] Apply the binary patch addr 558c2ef49bda trap addr 643c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0725 14:31:44.904523 75498 usertrap_amd64.go:212] [ 580: 580] Found the pattern at ip 558c2ef49d69:sysno 1 D0725 14:31:44.904566 75498 usertrap_amd64.go:122] [ 580: 580] Allocate a new trap: 0xc003e0ce70 13 D0725 14:31:44.904612 75498 usertrap_amd64.go:225] [ 580: 580] Apply the binary patch addr 558c2ef49d69 trap addr 64410 ([184 1 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0725 14:31:44.904834 75498 usertrap_amd64.go:212] [ 580: 580] Found the pattern at ip 558c2ef49e39:sysno 3 D0725 14:31:44.904899 75498 usertrap_amd64.go:122] [ 580: 580] Allocate a new trap: 0xc003e0ce70 14 D0725 14:31:44.905011 75498 usertrap_amd64.go:225] [ 580: 580] Apply the binary patch addr 558c2ef49e39 trap addr 64460 ([184 3 0 0 0 15 5] -> [255 36 37 96 68 6 0]) executing program D0725 14:31:44.926666 75498 task_signals.go:470] [ 581: 581] Notified of signal 56 D0725 14:31:44.926828 75498 task_signals.go:204] [ 581: 581] Signal 581, PID: 581, TID: 0, fault addr: 0x38: terminating thread group D0725 14:31:44.926915 75498 task_exit.go:204] [ 581: 581] Transitioning from exit state TaskExitNone to TaskExitInitiated D0725 14:31:44.928530 75498 task_exit.go:204] [ 581: 581] Transitioning from exit state TaskExitInitiated to TaskExitZombie panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x1ecb6bd] goroutine 9753 [running]: panic({0x322f40, 0x2800340}) GOROOT/src/runtime/panic.go:987 +0x3bb fp=0xc0044181b8 sp=0xc0044180f8 pc=0x130d87b runtime.panicmem(...) GOROOT/src/runtime/panic.go:260 runtime.sigpanic() GOROOT/src/runtime/signal_unix.go:837 +0x37d fp=0xc004418218 sp=0xc0044181b8 pc=0x132675d gvisor.dev/gvisor/pkg/sentry/inet.(*Namespace).Stack(...) pkg/sentry/inet/namespace.go:108 gvisor.dev/gvisor/pkg/sentry/fsimpl/proc.(*filesystem).newTaskNetDir(0xc001ad7b80, {0x84d3c0, 0xc004fc8a80}, 0xc00340f500) pkg/sentry/fsimpl/proc/task_net.go:46 +0x31d fp=0xc004418470 sp=0xc004418218 pc=0x1ecb6bd gvisor.dev/gvisor/pkg/sentry/fsimpl/proc.(*filesystem).newTaskInode(0xc001ad7b80, {0x84d3c0, 0xc004fc8a80}, 0xc00340f500, 0xc0004aad90, 0x1, 0x0) pkg/sentry/fsimpl/proc/task.go:73 +0x1594 fp=0xc0044188b0 sp=0xc004418470 pc=0x1eb8ff4 gvisor.dev/gvisor/pkg/sentry/fsimpl/proc.(*tasksInode).Lookup(0xc005547400, {0x84d3c0, 0xc004fc8a80}, {0xc008f9e710, 0x3}) pkg/sentry/fsimpl/proc/tasks.go:130 +0x3e5 fp=0xc0044189c0 sp=0xc0044188b0 pc=0x1ed3945 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Filesystem).revalidateChildLocked(0x313600?, {0x84d3c0, 0xc004fc8a80}, 0x3?, 0xc007afb830, {0xc008f9e710, 0x3}, 0x0) pkg/sentry/fsimpl/kernfs/filesystem.go:131 +0x1d8 fp=0xc004418a58 sp=0xc0044189c0 pc=0x190eab8 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Filesystem).stepExistingLocked(0x131f4b9?, {0x84d3c0, 0xc004fc8a80}, 0xc0050a8480, 0xc007afb830) pkg/sentry/fsimpl/kernfs/filesystem.go:75 +0x3ea fp=0xc004418b98 sp=0xc004418a58 pc=0x190e48a gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Filesystem).walkExistingLocked(0xc001ad7bd0?, {0x84d3c0, 0xc004fc8a80}, 0xc0050a8480) pkg/sentry/fsimpl/kernfs/filesystem.go:163 +0xdf fp=0xc004418c00 sp=0xc004418b98 pc=0x190ed9f gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Filesystem).OpenAt(0xc001ad7b80, {0x84d3c0, 0xc004fc8a80}, 0xc0050a8480, {0x8002, 0x0, 0x0}) pkg/sentry/fsimpl/kernfs/filesystem.go:486 +0x1c5 fp=0xc004418ef0 sp=0xc004418c00 pc=0x1912d65 gvisor.dev/gvisor/pkg/sentry/fsimpl/proc.(*filesystem).OpenAt(0xc001ad7b80, {0x84d3c0, 0xc004fc8a80}, 0xc0050a8480?, {0x37f5300?, 0x0?, 0x0?}) :1 +0x85 fp=0xc004418f50 sp=0xc004418ef0 pc=0x1ef4f65 gvisor.dev/gvisor/pkg/sentry/vfs.(*VirtualFilesystem).OpenAt(0xc00698bd00?, {0x84d3c0, 0xc004fc8a80}, 0xc00003e400?, 0xc004419370, 0xc004419268) pkg/sentry/vfs/vfs.go:460 +0x517 fp=0xc0044191c0 sp=0xc004418f50 pc=0x1872a17 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.openat(0xc004fc8a80, 0x1?, 0x1349ba5?, 0x2, 0x0) pkg/sentry/syscalls/linux/sys_file.go:112 +0x2b2 fp=0xc004419420 sp=0xc0044191c0 pc=0x1d9cff2 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Openat(0xc0044194d8?, 0x3?, {{0xffffff9c}, {0x7ec56fc9abd0}, {0x2}, {0x0}, {0x13}, {0x7ec56fc9a905}}) pkg/sentry/syscalls/linux/sys_file.go:91 +0x45 fp=0xc004419480 sp=0xc004419420 pc=0x1d9cc45 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc004fc8a80, 0x101, {{0xffffff9c}, {0x7ec56fc9abd0}, {0x2}, {0x0}, {0x13}, {0x7ec56fc9a905}}) pkg/sentry/kernel/task_syscall.go:142 +0x9c2 fp=0xc004419960 sp=0xc004419480 pc=0x1bb0002 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc004fc8a80, 0x1357d1a?, {{0xffffff9c}, {0x7ec56fc9abd0}, {0x2}, {0x0}, {0x13}, {0x7ec56fc9a905}}) pkg/sentry/kernel/task_syscall.go:322 +0x7d fp=0xc0044199f8 sp=0xc004419960 pc=0x1bb1dfd gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0x0?, 0x0?, {{0xffffff9c}, {0x7ec56fc9abd0}, {0x2}, {0x0}, {0x13}, {0x7ec56fc9a905}}) pkg/sentry/kernel/task_syscall.go:282 +0x8f fp=0xc004419a70 sp=0xc0044199f8 pc=0x1bb17af gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc004fc8a80) pkg/sentry/kernel/task_syscall.go:257 +0x4c5 fp=0xc004419b98 sp=0xc004419a70 pc=0x1bb1345 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc004fc8a80?, 0xc004fc8a80) pkg/sentry/kernel/task_run.go:269 +0x1d4b fp=0xc004419e70 sp=0xc004419b98 pc=0x1b9ba0b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc004fc8a80, 0x244) pkg/sentry/kernel/task_run.go:98 +0x41b fp=0xc004419fb0 sp=0xc004419e70 pc=0x1b9929b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:389 +0x48 fp=0xc004419fe0 sp=0xc004419fb0 pc=0x1badb08 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc004419fe8 sp=0xc004419fe0 pc=0x1346801 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:389 +0x1ad goroutine 1 [semacquire]: runtime.gopark(0xc0002547b0?, 0x3?, 0x0?, 0xe0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00076a758 sp=0xc00076a738 pc=0x1310ab6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.semacquire1(0xc0004aae40, 0x38?, 0x1, 0x0, 0x1?) GOROOT/src/runtime/sema.go:160 +0x20f fp=0xc00076a7c0 sp=0xc00076a758 pc=0x132396f sync.runtime_Semacquire(0xc0004aae40?) GOROOT/src/runtime/sema.go:62 +0x27 fp=0xc00076a7f8 sp=0xc00076a7c0 pc=0x1341de7 sync.(*WaitGroup).Wait(0xc0004aae38) GOROOT/src/sync/waitgroup.go:116 +0xa5 fp=0xc00076a828 sp=0xc00076a7f8 pc=0x135a245 gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:1162 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc000326400) runsc/boot/loader.go:1207 +0x65 fp=0xc00076a850 sp=0xc00076a828 pc=0x2322f65 gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc000307b80, {0xc0001b4110?, 0x14?}, 0xc0004a3f20, {0xc0004a8f40, 0x2, 0xc0000061a0?}) runsc/cmd/boot.go:461 +0x2336 fp=0xc00076b060 sp=0xc00076a850 pc=0x26aa7d6 github.com/google/subcommands.(*Commander).Execute(0xc0001b6000, {0x840118, 0xc0001a6008}, {0xc0004a8f40, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x722 fp=0xc00076b178 sp=0xc00076b060 pc=0x1450922 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main() runsc/cli/main.go:260 +0xba70 fp=0xc00076bf68 sp=0xc00076b178 pc=0x26f9ed0 main.main() runsc/main.go:31 +0x25 fp=0xc00076bf80 sp=0xc00076bf68 pc=0x26fa6e5 runtime.main() GOROOT/src/runtime/proc.go:250 +0x207 fp=0xc00076bfe0 sp=0xc00076bf80 pc=0x1310667 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00076bfe8 sp=0xc00076bfe0 pc=0x1346801 goroutine 2 [force gc (idle)]: runtime.gopark(0x2886f60?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001347b0 sp=0xc000134790 pc=0x1310ab6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.forcegchelper() GOROOT/src/runtime/proc.go:305 +0xb0 fp=0xc0001347e0 sp=0xc0001347b0 pc=0x13108f0 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001347e8 sp=0xc0001347e0 pc=0x1346801 created by runtime.init.6 GOROOT/src/runtime/proc.go:293 +0x25 goroutine 3 [GC sweep wait]: runtime.gopark(0x1?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000142f80 sp=0xc000142f60 pc=0x1310ab6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.bgsweep(0x0?) GOROOT/src/runtime/mgcsweep.go:319 +0xde fp=0xc000142fc8 sp=0xc000142f80 pc=0x12faf1e runtime.gcenable.func1() GOROOT/src/runtime/mgc.go:178 +0x26 fp=0xc000142fe0 sp=0xc000142fc8 pc=0x12f00e6 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000142fe8 sp=0xc000142fe0 pc=0x1346801 created by runtime.gcenable GOROOT/src/runtime/mgc.go:178 +0x6b goroutine 4 [GC scavenge wait]: runtime.gopark(0x2886240?, 0x826180?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000148f70 sp=0xc000148f50 pc=0x1310ab6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.(*scavengerState).park(0x2886240) GOROOT/src/runtime/mgcscavenge.go:400 +0x53 fp=0xc000148fa0 sp=0xc000148f70 pc=0x12f8e13 runtime.bgscavenge(0x0?) GOROOT/src/runtime/mgcscavenge.go:633 +0x65 fp=0xc000148fc8 sp=0xc000148fa0 pc=0x12f93e5 runtime.gcenable.func2() GOROOT/src/runtime/mgc.go:179 +0x26 fp=0xc000148fe0 sp=0xc000148fc8 pc=0x12f0086 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000148fe8 sp=0xc000148fe0 pc=0x1346801 created by runtime.gcenable GOROOT/src/runtime/mgc.go:179 +0xaa goroutine 18 [finalizer wait]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000284e28 sp=0xc000284e08 pc=0x1310ab6 runtime.runfinq() GOROOT/src/runtime/mfinal.go:193 +0x13d fp=0xc000284fe0 sp=0xc000284e28 pc=0x12ef09d runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000284fe8 sp=0xc000284fe0 pc=0x1346801 created by runtime.createfing GOROOT/src/runtime/mfinal.go:163 +0x45 goroutine 19 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000283f50 sp=0xc000283f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000283fe0 sp=0xc000283f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000283fe8 sp=0xc000283fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 20 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000282f50 sp=0xc000282f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000282fe0 sp=0xc000282f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000282fe8 sp=0xc000282fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 34 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000281f50 sp=0xc000281f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000281fe0 sp=0xc000281f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000281fe8 sp=0xc000281fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 50 [GC worker (idle)]: runtime.gopark(0xc00015e000?, 0x826180?, 0x1?, 0x0?, 0x12faeab?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000280f50 sp=0xc000280f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000280fe0 sp=0xc000280f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000280fe8 sp=0xc000280fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 5 [GC worker (idle)]: runtime.gopark(0x12e4507?, 0x48?, 0xe0?, 0x21?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000221f50 sp=0xc000221f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000221fe0 sp=0xc000221f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000221fe8 sp=0xc000221fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 21 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000220f50 sp=0xc000220f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000220fe0 sp=0xc000220f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000220fe8 sp=0xc000220fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 35 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00021ff50 sp=0xc00021ff30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00021ffe0 sp=0xc00021ff50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00021ffe8 sp=0xc00021ffe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 36 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00021ef50 sp=0xc00021ef30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00021efe0 sp=0xc00021ef50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00021efe8 sp=0xc00021efe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 6 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00021df50 sp=0xc00021df30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00021dfe0 sp=0xc00021df50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00021dfe8 sp=0xc00021dfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 22 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00021cf50 sp=0xc00021cf30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00021cfe0 sp=0xc00021cf50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00021cfe8 sp=0xc00021cfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 37 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00021bf50 sp=0xc00021bf30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00021bfe0 sp=0xc00021bf50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00021bfe8 sp=0xc00021bfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 7 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00021af50 sp=0xc00021af30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00021afe0 sp=0xc00021af50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00021afe8 sp=0xc00021afe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 38 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000559f50 sp=0xc000559f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000559fe0 sp=0xc000559f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000559fe8 sp=0xc000559fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 8 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000558f50 sp=0xc000558f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000558fe0 sp=0xc000558f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000558fe8 sp=0xc000558fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 23 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000557f50 sp=0xc000557f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000557fe0 sp=0xc000557f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000557fe8 sp=0xc000557fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 9 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000556f50 sp=0xc000556f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000556fe0 sp=0xc000556f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000556fe8 sp=0xc000556fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 24 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000555f50 sp=0xc000555f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000555fe0 sp=0xc000555f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000555fe8 sp=0xc000555fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 10 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000554f50 sp=0xc000554f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000554fe0 sp=0xc000554f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000554fe8 sp=0xc000554fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 39 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000553f50 sp=0xc000553f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000553fe0 sp=0xc000553f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000553fe8 sp=0xc000553fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 25 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000552f50 sp=0xc000552f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000552fe0 sp=0xc000552f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000552fe8 sp=0xc000552fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 11 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00022bf50 sp=0xc00022bf30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00022bfe0 sp=0xc00022bf50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00022bfe8 sp=0xc00022bfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 40 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00022af50 sp=0xc00022af30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00022afe0 sp=0xc00022af50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00022afe8 sp=0xc00022afe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 26 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000229f50 sp=0xc000229f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000229fe0 sp=0xc000229f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000229fe8 sp=0xc000229fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 12 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000228f50 sp=0xc000228f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000228fe0 sp=0xc000228f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000228fe8 sp=0xc000228fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 41 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000227f50 sp=0xc000227f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000227fe0 sp=0xc000227f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000227fe8 sp=0xc000227fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 27 [GC worker (idle)]: runtime.gopark(0x12e4507?, 0x48?, 0xe0?, 0x21?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000226f50 sp=0xc000226f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000226fe0 sp=0xc000226f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000226fe8 sp=0xc000226fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 13 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000225f50 sp=0xc000225f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000225fe0 sp=0xc000225f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000225fe8 sp=0xc000225fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 42 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000224f50 sp=0xc000224f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000224fe0 sp=0xc000224f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000224fe8 sp=0xc000224fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 28 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000179f50 sp=0xc000179f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000179fe0 sp=0xc000179f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000179fe8 sp=0xc000179fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 14 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000178f50 sp=0xc000178f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000178fe0 sp=0xc000178f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000178fe8 sp=0xc000178fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 43 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000177f50 sp=0xc000177f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000177fe0 sp=0xc000177f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000177fe8 sp=0xc000177fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 44 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000176f50 sp=0xc000176f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000176fe0 sp=0xc000176f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000176fe8 sp=0xc000176fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 45 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000175f50 sp=0xc000175f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000175fe0 sp=0xc000175f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000175fe8 sp=0xc000175fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 46 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000174f50 sp=0xc000174f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000174fe0 sp=0xc000174f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000174fe8 sp=0xc000174fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 15 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000173f50 sp=0xc000173f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000173fe0 sp=0xc000173f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000173fe8 sp=0xc000173fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 29 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000172f50 sp=0xc000172f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000172fe0 sp=0xc000172f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000172fe8 sp=0xc000172fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 47 [GC worker (idle)]: runtime.gopark(0xc00015e000?, 0x826180?, 0x1?, 0x0?, 0x12faeab?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000217f50 sp=0xc000217f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000217fe0 sp=0xc000217f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000217fe8 sp=0xc000217fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 16 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000216f50 sp=0xc000216f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000216fe0 sp=0xc000216f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000216fe8 sp=0xc000216fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 30 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000215f50 sp=0xc000215f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000215fe0 sp=0xc000215f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000215fe8 sp=0xc000215fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 66 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000214f50 sp=0xc000214f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000214fe0 sp=0xc000214f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000214fe8 sp=0xc000214fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 48 [GC worker (idle)]: runtime.gopark(0x12e4507?, 0x48?, 0xe0?, 0x21?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000213f50 sp=0xc000213f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000213fe0 sp=0xc000213f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000213fe8 sp=0xc000213fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 31 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000212f50 sp=0xc000212f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000212fe0 sp=0xc000212f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000212fe8 sp=0xc000212fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 67 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000211f50 sp=0xc000211f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000211fe0 sp=0xc000211f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000211fe8 sp=0xc000211fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 49 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000210f50 sp=0xc000210f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000210fe0 sp=0xc000210f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000210fe8 sp=0xc000210fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 82 [GC worker (idle)]: runtime.gopark(0xc00015e000?, 0x826180?, 0x1?, 0x0?, 0x12faeab?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000561f50 sp=0xc000561f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000561fe0 sp=0xc000561f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000561fe8 sp=0xc000561fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 32 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000560f50 sp=0xc000560f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000560fe0 sp=0xc000560f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000560fe8 sp=0xc000560fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 68 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00055ff50 sp=0xc00055ff30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00055ffe0 sp=0xc00055ff50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00055ffe8 sp=0xc00055ffe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 83 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00055ef50 sp=0xc00055ef30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00055efe0 sp=0xc00055ef50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00055efe8 sp=0xc00055efe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 69 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00055df50 sp=0xc00055df30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00055dfe0 sp=0xc00055df50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00055dfe8 sp=0xc00055dfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 33 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00055cf50 sp=0xc00055cf30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00055cfe0 sp=0xc00055cf50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00055cfe8 sp=0xc00055cfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 84 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00055bf50 sp=0xc00055bf30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00055bfe0 sp=0xc00055bf50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00055bfe8 sp=0xc00055bfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 98 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00055af50 sp=0xc00055af30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00055afe0 sp=0xc00055af50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00055afe8 sp=0xc00055afe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 70 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00023df50 sp=0xc00023df30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00023dfe0 sp=0xc00023df50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00023dfe8 sp=0xc00023dfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 85 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00023cf50 sp=0xc00023cf30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00023cfe0 sp=0xc00023cf50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00023cfe8 sp=0xc00023cfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 99 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00023bf50 sp=0xc00023bf30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00023bfe0 sp=0xc00023bf50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00023bfe8 sp=0xc00023bfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 71 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00023af50 sp=0xc00023af30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00023afe0 sp=0xc00023af50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00023afe8 sp=0xc00023afe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 86 [GC worker (idle)]: runtime.gopark(0x12e4507?, 0x48?, 0xe0?, 0x21?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000239f50 sp=0xc000239f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000239fe0 sp=0xc000239f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000239fe8 sp=0xc000239fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 100 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000238f50 sp=0xc000238f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000238fe0 sp=0xc000238f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000238fe8 sp=0xc000238fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 72 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000237f50 sp=0xc000237f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000237fe0 sp=0xc000237f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000237fe8 sp=0xc000237fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 87 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000236f50 sp=0xc000236f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000236fe0 sp=0xc000236f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000236fe8 sp=0xc000236fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 101 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000233f50 sp=0xc000233f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000233fe0 sp=0xc000233f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000233fe8 sp=0xc000233fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 73 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000232f50 sp=0xc000232f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000232fe0 sp=0xc000232f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000232fe8 sp=0xc000232fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 88 [GC worker (idle)]: runtime.gopark(0x37f67e0?, 0x3?, 0x85?, 0x1?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000231f50 sp=0xc000231f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000231fe0 sp=0xc000231f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000231fe8 sp=0xc000231fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 89 [GC worker (idle)]: runtime.gopark(0x39c351c70d308?, 0x3?, 0xd8?, 0x22?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000230f50 sp=0xc000230f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000230fe0 sp=0xc000230f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000230fe8 sp=0xc000230fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 74 [GC worker (idle)]: runtime.gopark(0x37f67e0?, 0x3?, 0xa6?, 0x45?, 0x12faeab?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00022ff50 sp=0xc00022ff30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00022ffe0 sp=0xc00022ff50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00022ffe8 sp=0xc00022ffe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 102 [GC worker (idle)]: runtime.gopark(0x39c351c72a188?, 0xc0001cb9c0?, 0x1a?, 0x14?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00022ef50 sp=0xc00022ef30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00022efe0 sp=0xc00022ef50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00022efe8 sp=0xc00022efe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 103 [GC worker (idle)]: runtime.gopark(0x39c351c70ad06?, 0x1?, 0x51?, 0xae?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00022df50 sp=0xc00022df30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00022dfe0 sp=0xc00022df50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00022dfe8 sp=0xc00022dfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 90 [GC worker (idle)]: runtime.gopark(0x39c351c719db0?, 0x1?, 0xd1?, 0x69?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00022cf50 sp=0xc00022cf30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00022cfe0 sp=0xc00022cf50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00022cfe8 sp=0xc00022cfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 75 [GC worker (idle)]: runtime.gopark(0x39c351c72237a?, 0x1?, 0x16?, 0xb5?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000245f50 sp=0xc000245f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000245fe0 sp=0xc000245f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000245fe8 sp=0xc000245fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 91 [GC worker (idle)]: runtime.gopark(0x39c351c70eae6?, 0x1?, 0x53?, 0x46?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000244f50 sp=0xc000244f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000244fe0 sp=0xc000244f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000244fe8 sp=0xc000244fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 76 [GC worker (idle)]: runtime.gopark(0x39c351c70aa9a?, 0x1?, 0x9a?, 0x8f?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000243f50 sp=0xc000243f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000243fe0 sp=0xc000243f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000243fe8 sp=0xc000243fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 92 [GC worker (idle)]: runtime.gopark(0x39c351c729e22?, 0x1?, 0x34?, 0x93?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000242f50 sp=0xc000242f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000242fe0 sp=0xc000242f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000242fe8 sp=0xc000242fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 77 [GC worker (idle)]: runtime.gopark(0x39c351c709fa0?, 0x1?, 0x32?, 0x27?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000241f50 sp=0xc000241f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000241fe0 sp=0xc000241f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000241fe8 sp=0xc000241fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 78 [GC worker (idle)]: runtime.gopark(0x39c351c71cfec?, 0x3?, 0xfe?, 0x2d?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000240f50 sp=0xc000240f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000240fe0 sp=0xc000240f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000240fe8 sp=0xc000240fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 104 [GC worker (idle)]: runtime.gopark(0x37f67e0?, 0x1?, 0x70?, 0xb4?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00023ff50 sp=0xc00023ff30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00023ffe0 sp=0xc00023ff50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00023ffe8 sp=0xc00023ffe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 93 [GC worker (idle)]: runtime.gopark(0x39c351c7105bc?, 0x1?, 0xe7?, 0xf3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00023ef50 sp=0xc00023ef30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00023efe0 sp=0xc00023ef50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00023efe8 sp=0xc00023efe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 79 [GC worker (idle)]: runtime.gopark(0x39c351c70ab44?, 0x1?, 0xa?, 0xd7?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000573f50 sp=0xc000573f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000573fe0 sp=0xc000573f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000573fe8 sp=0xc000573fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 105 [GC worker (idle)]: runtime.gopark(0x37f67e0?, 0x3?, 0x2a?, 0x6f?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000572f50 sp=0xc000572f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000572fe0 sp=0xc000572f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000572fe8 sp=0xc000572fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 94 [GC worker (idle)]: runtime.gopark(0x37f67e0?, 0x1?, 0x40?, 0x54?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000571f50 sp=0xc000571f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000571fe0 sp=0xc000571f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000571fe8 sp=0xc000571fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 80 [GC worker (idle)]: runtime.gopark(0x39c351c7223d4?, 0x3?, 0xdb?, 0x3e?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000570f50 sp=0xc000570f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000570fe0 sp=0xc000570f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000570fe8 sp=0xc000570fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 106 [GC worker (idle)]: runtime.gopark(0x39c351c72c4d8?, 0x1?, 0x87?, 0xa8?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00056ff50 sp=0xc00056ff30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00056ffe0 sp=0xc00056ff50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00056ffe8 sp=0xc00056ffe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 107 [GC worker (idle)]: runtime.gopark(0x37f67e0?, 0x1?, 0x22?, 0x2c?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00056ef50 sp=0xc00056ef30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00056efe0 sp=0xc00056ef50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00056efe8 sp=0xc00056efe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 108 [GC worker (idle)]: runtime.gopark(0x39c351c70a946?, 0x1?, 0xf9?, 0xfc?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00056df50 sp=0xc00056df30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00056dfe0 sp=0xc00056df50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00056dfe8 sp=0xc00056dfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 109 [GC worker (idle)]: runtime.gopark(0x37f67e0?, 0x1?, 0x40?, 0xf0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00056cf50 sp=0xc00056cf30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00056cfe0 sp=0xc00056cf50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00056cfe8 sp=0xc00056cfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 81 [GC worker (idle)]: runtime.gopark(0x37f67e0?, 0x1?, 0x44?, 0xbc?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00024df50 sp=0xc00024df30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00024dfe0 sp=0xc00024df50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00024dfe8 sp=0xc00024dfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 95 [GC worker (idle)]: runtime.gopark(0x37f67e0?, 0x1?, 0x7b?, 0xf1?, 0x12faeab?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00024cf50 sp=0xc00024cf30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00024cfe0 sp=0xc00024cf50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00024cfe8 sp=0xc00024cfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 114 [GC worker (idle)]: runtime.gopark(0x39c351c70a2c0?, 0x1?, 0x25?, 0x92?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00024bf50 sp=0xc00024bf30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00024bfe0 sp=0xc00024bf50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00024bfe8 sp=0xc00024bfe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 96 [GC worker (idle)]: runtime.gopark(0x39c351c71a512?, 0x1?, 0xc2?, 0xb3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00024af50 sp=0xc00024af30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00024afe0 sp=0xc00024af50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00024afe8 sp=0xc00024afe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 110 [GC worker (idle)]: runtime.gopark(0x39c351c70d1c8?, 0x3?, 0x70?, 0x22?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000249f50 sp=0xc000249f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000249fe0 sp=0xc000249f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000249fe8 sp=0xc000249fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 111 [GC worker (idle)]: runtime.gopark(0x39c351c72d8a7?, 0x1?, 0x19?, 0xe6?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000248f50 sp=0xc000248f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000248fe0 sp=0xc000248f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000248fe8 sp=0xc000248fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 115 [GC worker (idle)]: runtime.gopark(0x39c351c70c4d0?, 0x1?, 0xc0?, 0x2c?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000247f50 sp=0xc000247f30 pc=0x1310ab6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000247fe0 sp=0xc000247f50 pc=0x12f1e51 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000247fe8 sp=0xc000247fe0 pc=0x1346801 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 VM DIAGNOSIS: I0725 14:31:45.078483 85185 main.go:230] *************************** I0725 14:31:45.078556 85185 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-0] I0725 14:31:45.078619 85185 main.go:232] Version 0.0.0 I0725 14:31:45.078661 85185 main.go:233] GOOS: linux I0725 14:31:45.078692 85185 main.go:234] GOARCH: amd64 I0725 14:31:45.078718 85185 main.go:235] PID: 85185 I0725 14:31:45.078745 85185 main.go:236] UID: 0, GID: 0 I0725 14:31:45.078774 85185 main.go:237] Configuration: I0725 14:31:45.078814 85185 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0725 14:31:45.078840 85185 main.go:239] Platform: systrap I0725 14:31:45.078866 85185 main.go:240] FileAccess: shared I0725 14:31:45.078893 85185 main.go:241] Directfs: true I0725 14:31:45.078925 85185 main.go:242] Overlay: none I0725 14:31:45.078954 85185 main.go:243] Network: sandbox, logging: false I0725 14:31:45.079019 85185 main.go:244] Strace: false, max size: 1024, syscalls: I0725 14:31:45.079067 85185 main.go:245] IOURING: false I0725 14:31:45.079131 85185 main.go:246] Debug: true I0725 14:31:45.079177 85185 main.go:247] Systemd: false I0725 14:31:45.079219 85185 main.go:248] *************************** W0725 14:31:45.079265 85185 main.go:253] Block the TERM signal. This is only safe in tests! D0725 14:31:45.079339 85185 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0725 14:31:45.079576 85185 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-0": file does not exist loading container "ci-gvisor-systrap-1-race-0": file does not exist W0725 14:31:45.079830 85185 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-0"]: exit status 128 I0725 14:31:45.078483 85185 main.go:230] *************************** I0725 14:31:45.078556 85185 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-0] I0725 14:31:45.078619 85185 main.go:232] Version 0.0.0 I0725 14:31:45.078661 85185 main.go:233] GOOS: linux I0725 14:31:45.078692 85185 main.go:234] GOARCH: amd64 I0725 14:31:45.078718 85185 main.go:235] PID: 85185 I0725 14:31:45.078745 85185 main.go:236] UID: 0, GID: 0 I0725 14:31:45.078774 85185 main.go:237] Configuration: I0725 14:31:45.078814 85185 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0725 14:31:45.078840 85185 main.go:239] Platform: systrap I0725 14:31:45.078866 85185 main.go:240] FileAccess: shared I0725 14:31:45.078893 85185 main.go:241] Directfs: true I0725 14:31:45.078925 85185 main.go:242] Overlay: none I0725 14:31:45.078954 85185 main.go:243] Network: sandbox, logging: false I0725 14:31:45.079019 85185 main.go:244] Strace: false, max size: 1024, syscalls: I0725 14:31:45.079067 85185 main.go:245] IOURING: false I0725 14:31:45.079131 85185 main.go:246] Debug: true I0725 14:31:45.079177 85185 main.go:247] Systemd: false I0725 14:31:45.079219 85185 main.go:248] *************************** W0725 14:31:45.079265 85185 main.go:253] Block the TERM signal. This is only safe in tests! D0725 14:31:45.079339 85185 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0725 14:31:45.079576 85185 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-0": file does not exist loading container "ci-gvisor-systrap-1-race-0": file does not exist W0725 14:31:45.079830 85185 main.go:274] Failure to execute command, err: 1 [904764.344594] CPU: 88 PID: 151628 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [904764.344595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [904764.344598] RIP: 0033:0x7fffffffe062 [904764.344600] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [904764.344601] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [904764.344602] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [904764.344603] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [904764.344603] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [904764.344604] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [904764.344604] R13: 0000000000000014 R14: 000000c0001b3520 R15: 0000000000008137 [904764.344605] FS: 000000c000130490 GS: 0000000000000000 [904764.479317] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [904764.484800] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [904764.493524] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [904764.502310] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [904764.511084] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [904764.519843] R13: 0000000000000014 R14: 000000c0001b3520 R15: 0000000000008137 [904764.528582] FS: 000000c000130490 GS: 0000000000000000 [904773.954958] potentially unexpected fatal signal 5. [904773.959992] CPU: 12 PID: 153765 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [904773.970434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [904773.979903] RIP: 0033:0x7fffffffe062 [904773.983746] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [904774.004425] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [904774.011272] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [904774.018653] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [904774.027398] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [904774.034847] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [904774.042214] R13: 0000000000000034 R14: 000000c000176d00 R15: 0000000000008851 [904774.049583] FS: 000000c000180090 GS: 0000000000000000 [906002.065712] exe[162289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55de50764839 cs:33 sp:7f7b49b77858 ax:0 si:55de507bd070 di:ffffffffff600000 [907056.663723] exe[185996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f33ef8f839 cs:33 sp:7ecdadbed858 ax:0 si:55f33efe8070 di:ffffffffff600000 [907883.219082] exe[193889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e2df76839 cs:33 sp:7f0de5d98858 ax:0 si:556e2dfcf070 di:ffffffffff600000 [908176.207258] exe[212041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf65858839 cs:33 sp:7fca1d173858 ax:0 si:55cf658b1062 di:ffffffffff600000 [908364.258468] potentially unexpected fatal signal 5. [908364.263497] CPU: 64 PID: 239277 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [908364.273891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [908364.283317] RIP: 0033:0x7fffffffe062 [908364.287117] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [908364.306115] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [908364.311556] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [908364.318971] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [908364.326365] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [908364.335104] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [908364.342462] R13: 000000000000001c R14: 000000c0005024e0 R15: 0000000000024e0a [908364.349845] FS: 000000c000130890 GS: 0000000000000000 [908364.956302] potentially unexpected fatal signal 5. [908364.961341] CPU: 53 PID: 175630 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [908364.971839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [908364.981301] RIP: 0033:0x7fffffffe062 [908364.985164] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [908365.005576] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [908365.012558] RAX: 000000000003a6d3 RBX: 0000000000000000 RCX: 00007fffffffe05a [908365.021359] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [908365.030116] RBP: 000000c00013de38 R08: 000000c0049f7e10 R09: 0000000000000000 [908365.038857] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [908365.047605] R13: 0000000000000036 R14: 000000c000502340 R15: 0000000000024e48 [908365.056329] FS: 000000000229acd0 GS: 0000000000000000 [908365.084402] potentially unexpected fatal signal 5. [908365.090523] CPU: 81 PID: 234647 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [908365.102332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [908365.113140] RIP: 0033:0x7fffffffe062 [908365.116925] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [908365.135919] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [908365.142734] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [908365.150097] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [908365.158822] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [908365.167562] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [908365.174954] R13: 000000000000003a R14: 000000c000517a00 R15: 0000000000024e3c [908365.183712] FS: 000000000229acd0 GS: 0000000000000000 [908372.245113] potentially unexpected fatal signal 5. [908372.250147] CPU: 30 PID: 239660 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [908372.260731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [908372.270190] RIP: 0033:0x7fffffffe062 [908372.274010] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [908372.293007] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [908372.299843] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [908372.307195] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [908372.316129] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [908372.324881] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [908372.333635] R13: 000000000000001c R14: 000000c000467040 R15: 00000000000255b8 [908372.342536] FS: 000000c000130c90 GS: 0000000000000000 [908375.171784] potentially unexpected fatal signal 5. [908375.176842] CPU: 80 PID: 225504 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [908375.187278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [908375.196714] RIP: 0033:0x7fffffffe062 [908375.200499] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [908375.219543] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [908375.224994] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [908375.234106] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [908375.242822] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [908375.250203] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [908375.259011] R13: 0000000000000036 R14: 000000c0004c7520 R15: 0000000000025949 [908375.267775] FS: 000000c000180090 GS: 0000000000000000 [908384.897663] potentially unexpected fatal signal 5. [908384.902731] CPU: 13 PID: 227487 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [908384.913163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [908384.922617] RIP: 0033:0x7fffffffe062 [908384.926470] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [908384.946869] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [908384.952323] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [908384.961063] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [908384.969814] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [908384.977729] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [908384.985101] R13: 0000000000000004 R14: 000000c000582b60 R15: 000000000002694b [908384.992544] FS: 000000c000180090 GS: 0000000000000000 [911956.968886] potentially unexpected fatal signal 5. [911956.973922] CPU: 72 PID: 127086 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [911956.984510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [911956.993984] RIP: 0033:0x7fffffffe062 [911956.997892] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [911957.017012] RSP: 002b:000000c000967cb0 EFLAGS: 00000297 [911957.022531] RAX: 0000000000050aec RBX: 0000000000000000 RCX: 00007fffffffe05a [911957.031397] RDX: 0000000000000000 RSI: 000000c000968000 RDI: 0000000000012f00 [911957.040136] RBP: 000000c000967d40 R08: 000000c0038e93c0 R09: 0000000000000000 [911957.048963] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000967bf8 [911957.057701] R13: 000000c000224000 R14: 000000c0001b1520 R15: 0000000000007714 [911957.066443] FS: 00007ff716dff6c0 GS: 0000000000000000 [911977.653379] potentially unexpected fatal signal 5. [911977.658420] CPU: 13 PID: 263440 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [911977.668830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [911977.678283] RIP: 0033:0x7fffffffe062 [911977.682095] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [911977.702585] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [911977.708035] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [911977.715393] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [911977.722790] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [911977.731484] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [911977.738824] R13: 000000000000001c R14: 000000c00046d520 R15: 000000000003a9bd [911977.746185] FS: 000000c000130490 GS: 0000000000000000 [911977.799870] potentially unexpected fatal signal 5. [911977.805924] CPU: 56 PID: 243562 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [911977.817705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [911977.828642] RIP: 0033:0x7fffffffe062 [911977.833834] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [911977.852849] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [911977.859669] RAX: 0000000000050f6e RBX: 0000000000000000 RCX: 00007fffffffe05a [911977.867023] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [911977.874394] RBP: 000000c00018fe38 R08: 000000c000a9d000 R09: 0000000000000000 [911977.881846] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [911977.889669] R13: 000000000000001e R14: 000000c0004804e0 R15: 000000000003a9c6 [911977.898440] FS: 000000000229acd0 GS: 0000000000000000 [911985.467649] potentially unexpected fatal signal 5. [911985.472704] CPU: 67 PID: 332528 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [911985.483164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [911985.492619] RIP: 0033:0x7fffffffe062 [911985.496429] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [911985.515433] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [911985.522266] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [911985.531022] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [911985.539855] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [911985.548588] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [911985.555102] potentially unexpected fatal signal 5. [911985.557352] R13: 000000000000001c R14: 000000c000517040 R15: 000000000003ae58 [911985.562367] CPU: 56 PID: 332526 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [911985.571099] FS: 000000c000130490 GS: 0000000000000000 [911985.589795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [911985.600703] RIP: 0033:0x7fffffffe062 [911985.605870] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [911985.624894] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [911985.631795] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [911985.640538] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [911985.647917] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [911985.655285] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [911985.664021] R13: 000000000000001c R14: 000000c000517040 R15: 000000000003ae58 [911985.672753] FS: 000000c000130490 GS: 0000000000000000 [911985.860052] potentially unexpected fatal signal 5. [911985.865101] CPU: 44 PID: 332427 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [911985.876891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [911985.887762] RIP: 0033:0x7fffffffe062 [911985.892881] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [911985.913277] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [911985.920085] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [911985.927557] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [911985.936289] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [911985.945135] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [911985.953843] R13: 000000000000001c R14: 000000c000517040 R15: 000000000003ae58 [911985.961196] FS: 000000c000130490 GS: 0000000000000000 [911986.498039] potentially unexpected fatal signal 5. [911986.503127] CPU: 82 PID: 332444 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [911986.513661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [911986.523101] RIP: 0033:0x7fffffffe062 [911986.526897] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [911986.539757] potentially unexpected fatal signal 5. [911986.545971] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [911986.551015] CPU: 88 PID: 288686 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [911986.551016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [911986.551020] RIP: 0033:0x7fffffffe062 [911986.551022] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [911986.551023] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [911986.551025] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [911986.551025] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [911986.551026] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [911986.551026] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [911986.551027] R13: 000000000000001e R14: 000000c000155040 R15: 000000000003ade7 [911986.551028] FS: 000000000229acd0 GS: 0000000000000000 [911986.652976] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [911986.660338] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [911986.667697] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [911986.675076] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [911986.682430] R13: 000000000000001e R14: 000000c000155040 R15: 000000000003ade7 [911986.691200] FS: 000000000229acd0 GS: 0000000000000000 [911987.568913] potentially unexpected fatal signal 5. [911987.573961] CPU: 7 PID: 242426 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [911987.584284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [911987.593740] RIP: 0033:0x7fffffffe062 [911987.597735] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [911987.616778] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [911987.623608] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [911987.630979] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [911987.640089] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [911987.648832] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [911987.657572] R13: 0000000000000016 R14: 000000c0005024e0 R15: 000000000003b10e [911987.666318] FS: 000000c000130490 GS: 0000000000000000 [912401.102461] exe[352106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cae1b7839 cs:33 sp:7ec19f02a858 ax:0 si:557cae210070 di:ffffffffff600000 [913345.234079] exe[345624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586947ec839 cs:33 sp:7fce07d2f858 ax:0 si:558694845062 di:ffffffffff600000 [913507.662758] exe[411553] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593c638b839 cs:33 sp:7f506ad35858 ax:0 si:5593c63e4062 di:ffffffffff600000 [914175.965386] exe[417016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5583dbb7d839 cs:33 sp:7f31ead68858 ax:0 si:5583dbbd6070 di:ffffffffff600000 [915462.440763] exe[394607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55870a398839 cs:33 sp:7f042ef0e858 ax:0 si:55870a3f1097 di:ffffffffff600000 [915462.518596] exe[366457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55870a398839 cs:33 sp:7f042ef0e858 ax:0 si:55870a3f1097 di:ffffffffff600000 [915462.553872] exe[350148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55870a398839 cs:33 sp:7f042ef0e858 ax:0 si:55870a3f1097 di:ffffffffff600000 [915462.690392] exe[434834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55870a398839 cs:33 sp:7f042ef0e858 ax:0 si:55870a3f1097 di:ffffffffff600000 [915463.131969] exe[346104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915463.203604] exe[350046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915463.300219] exe[346806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915463.395788] exe[434769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915463.488002] exe[346110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915463.573754] exe[434805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915467.451343] warn_bad_vsyscall: 85 callbacks suppressed [915467.451346] exe[369287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915467.484035] exe[369287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915467.510196] exe[369287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915467.537867] exe[369287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915467.566009] exe[369287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915467.593738] exe[369287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915467.622121] exe[369287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915467.654440] exe[369287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915467.682384] exe[369287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915467.716700] exe[369287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915472.542448] warn_bad_vsyscall: 100 callbacks suppressed [915472.542453] exe[380398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c070 di:ffffffffff600000 [915472.543901] exe[370263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1ffe858 ax:0 si:55b310d4c070 di:ffffffffff600000 [915472.697036] exe[354145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1ffe858 ax:0 si:55b310d4c070 di:ffffffffff600000 [915472.830181] exe[434819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915472.926087] exe[346224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1ffe858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915473.021768] exe[434768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915473.054207] exe[434814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1fdd858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915473.155568] exe[346132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915473.254282] exe[346224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1ffe858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915473.390454] exe[369287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915477.599715] warn_bad_vsyscall: 144 callbacks suppressed [915477.599719] exe[434815] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915477.644980] exe[442196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915477.756745] exe[380378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915477.849717] exe[370263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1ffe858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915477.942133] exe[346097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915477.981263] exe[346181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1ffe858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915478.098906] exe[346104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915478.208012] exe[434805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1ffe858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915478.327191] exe[353395] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915478.490409] exe[434815] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915482.645052] warn_bad_vsyscall: 56 callbacks suppressed [915482.645055] exe[370263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1ffe858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915482.733802] exe[346083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915482.821872] exe[346130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915482.906810] exe[366455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915483.000426] exe[434758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915483.032079] exe[434769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915483.130899] exe[350931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915483.237259] exe[346130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915483.338654] exe[346045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915483.404408] exe[380404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915487.691082] warn_bad_vsyscall: 60 callbacks suppressed [915487.691085] exe[366447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1ffe858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915487.964349] exe[346209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915488.748954] exe[434763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1fdd858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915488.832006] exe[353420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915489.622325] exe[346130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915489.715098] exe[350049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915490.485572] exe[434814] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915490.522181] exe[440465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915490.598629] exe[380385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915490.673665] exe[370263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915492.867699] warn_bad_vsyscall: 56 callbacks suppressed [915492.867703] exe[350046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915492.964891] exe[350046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1ffe858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915493.060344] exe[434900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915493.138936] exe[380407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915493.228814] exe[346102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915493.308293] exe[346110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d1ffe858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915493.386618] exe[435292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915493.491042] exe[350049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915493.610488] exe[380378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c062 di:ffffffffff600000 [915493.707251] exe[434769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b310cf3839 cs:33 sp:7fd5d2429858 ax:0 si:55b310d4c097 di:ffffffffff600000 [915590.392376] potentially unexpected fatal signal 5. [915590.397419] CPU: 68 PID: 446268 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [915590.407842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [915590.417288] RIP: 0033:0x7fffffffe062 [915590.421077] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [915590.440207] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [915590.447036] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [915590.455784] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [915590.464524] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [915590.464561] potentially unexpected fatal signal 5. [915590.473296] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [915590.473300] R13: 000000000000001c R14: 000000c000508820 R15: 00000000000515c2 [915590.479676] CPU: 14 PID: 451540 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [915590.479678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [915590.479682] RIP: 0033:0x7fffffffe062 [915590.479684] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [915590.479685] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [915590.479687] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [915590.479687] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [915590.479688] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [915590.479689] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [915590.479689] R13: 000000000000001c R14: 000000c000508820 R15: 00000000000515c2 [915590.479690] FS: 000000c000130890 GS: 0000000000000000 [915590.531384] potentially unexpected fatal signal 5. [915590.539712] FS: 000000c000130890 GS: 0000000000000000 [915590.603508] CPU: 95 PID: 358986 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [915590.615398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [915590.626252] RIP: 0033:0x7fffffffe062 [915590.631406] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [915590.650407] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [915590.657236] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [915590.665989] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [915590.673356] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [915590.682088] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [915590.689447] R13: 000000000000001c R14: 000000c0008001a0 R15: 00000000000515c3 [915590.696799] FS: 000000c000131490 GS: 0000000000000000 [915600.920823] potentially unexpected fatal signal 5. [915600.925869] CPU: 52 PID: 452425 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [915600.936275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [915600.945727] RIP: 0033:0x7fffffffe062 [915600.949572] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [915600.968574] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [915600.974052] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [915600.981406] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [915600.988830] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [915600.996183] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [915601.004936] R13: 0000000000000038 R14: 000000c000517380 R15: 0000000000052bba [915601.013683] FS: 000000c000600090 GS: 0000000000000000 [915601.063476] potentially unexpected fatal signal 5. [915601.068510] CPU: 64 PID: 389228 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [915601.078910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [915601.088455] RIP: 0033:0x7fffffffe062 [915601.092251] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [915601.111416] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [915601.116864] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [915601.124213] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [915601.131584] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [915601.138947] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [915601.146323] R13: 0000000000000038 R14: 000000c000517380 R15: 0000000000052bba [915601.153729] FS: 000000c000600090 GS: 0000000000000000 [915602.772784] potentially unexpected fatal signal 5. [915602.777820] CPU: 64 PID: 452762 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [915602.788256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [915602.797708] RIP: 0033:0x7fffffffe062 [915602.801493] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [915602.820579] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [915602.826057] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [915602.833437] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [915602.842175] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [915602.849538] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [915602.856883] R13: 0000000000000034 R14: 000000c0004976c0 R15: 000000000005302a [915602.865725] FS: 000000c000130890 GS: 0000000000000000 [915604.856964] potentially unexpected fatal signal 5. [915604.862013] CPU: 13 PID: 341902 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [915604.872436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [915604.881921] RIP: 0033:0x7fffffffe062 [915604.885725] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [915604.904761] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [915604.910230] RAX: 000000000006e9c7 RBX: 0000000000000000 RCX: 00007fffffffe05a [915604.917610] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [915604.925000] RBP: 000000c00018fe38 R08: 000000c0001e8b50 R09: 0000000000000000 [915604.932401] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [915604.940012] R13: 000000000000003c R14: 000000c0001b3040 R15: 0000000000053559 [915604.947491] FS: 000000c000130890 GS: 0000000000000000 [915604.979320] potentially unexpected fatal signal 5. [915604.984528] CPU: 92 PID: 453071 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [915604.994951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [915605.005786] RIP: 0033:0x7fffffffe062 [915605.009597] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [915605.028599] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [915605.035429] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [915605.044248] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [915605.052986] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [915605.061709] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [915605.069083] R13: 0000000000000036 R14: 000000c0006031e0 R15: 0000000000053555 [915605.076465] FS: 000000c000130490 GS: 0000000000000000 [915778.740729] warn_bad_vsyscall: 2 callbacks suppressed [915778.740732] exe[388063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596eb06c839 cs:33 sp:7facbc108858 ax:0 si:5596eb0c5062 di:ffffffffff600000 [915798.397701] exe[428174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563872960839 cs:33 sp:7f517b642858 ax:0 si:5638729b9062 di:ffffffffff600000 [915921.291662] exe[495856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578391f4839 cs:33 sp:7fe5f809d858 ax:0 si:55783924d062 di:ffffffffff600000 [915940.397160] exe[499474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557559eda839 cs:33 sp:7f397cf5a858 ax:0 si:557559f33062 di:ffffffffff600000 [915984.985521] exe[415429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f280374839 cs:33 sp:7fc187881858 ax:0 si:55f2803cd062 di:ffffffffff600000 [915992.205468] exe[400453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556660a85839 cs:33 sp:7ebb40afb858 ax:0 si:556660ade062 di:ffffffffff600000 [916003.288207] exe[499778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c1974db839 cs:33 sp:7fab2cfd6858 ax:0 si:55c197534062 di:ffffffffff600000 [916042.386802] exe[488848] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b926de6839 cs:33 sp:7f5731730858 ax:0 si:55b926e3f062 di:ffffffffff600000 [916099.781056] exe[501551] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a78e38d839 cs:33 sp:7eeb74858858 ax:0 si:55a78e3e6062 di:ffffffffff600000 [916111.202575] exe[471424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607846f4839 cs:33 sp:7ffbdbea1858 ax:0 si:56078474d062 di:ffffffffff600000 [916160.719760] exe[460065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3498c839 cs:33 sp:7eba169ed858 ax:0 si:55be349e5062 di:ffffffffff600000 [916301.764042] exe[491040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be5811a839 cs:33 sp:7ed5141d7858 ax:0 si:55be58173062 di:ffffffffff600000 [916333.367199] exe[467101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561848411839 cs:33 sp:7f2776be1858 ax:0 si:56184846a062 di:ffffffffff600000 [916333.473094] exe[473778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f9f31b839 cs:33 sp:7f57cdd30858 ax:0 si:557f9f374062 di:ffffffffff600000 [916334.541877] exe[485387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f20ffe0839 cs:33 sp:7f0a6dffa858 ax:0 si:55f210039062 di:ffffffffff600000 [917652.142237] exe[331820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561aa4ed0839 cs:33 sp:7eee76650ee8 ax:0 si:20000000 di:ffffffffff600000 [917652.555916] exe[588196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561aa4ed0839 cs:33 sp:7eee76650ee8 ax:0 si:20000000 di:ffffffffff600000 [917652.825710] exe[331820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561aa4ed0839 cs:33 sp:7eee76650ee8 ax:0 si:20000000 di:ffffffffff600000 [918098.273392] potentially unexpected fatal signal 5. [918098.278437] CPU: 45 PID: 607205 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [918098.288841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [918098.298279] RIP: 0033:0x7fffffffe062 [918098.302089] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [918098.321215] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [918098.325081] potentially unexpected fatal signal 5. [918098.328073] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [918098.328074] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [918098.328075] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [918098.328075] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [918098.328076] R13: 000000000000001c R14: 000000c000581d40 R15: 000000000006ed08 [918098.328077] FS: 000000c000131490 GS: 0000000000000000 [918098.378453] CPU: 53 PID: 602706 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [918098.388886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [918098.398333] RIP: 0033:0x7fffffffe062 [918098.403535] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [918098.423996] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [918098.430835] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [918098.439584] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [918098.448310] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [918098.457041] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [918098.464402] R13: 000000000000001c R14: 000000c000581d40 R15: 000000000006ed08 [918098.471881] FS: 000000c000131490 GS: 0000000000000000 [918124.437098] potentially unexpected fatal signal 5. [918124.442131] CPU: 59 PID: 608448 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [918124.454005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [918124.463438] RIP: 0033:0x7fffffffe062 [918124.467248] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [918124.486358] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [918124.491797] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [918124.499155] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [918124.506525] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [918124.515350] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018de20 [918124.524152] R13: 000000000000001c R14: 000000c000482680 R15: 00000000000946e4 [918124.532901] FS: 000000000229acd0 GS: 0000000000000000 [918124.569832] potentially unexpected fatal signal 5. [918124.575301] CPU: 67 PID: 609049 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [918124.585734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [918124.596566] RIP: 0033:0x7fffffffe062 [918124.600393] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [918124.619487] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [918124.626570] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [918124.635327] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [918124.644072] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [918124.652822] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [918124.661555] R13: 000000000000001c R14: 000000c0001824e0 R15: 00000000000946f2 [918124.670320] FS: 000000000229acd0 GS: 0000000000000000 [918321.591603] potentially unexpected fatal signal 5. [918321.596662] CPU: 24 PID: 613386 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [918321.607066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [918321.616492] RIP: 0033:0x7fffffffe062 [918321.620280] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [918321.640768] RSP: 002b:000000c000677cb0 EFLAGS: 00000297 [918321.646230] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [918321.653582] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [918321.660939] RBP: 000000c000677d40 R08: 0000000000000000 R09: 0000000000000000 [918321.668300] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000677bd8 [918321.675673] R13: 000000c000138800 R14: 000000c00044d520 R15: 000000000009559b [918321.683046] FS: 00007fe90fa896c0 GS: 0000000000000000 [918321.700332] potentially unexpected fatal signal 5. [918321.705424] CPU: 24 PID: 613380 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [918321.715908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [918321.725375] RIP: 0033:0x7fffffffe062 [918321.730554] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [918321.750947] RSP: 002b:000000c000677cb0 EFLAGS: 00000297 [918321.756406] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [918321.763767] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [918321.771141] RBP: 000000c000677d40 R08: 0000000000000000 R09: 0000000000000000 [918321.778508] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000677bd8 [918321.785884] R13: 000000c000138800 R14: 000000c00044d520 R15: 000000000009559b [918321.793235] FS: 00007fe90fa896c0 GS: 0000000000000000 [918353.458740] potentially unexpected fatal signal 5. [918353.463777] CPU: 40 PID: 619482 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [918353.474190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [918353.483644] RIP: 0033:0x7fffffffe062 [918353.487472] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [918353.506485] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [918353.513358] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [918353.522089] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [918353.530841] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [918353.539709] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [918353.547090] R13: 0000000000000036 R14: 000000c000513520 R15: 000000000006eeea [918353.555883] FS: 000000c000130490 GS: 0000000000000000 [918918.575984] potentially unexpected fatal signal 5. [918918.581152] CPU: 61 PID: 641783 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [918918.591586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [918918.601054] RIP: 0033:0x7fffffffe062 [918918.604883] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [918918.625299] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [918918.632729] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [918918.641490] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000562267200000 [918918.650327] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [918918.659107] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [918918.667938] R13: 0000000000000004 R14: 000000c00016ab60 R15: 0000000000098755 [918918.676710] FS: 000000c000130890 GS: 0000000000000000 [919033.217085] exe[684421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654d160240a cs:33 sp:7f4652dd1ee8 ax:12 si:ffffffffff600000 di:5654d166eff2 [919033.322521] exe[686692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654d160240a cs:33 sp:7f4652dd1ee8 ax:12 si:ffffffffff600000 di:5654d166eff2 [919033.398313] exe[685286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5654d160240a cs:33 sp:7f4652dd1ee8 ax:12 si:ffffffffff600000 di:5654d166eff2 [919427.074387] exe[708216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a42aa41839 cs:33 sp:7ef27eeabee8 ax:0 si:20000040 di:ffffffffff600000 [919427.466536] exe[708787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a42aa41839 cs:33 sp:7ef27eeabee8 ax:0 si:20000040 di:ffffffffff600000 [919427.591674] exe[709169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a42aa41839 cs:33 sp:7ef27eeabee8 ax:0 si:20000040 di:ffffffffff600000 [922234.011310] potentially unexpected fatal signal 5. [922234.016358] CPU: 30 PID: 799194 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922234.026869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922234.036325] RIP: 0033:0x7fffffffe062 [922234.040179] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922234.059195] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [922234.066011] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922234.073361] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922234.080802] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [922234.088140] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [922234.095485] R13: 000000000000001c R14: 000000c0005024e0 R15: 000000000009ae28 [922234.102843] FS: 000000c000580090 GS: 0000000000000000 [922234.140001] potentially unexpected fatal signal 5. [922234.145692] CPU: 42 PID: 651005 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922234.157473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922234.168285] RIP: 0033:0x7fffffffe062 [922234.173464] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922234.193937] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [922234.200723] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922234.209457] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922234.218180] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [922234.226918] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [922234.235760] R13: 000000000000001c R14: 000000c0005024e0 R15: 000000000009ae28 [922234.244472] FS: 000000c000580090 GS: 0000000000000000 [922237.907659] potentially unexpected fatal signal 5. [922237.912685] CPU: 2 PID: 757015 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922237.923122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922237.932545] RIP: 0033:0x7fffffffe062 [922237.936356] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922237.954685] potentially unexpected fatal signal 5. [922237.955348] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [922237.960465] CPU: 50 PID: 642157 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922237.965903] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922237.965904] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922237.965905] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [922237.965906] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [922237.965907] R13: 000000000000001c R14: 000000c0004c7520 R15: 000000000009b0eb [922237.965907] FS: 000000000229acd0 GS: 0000000000000000 [922238.019965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922238.029411] RIP: 0033:0x7fffffffe062 [922238.033215] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922238.052425] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [922238.059266] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922238.068011] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922238.075364] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [922238.082727] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018de20 [922238.090091] R13: 000000000000001c R14: 000000c0004c7520 R15: 000000000009b0eb [922238.097442] FS: 000000000229acd0 GS: 0000000000000000 [922238.342091] potentially unexpected fatal signal 5. [922238.347136] CPU: 49 PID: 646533 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922238.357648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922238.368440] RIP: 0033:0x7fffffffe062 [922238.372227] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922238.392649] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [922238.399536] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922238.402108] potentially unexpected fatal signal 5. [922238.408287] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922238.413333] CPU: 13 PID: 642451 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922238.420675] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [922238.420676] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018de20 [922238.420676] R13: 000000000000001c R14: 000000c0004c7520 R15: 000000000009b0eb [922238.420677] FS: 000000000229acd0 GS: 0000000000000000 [922238.459928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922238.469376] RIP: 0033:0x7fffffffe062 [922238.473171] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922238.492193] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [922238.497654] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922238.505027] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922238.512376] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [922238.519826] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [922238.527209] R13: 000000000000001c R14: 000000c0004c7520 R15: 000000000009b0eb [922238.534648] FS: 000000000229acd0 GS: 0000000000000000 [922238.637965] potentially unexpected fatal signal 5. [922238.643032] CPU: 13 PID: 799321 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922238.653422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922238.662859] RIP: 0033:0x7fffffffe062 [922238.666653] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922238.685782] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [922238.692590] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922238.701309] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922238.708666] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [922238.716034] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [922238.723459] R13: 000000000000001c R14: 000000c000171380 R15: 000000000009b0ea [922238.730798] FS: 000000c000130490 GS: 0000000000000000 [922264.364283] exe[719914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601bebd6839 cs:33 sp:7efd3d568858 ax:0 si:5601bec2f062 di:ffffffffff600000 [922266.634537] exe[793836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601bebd6839 cs:33 sp:7efd3d568858 ax:0 si:5601bec2f062 di:ffffffffff600000 [922266.780379] exe[733683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5601bebd6839 cs:33 sp:7efd3d547858 ax:0 si:5601bec2f062 di:ffffffffff600000 [922330.576320] potentially unexpected fatal signal 5. [922330.581346] CPU: 24 PID: 805958 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922330.591753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922330.601214] RIP: 0033:0x7fffffffe062 [922330.605032] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922330.624054] RSP: 002b:000000c00025dcb0 EFLAGS: 00000297 [922330.630875] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922330.638244] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922330.645605] RBP: 000000c00025dd40 R08: 0000000000000000 R09: 0000000000000000 [922330.653005] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00025dbd8 [922330.660362] R13: 000000c000700000 R14: 000000c000239860 R15: 000000000009d2df [922330.667724] FS: 00007f30ee5fd6c0 GS: 0000000000000000 [922330.832614] potentially unexpected fatal signal 5. [922330.837671] CPU: 80 PID: 687688 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922330.848103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922330.857536] RIP: 0033:0x7fffffffe062 [922330.861359] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922330.880401] RSP: 002b:000000c00025dcb0 EFLAGS: 00000297 [922330.885862] RAX: 00000000000c4c5d RBX: 0000000000000000 RCX: 00007fffffffe05a [922330.894603] RDX: 0000000000000000 RSI: 000000c00025e000 RDI: 0000000000012f00 [922330.903720] RBP: 000000c00025dd40 R08: 000000c2552e3960 R09: 0000000000000000 [922330.912454] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00025dbd8 [922330.921187] R13: 000000c000700000 R14: 000000c000239860 R15: 000000000009d2df [922330.928542] FS: 00007f30ee5fd6c0 GS: 0000000000000000 [922331.121677] potentially unexpected fatal signal 5. [922331.126817] CPU: 74 PID: 805966 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922331.137246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922331.146805] RIP: 0033:0x7fffffffe062 [922331.150601] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922331.169624] RSP: 002b:000000c00025dcb0 EFLAGS: 00000297 [922331.176598] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922331.184042] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922331.192773] RBP: 000000c00025dd40 R08: 0000000000000000 R09: 0000000000000000 [922331.201519] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00025dbd8 [922331.210259] R13: 000000c000700000 R14: 000000c000239860 R15: 000000000009d2df [922331.219108] FS: 00007f30ee5fd6c0 GS: 0000000000000000 [922469.091054] potentially unexpected fatal signal 5. [922469.096092] CPU: 39 PID: 709958 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922469.106548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922469.116032] RIP: 0033:0x7fffffffe062 [922469.119830] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922469.138871] RSP: 002b:000000c000527d98 EFLAGS: 00000297 [922469.144316] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922469.151683] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922469.159026] RBP: 000000c000527e38 R08: 0000000000000000 R09: 0000000000000000 [922469.167791] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000527e20 [922469.175167] R13: 0000000000000036 R14: 000000c000157d40 R15: 00000000000a0d1b [922469.182532] FS: 0000000001fc7e50 GS: 0000000000000000 [922500.902307] potentially unexpected fatal signal 5. [922500.907353] CPU: 58 PID: 663576 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922500.917765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922500.927239] RIP: 0033:0x7fffffffe062 [922500.931032] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922500.950285] RSP: 002b:000000c00058fd98 EFLAGS: 00000297 [922500.955764] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922500.963138] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922500.970497] RBP: 000000c00058fe38 R08: 0000000000000000 R09: 0000000000000000 [922500.977864] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00058fe20 [922500.985234] R13: 0000000000000034 R14: 000000c0001acea0 R15: 00000000000a1c17 [922500.992616] FS: 000000c000580090 GS: 0000000000000000 [922625.656941] potentially unexpected fatal signal 5. [922625.662329] CPU: 73 PID: 830397 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922625.672754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922625.682252] RIP: 0033:0x7fffffffe062 [922625.686085] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922625.694849] potentially unexpected fatal signal 5. [922625.705198] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [922625.710219] CPU: 59 PID: 830395 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [922625.710221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [922625.710225] RIP: 0033:0x7fffffffe062 [922625.710227] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [922625.710228] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [922625.710231] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922625.717050] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [922625.717050] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922625.717051] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [922625.717052] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [922625.717052] R13: 000000000000001c R14: 000000c00045a9c0 R15: 00000000000a78ad [922625.717053] FS: 000000c000180090 GS: 0000000000000000 [922625.826366] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [922625.833758] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [922625.842507] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [922625.851291] R13: 000000000000001c R14: 000000c00045a9c0 R15: 00000000000a78ad [922625.860044] FS: 000000c000180090 GS: 0000000000000000 [922707.406901] exe[810798] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ed6cdb40a cs:33 sp:7f92fb2eeee8 ax:12 si:ffffffffff600000 di:563ed6d47ff2 [922707.785694] exe[805112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ed6cdb40a cs:33 sp:7f92fb2eeee8 ax:12 si:ffffffffff600000 di:563ed6d47ff2 [922709.933373] exe[822621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ed6cdb40a cs:33 sp:7f92fb2eeee8 ax:12 si:ffffffffff600000 di:563ed6d47ff2 [924242.857442] exe[829325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5b02e440a cs:33 sp:7f51a3955ee8 ax:12 si:ffffffffff600000 di:55b5b0350ff2 [924242.957518] exe[900633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5b02e440a cs:33 sp:7f51a3955ee8 ax:12 si:ffffffffff600000 di:55b5b0350ff2 [924243.733532] exe[819336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b5b02e440a cs:33 sp:7f51a3955ee8 ax:12 si:ffffffffff600000 di:55b5b0350ff2 [925845.104645] potentially unexpected fatal signal 5. [925845.109694] CPU: 21 PID: 919427 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [925845.120384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [925845.129843] RIP: 0033:0x7fffffffe062 [925845.133635] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [925845.152632] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [925845.158106] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [925845.165484] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [925845.172825] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [925845.181583] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [925845.190345] R13: 000000000000001c R14: 000000c000502820 R15: 00000000000c33e6 [925845.197725] FS: 000000000229acd0 GS: 0000000000000000 [925849.504590] potentially unexpected fatal signal 5. [925849.509628] CPU: 17 PID: 919569 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [925849.520027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [925849.529600] RIP: 0033:0x7fffffffe062 [925849.533392] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [925849.552457] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [925849.558085] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [925849.565423] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [925849.572894] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [925849.580287] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [925849.587653] R13: 000000000000001c R14: 000000c0004f0b60 R15: 00000000000c35b5 [925849.595019] FS: 000000c0002d2c90 GS: 0000000000000000 [926050.902528] exe[911289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dc3ac6839 cs:33 sp:7fb3985c0ee8 ax:0 si:20003580 di:ffffffffff600000 [926051.608935] exe[857287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dc3ac6839 cs:33 sp:7fb39859fee8 ax:0 si:20003580 di:ffffffffff600000 [926051.832504] exe[910213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556dc3ac6839 cs:33 sp:7fb39859fee8 ax:0 si:20003580 di:ffffffffff600000 [926079.622170] potentially unexpected fatal signal 5. [926079.627212] CPU: 6 PID: 813897 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [926079.637527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [926079.646976] RIP: 0033:0x7fffffffe062 [926079.650782] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [926079.669814] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [926079.675277] RAX: 00000000000e3540 RBX: 0000000000000000 RCX: 00007fffffffe05a [926079.684492] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [926079.693254] RBP: 000000c000193e38 R08: 000000c0006522e0 R09: 0000000000000000 [926079.701983] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [926079.710750] R13: 0000000000000034 R14: 000000c0004929c0 R15: 00000000000c6af9 [926079.719534] FS: 000000c000130890 GS: 0000000000000000 [926110.776095] potentially unexpected fatal signal 5. [926110.781128] CPU: 34 PID: 819451 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [926110.791551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [926110.801090] RIP: 0033:0x7fffffffe062 [926110.804902] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [926110.824006] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [926110.829475] RAX: 00000000000e4154 RBX: 0000000000000000 RCX: 00007fffffffe05a [926110.838219] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [926110.846962] RBP: 000000c00018fe38 R08: 000000c0005fe6a0 R09: 0000000000000000 [926110.854327] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [926110.861784] R13: 000000000000003e R14: 000000c0001789c0 R15: 00000000000c7889 [926110.870640] FS: 000000c0004c4090 GS: 0000000000000000 [926166.826466] potentially unexpected fatal signal 5. [926166.831511] CPU: 45 PID: 938770 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [926166.842079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [926166.851509] RIP: 0033:0x7fffffffe062 [926166.855312] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [926166.874481] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [926166.879921] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [926166.881045] potentially unexpected fatal signal 5. [926166.887264] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [926166.887265] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [926166.887265] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [926166.887266] R13: 0000000000000036 R14: 000000c0001b1040 R15: 00000000000c9069 [926166.887267] FS: 000000c000130c90 GS: 0000000000000000 [926166.927180] CPU: 34 PID: 878058 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [926166.937589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [926166.947114] RIP: 0033:0x7fffffffe062 [926166.952329] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [926166.955427] potentially unexpected fatal signal 5. [926166.972732] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [926166.979117] CPU: 81 PID: 860569 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [926166.979118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [926166.979122] RIP: 0033:0x7fffffffe062 [926166.979125] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [926166.979126] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [926166.979128] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [926166.979129] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [926166.979130] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [926166.979130] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [926166.979131] R13: 0000000000000036 R14: 000000c0001b1040 R15: 00000000000c9069 [926166.979132] FS: 000000c000130c90 GS: 0000000000000000 [926167.082870] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [926167.091617] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [926167.100364] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [926167.109898] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [926167.118730] R13: 0000000000000036 R14: 000000c0001b1040 R15: 00000000000c9069 [926167.127686] FS: 000000c000130c90 GS: 0000000000000000 [926850.070541] exe[965080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d38443c839 cs:33 sp:7f8456e28858 ax:0 si:55d384495097 di:ffffffffff600000 [926850.169074] exe[965080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d38443c839 cs:33 sp:7f8456e28858 ax:0 si:55d384495097 di:ffffffffff600000 [926850.246798] exe[948190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d38443c839 cs:33 sp:7f8456e28858 ax:0 si:55d384495097 di:ffffffffff600000 [926852.213077] exe[937745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a37963340a cs:33 sp:7f1cdd054ee8 ax:12 si:ffffffffff600000 di:55a37969fff2 [926852.295696] exe[938190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a37963340a cs:33 sp:7f1cdd054ee8 ax:12 si:ffffffffff600000 di:55a37969fff2 [926852.373869] exe[927310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a37963340a cs:33 sp:7f1cdd054ee8 ax:12 si:ffffffffff600000 di:55a37969fff2 [926858.429673] exe[927221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe937b740a cs:33 sp:7f87aae74ee8 ax:12 si:ffffffffff600000 di:55fe93823ff2 [926858.509497] exe[937758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe937b740a cs:33 sp:7f87aae74ee8 ax:12 si:ffffffffff600000 di:55fe93823ff2 [926858.594845] exe[927903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe937b740a cs:33 sp:7f87aae74ee8 ax:12 si:ffffffffff600000 di:55fe93823ff2 [926858.676243] exe[968145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe937b740a cs:33 sp:7f87aae74ee8 ax:12 si:ffffffffff600000 di:55fe93823ff2 [926858.792515] exe[926934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe937b740a cs:33 sp:7f87aae74ee8 ax:12 si:ffffffffff600000 di:55fe93823ff2 [926858.873219] exe[963383] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe937b740a cs:33 sp:7f87aae74ee8 ax:12 si:ffffffffff600000 di:55fe93823ff2 [926858.992806] exe[926948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe937b740a cs:33 sp:7f87aae74ee8 ax:12 si:ffffffffff600000 di:55fe93823ff2 [926859.111837] exe[963382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe937b740a cs:33 sp:7f87aae74ee8 ax:12 si:ffffffffff600000 di:55fe93823ff2 [926859.188221] exe[968620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe937b740a cs:33 sp:7f87aae74ee8 ax:12 si:ffffffffff600000 di:55fe93823ff2 [926859.264988] exe[938190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe937b740a cs:33 sp:7f87aae74ee8 ax:12 si:ffffffffff600000 di:55fe93823ff2 [928997.328944] potentially unexpected fatal signal 5. [928997.333985] CPU: 31 PID: 14327 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [928997.344315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [928997.346482] potentially unexpected fatal signal 5. [928997.353758] RIP: 0033:0x7fffffffe062 [928997.358793] CPU: 51 PID: 13870 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [928997.362591] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [928997.362592] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [928997.362594] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [928997.362595] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [928997.362597] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [928997.372904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [928997.372909] RIP: 0033:0x7fffffffe062 [928997.372913] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [928997.372914] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [928997.372917] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [928997.372919] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [928997.372922] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [928997.372925] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [928997.372930] R13: 0000000000000040 R14: 000000c00051b6c0 R15: 0000000000003507 [928997.391933] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [928997.391934] R13: 0000000000000040 R14: 000000c00051b6c0 R15: 0000000000003507 [928997.391935] FS: 0000000001fc7e50 GS: 0000000000000000 [928997.523227] FS: 0000000001fc7e50 GS: 0000000000000000 [929151.654870] potentially unexpected fatal signal 5. [929151.659920] CPU: 35 PID: 17442 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [929151.670275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [929151.679707] RIP: 0033:0x7fffffffe062 [929151.683592] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [929151.702627] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [929151.708066] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [929151.715519] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000562b25c00000 [929151.722880] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [929151.730247] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [929151.738126] R13: 000000000000003c R14: 000000c00058e4e0 R15: 0000000000003f76 [929151.746965] FS: 000000c000600090 GS: 0000000000000000 [929200.518243] warn_bad_vsyscall: 6 callbacks suppressed [929200.518247] exe[11082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c299df839 cs:33 sp:7ee50a7c4858 ax:0 si:557c29a38062 di:ffffffffff600000 [929201.373096] exe[11084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c299df839 cs:33 sp:7ee50a782858 ax:0 si:557c29a38062 di:ffffffffff600000 [929202.236618] exe[11082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c299df839 cs:33 sp:7ee50a7c4858 ax:0 si:557c29a38062 di:ffffffffff600000 [929239.824994] potentially unexpected fatal signal 5. [929239.830038] CPU: 0 PID: 18541 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [929239.840289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [929239.849831] RIP: 0033:0x7fffffffe062 [929239.853694] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [929239.874127] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [929239.880945] RAX: 0000000000004ac7 RBX: 0000000000000000 RCX: 00007fffffffe05a [929239.889768] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [929239.898513] RBP: 000000c00018fe38 R08: 000000c000442970 R09: 0000000000000000 [929239.907267] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [929239.915991] R13: 0000000000000002 R14: 000000c000494820 R15: 00000000000044e6 [929239.924736] FS: 000000c000130890 GS: 0000000000000000 [929419.112687] potentially unexpected fatal signal 11. [929419.117964] CPU: 60 PID: 22939 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [929419.128303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [929419.137796] RIP: 0033:0x55bc3d745de6 [929419.141640] Code: 8d 3c 30 4c 89 de 4c 89 54 24 38 e8 14 ae 02 00 4c 8b 54 24 38 85 c0 0f 85 57 01 00 00 48 8b 44 24 28 48 89 df 4c 89 54 24 38 <4c> 89 93 98 06 00 00 48 89 83 90 06 00 00 48 8d 83 10 03 00 00 4c [929419.162049] RSP: 002b:00007fdfb02691d0 EFLAGS: 00010246 [929419.168921] RAX: 00007f5a10bdf000 RBX: 00007f5a10bff6c0 RCX: 000055bc3d770be7 [929419.177654] RDX: 0000000000000003 RSI: 0000000000020000 RDI: 00007f5a10bff6c0 [929419.186431] RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000 [929419.195186] R10: 0000000000021000 R11: 0000000000000206 R12: 00007fdfb0269470 [929419.204029] R13: ffffffffffffffc0 R14: 0000000000001000 R15: 0000000000000000 [929419.212775] FS: 000055bc3e3c0480 GS: 0000000000000000 [929457.116713] potentially unexpected fatal signal 5. [929457.121752] CPU: 6 PID: 23931 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [929457.132074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [929457.141573] RIP: 0033:0x7fffffffe062 [929457.146851] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [929457.167259] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [929457.174031] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [929457.181388] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [929457.190132] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [929457.199033] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [929457.207854] R13: 000000000000001c R14: 000000c00052ab60 R15: 00000000000e0ab5 [929457.216587] FS: 000000c000130890 GS: 0000000000000000 [929558.670792] potentially unexpected fatal signal 11. [929558.675944] CPU: 66 PID: 28886 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [929558.686308] potentially unexpected fatal signal 11. [929558.686368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [929558.687651] potentially unexpected fatal signal 11. [929558.687656] CPU: 78 PID: 28901 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [929558.687657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [929558.687661] RIP: 0033:0x55e9364577db [929558.687663] Code: e9 ff ff 48 89 c1 48 85 c0 75 c9 e9 6d f8 ff ff 48 8d 3d 20 53 09 00 e8 43 c7 ff ff 48 8d 15 8c 2e 12 00 48 8d 34 19 48 39 d5 <48> 89 75 60 0f 95 c2 48 29 d8 48 83 c1 10 0f b6 d2 48 83 c8 01 48 [929558.687664] RSP: 002b:00007f74a735a2f0 EFLAGS: 00010246 [929558.687665] RAX: 0000000000020830 RBX: 0000000000008040 RCX: 000055e9370cc7d0 [929558.687666] RDX: 000055e93657a660 RSI: 000055e9370d4810 RDI: 0000000000000004 [929558.687667] RBP: 000055e93657a660 R08: 000000002ebb012e R09: 00000000000000a8 [929558.687667] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [929558.687668] R13: 0000000000000076 R14: 000055e93657a6c0 R15: 0000000000000000 [929558.687669] FS: 000055e9370cb480 GS: 0000000000000000 [929558.691423] CPU: 54 PID: 29279 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [929558.700837] RIP: 0033:0x55f6063e37fb [929558.700839] Code: 2e 12 00 48 8d 34 19 48 39 d5 48 89 75 60 0f 95 c2 48 29 d8 48 83 c1 10 0f b6 d2 48 83 c8 01 48 c1 e2 02 48 09 da 48 83 ca 01 <48> 89 51 f8 48 89 46 08 eb 80 48 8d 0d 31 45 09 00 48 8d 15 35 57 [929558.700841] RSP: 002b:00007ff3aa9602f0 EFLAGS: 00010206 [929558.700842] RAX: 00000000000187f1 RBX: 0000000000008040 RCX: 000055f6070587e0 [929558.700843] RDX: 0000000000008041 RSI: 000055f607060810 RDI: 0000000000000004 [929558.700843] RBP: 000055f606506660 R08: 000000002de1128e R09: 00000000000000a8 [929558.700844] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [929558.700845] R13: 0000000000000076 R14: 000055f6065066c0 R15: 0000000000000000 [929558.700845] FS: 000055f607057480 GS: 0000000000000000 [929558.888814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [929558.899682] RIP: 0033:0x55aecf80f7fb [929558.904910] Code: 2e 12 00 48 8d 34 19 48 39 d5 48 89 75 60 0f 95 c2 48 29 d8 48 83 c1 10 0f b6 d2 48 83 c8 01 48 c1 e2 02 48 09 da 48 83 ca 01 <48> 89 51 f8 48 89 46 08 eb 80 48 8d 0d 31 45 09 00 48 8d 15 35 57 [929558.926188] RSP: 002b:00007f434f67f2f0 EFLAGS: 00010206 [929558.933055] RAX: 00000000000187f1 RBX: 0000000000008040 RCX: 000055aed04847e0 [929558.941828] RDX: 0000000000008041 RSI: 000055aed048c810 RDI: 0000000000000004 [929558.950618] RBP: 000055aecf932660 R08: 000000002ddedc94 R09: 00000000000000a8 [929558.959371] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [929558.968266] R13: 0000000000000076 R14: 000055aecf9326c0 R15: 0000000000000000 [929558.977026] FS: 000055aed0483480 GS: 0000000000000000 [929750.773249] potentially unexpected fatal signal 5. [929750.778316] CPU: 67 PID: 42024 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [929750.788671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [929750.798126] RIP: 0033:0x7fffffffe062 [929750.801954] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [929750.821032] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [929750.827881] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [929750.836646] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [929750.845424] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [929750.854195] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [929750.862962] R13: 0000000000000034 R14: 000000c000465040 R15: 0000000000009d86 [929750.871740] FS: 000000c000130490 GS: 0000000000000000 [929777.085170] potentially unexpected fatal signal 5. [929777.090304] CPU: 52 PID: 959155 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [929777.100783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [929777.110233] RIP: 0033:0x7fffffffe062 [929777.114031] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [929777.133028] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [929777.138469] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [929777.145826] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [929777.153236] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [929777.162043] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [929777.169393] R13: 000000000000003c R14: 000000c0001ab1e0 R15: 00000000000e55b9 [929777.178130] FS: 000000c000130490 GS: 0000000000000000 [929777.230901] potentially unexpected fatal signal 5. [929777.236972] CPU: 52 PID: 939701 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [929777.247364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [929777.256795] RIP: 0033:0x7fffffffe062 [929777.260593] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [929777.280986] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [929777.286432] RAX: 000000000000ade3 RBX: 0000000000000000 RCX: 00007fffffffe05a [929777.293792] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [929777.301153] RBP: 000000c000193e38 R08: 000000c0007406a0 R09: 0000000000000000 [929777.309900] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [929777.312250] potentially unexpected fatal signal 5. [929777.318646] R13: 000000000000003c R14: 000000c0001ab1e0 R15: 00000000000e55b9 [929777.318649] FS: 000000c000130490 GS: 0000000000000000 [929777.325046] CPU: 22 PID: 11242 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [929777.325048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [929777.325052] RIP: 0033:0x7fffffffe062 [929777.325056] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [929777.325057] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [929777.325058] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [929777.325060] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [929777.325063] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [929777.412172] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [929777.419554] R13: 000000000000003c R14: 000000c0001ab1e0 R15: 00000000000e55b9 [929777.428292] FS: 000000c000130490 GS: 0000000000000000 [929846.930035] potentially unexpected fatal signal 5. [929846.935127] CPU: 81 PID: 47050 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [929846.945462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [929846.954955] RIP: 0033:0x7fffffffe062 [929846.958798] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [929846.977822] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [929846.983300] RAX: 000000000000c1bd RBX: 0000000000000000 RCX: 00007fffffffe05a [929846.992061] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [929846.999549] RBP: 000000c00018fe38 R08: 000000c0003fce20 R09: 0000000000000000 [929847.008288] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [929847.017052] R13: 0000000000000034 R14: 000000c00062c820 R15: 000000000000aaa0 [929847.025801] FS: 000000c000130c90 GS: 0000000000000000 [930593.822610] exe[27798] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f030c7839 cs:33 sp:7f7711d98858 ax:0 si:563f03120070 di:ffffffffff600000 [930593.919690] exe[27655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f030c7839 cs:33 sp:7f7711d98858 ax:0 si:563f03120070 di:ffffffffff600000 [930594.018646] exe[72458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f030c7839 cs:33 sp:7f7711d98858 ax:0 si:563f03120070 di:ffffffffff600000 [930860.711276] potentially unexpected fatal signal 5. [930860.716332] CPU: 78 PID: 98473 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [930860.726699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [930860.736192] RIP: 0033:0x7fffffffe062 [930860.740062] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [930860.760445] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [930860.767310] RAX: 00005618a9c57000 RBX: 0000000000000000 RCX: 00007fffffffe05a [930860.776081] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 00005618a9c57000 [930860.784843] RBP: 000000c00013de38 R08: 0000000000000009 R09: 00000000031f6000 [930860.793608] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00013de20 [930860.802398] R13: 000000000000000e R14: 000000c000007520 R15: 00000000000154e7 [930860.811121] FS: 000000c00027b090 GS: 0000000000000000 [931092.609914] exe[101380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b073e8839 cs:33 sp:7fcc9f359858 ax:0 si:558b07441062 di:ffffffffff600000 [931092.676816] exe[24729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b073e8839 cs:33 sp:7fcc9f359858 ax:0 si:558b07441062 di:ffffffffff600000 [931092.727565] exe[24729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b073e8839 cs:33 sp:7fcc9f359858 ax:0 si:558b07441062 di:ffffffffff600000 [931351.437674] potentially unexpected fatal signal 11. [931351.442804] CPU: 83 PID: 115331 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [931351.453228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [931351.462688] RIP: 0033:0x559b667aab17 [931351.466485] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [931351.485536] RSP: 002b:00007fe886640c90 EFLAGS: 00010206 [931351.492396] RAX: 00007fe886641500 RBX: 00007fe8866411f0 RCX: 0000000000000000 [931351.499780] RDX: 00007fe886641370 RSI: 0000559b6682c3d8 RDI: 00007fe8866411f0 [931351.508516] RBP: 00007fe8866412e0 R08: 0000000000000000 R09: 0000000000000000 [931351.517447] R10: 0000000000001000 R11: 0000000000000293 R12: 0000559b6682c3d8 [931351.526193] R13: 00007fe886641370 R14: 0000000000000000 R15: 00007fe8866411f0 [931351.534948] FS: 0000559b67431480 GS: 0000000000000000 [931670.586528] exe[99780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56432bd71839 cs:33 sp:7fd4797a7858 ax:0 si:56432bdca062 di:ffffffffff600000 [931672.160392] exe[102137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56432bd71839 cs:33 sp:7fd4797a7858 ax:0 si:56432bdca062 di:ffffffffff600000 [931673.968342] exe[100138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56432bd71839 cs:33 sp:7fd4797c8858 ax:0 si:56432bdca062 di:ffffffffff600000 [931724.514686] potentially unexpected fatal signal 5. [931724.519715] CPU: 24 PID: 128498 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [931724.525404] potentially unexpected fatal signal 11. [931724.530133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [931724.535258] CPU: 95 PID: 128144 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [931724.535260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [931724.535264] RIP: 0033:0x55b9b957e79f [931724.535268] Code: 66 2e 0f 1f 84 00 00 00 00 00 90 c5 f9 6e c6 89 f8 25 ff 0f 00 00 c4 e2 7d 78 c0 c5 f1 ef c9 3d e0 0f 00 00 0f 87 91 01 00 00 fe 6f 17 c5 fd 74 da c5 f5 74 d2 c5 ed eb db c5 fd d7 c3 85 c0 [931724.544734] RIP: 0033:0x7fffffffe062 [931724.544737] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [931724.544738] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [931724.544740] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [931724.544743] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [931724.555169] RSP: 002b:00007faaf60e3d78 EFLAGS: 00010283 [931724.555171] RAX: 0000000000000390 RBX: 00007faaf60e42e0 RCX: 0000000000000000 [931724.555172] RDX: 00007faaf60e4460 RSI: 0000000000000025 RDI: 000055b9b95dd390 [931724.555173] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [931724.555174] R10: 0000000000000000 R11: 0000000000000246 R12: 000055b9b95dd390 [931724.555175] R13: 00007faaf60e4460 R14: 0000000000000000 R15: 00007faaf60e42e0 [931724.555177] FS: 000055b9ba1e1480 GS: 0000000000000000 [931724.683682] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [931724.691054] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [931724.699822] R13: 0000000000000040 R14: 000000c0005149c0 R15: 000000000001e45d [931724.707212] FS: 000000c000130890 GS: 0000000000000000 [931737.090512] exe[120542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56094cbfd839 cs:33 sp:7ea758717ee8 ax:0 si:20000180 di:ffffffffff600000 [931737.951709] exe[98002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56094cbfd839 cs:33 sp:7ea758717ee8 ax:0 si:20000180 di:ffffffffff600000 [931738.822881] exe[104017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56094cbfd839 cs:33 sp:7ea7586f6ee8 ax:0 si:20000180 di:ffffffffff600000 [931848.407887] potentially unexpected fatal signal 5. [931848.413032] CPU: 35 PID: 129480 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [931848.423442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [931848.432908] RIP: 0033:0x7fffffffe062 [931848.436714] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [931848.457384] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [931848.464234] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [931848.471587] RDX: 0000000000000000 RSI: 00000000000c9000 RDI: 000055e4dd400000 [931848.480447] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [931848.487842] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [931848.496561] R13: 000000000000003e R14: 000000c0001b1380 R15: 000000000001f036 [931848.505327] FS: 0000000001fc7e50 GS: 0000000000000000 [932096.273234] potentially unexpected fatal signal 5. [932096.278291] CPU: 76 PID: 135442 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [932096.288700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [932096.298155] RIP: 0033:0x7fffffffe062 [932096.301992] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [932096.322479] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [932096.329378] RAX: 0000563d06200000 RBX: 0000000000000000 RCX: 00007fffffffe05a [932096.338143] RDX: 0000000000000001 RSI: 0000000000026000 RDI: 0000563d06200000 [932096.346913] RBP: 000000c00013de38 R08: 0000000000000009 R09: 000000000be98000 [932096.355648] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00013de20 [932096.364431] R13: 000000000000000a R14: 000000c0004e0340 R15: 0000000000020012 [932096.373179] FS: 000000c000580090 GS: 0000000000000000 [932539.639771] exe[99780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610af71b839 cs:33 sp:7fc229513858 ax:0 si:5610af774062 di:ffffffffff600000 [932539.862479] exe[101996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610af71b839 cs:33 sp:7fc2294f2858 ax:0 si:5610af774062 di:ffffffffff600000 [932539.863397] exe[106557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610af71b839 cs:33 sp:7fc229513858 ax:0 si:5610af774062 di:ffffffffff600000 [932540.068265] exe[38615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610af71b839 cs:33 sp:7fc2294d1858 ax:0 si:5610af774062 di:ffffffffff600000 [932595.599997] potentially unexpected fatal signal 5. [932595.605031] CPU: 38 PID: 147589 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [932595.615535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [932595.624980] RIP: 0033:0x7fffffffe062 [932595.628865] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [932595.647945] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [932595.654810] RAX: 000055ff505b0000 RBX: 0000000000000000 RCX: 00007fffffffe05a [932595.663589] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 000055ff505b0000 [932595.672374] RBP: 000000c000193e38 R08: 0000000000000009 R09: 0000000003ffc000 [932595.681123] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c000193e20 [932595.689908] R13: 0000000000000034 R14: 000000c000463040 R15: 0000000000022eb0 [932595.698652] FS: 000000c000500090 GS: 0000000000000000 [933071.582507] potentially unexpected fatal signal 5. [933071.587566] CPU: 83 PID: 29091 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [933071.597891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [933071.607334] RIP: 0033:0x7fffffffe062 [933071.611130] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [933071.630253] RSP: 002b:000000c000513d98 EFLAGS: 00000297 [933071.637005] RAX: 0000000000026486 RBX: 0000000000000000 RCX: 00007fffffffe05a [933071.645776] RDX: 0000000000000000 RSI: 000000c000514000 RDI: 0000000000012f00 [933071.653153] RBP: 000000c000513e38 R08: 000000c0027033c0 R09: 0000000000000000 [933071.662078] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000513e20 [933071.670939] R13: 0000000000000036 R14: 000000c0004a4d00 R15: 0000000000006225 [933071.679684] FS: 000000000229acd0 GS: 0000000000000000 [933071.864894] potentially unexpected fatal signal 5. [933071.869981] CPU: 95 PID: 156802 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [933071.880400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [933071.889884] RIP: 0033:0x7fffffffe062 [933071.893725] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [933071.912792] RSP: 002b:000000c000513d98 EFLAGS: 00000297 [933071.918272] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [933071.927043] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [933071.935757] RBP: 000000c000513e38 R08: 0000000000000000 R09: 0000000000000000 [933071.944503] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000513e20 [933071.953281] R13: 0000000000000036 R14: 000000c0004a4d00 R15: 0000000000006225 [933071.962207] FS: 000000000229acd0 GS: 0000000000000000 [933182.398922] exe[141012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b23000839 cs:33 sp:7efecfd34ee8 ax:0 si:20000280 di:ffffffffff600000 [933183.373523] exe[78918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b23000839 cs:33 sp:7efecfd13ee8 ax:0 si:20000280 di:ffffffffff600000 [933184.280638] exe[149219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b23000839 cs:33 sp:7efecfcd1ee8 ax:0 si:20000280 di:ffffffffff600000 [933223.110866] potentially unexpected fatal signal 5. [933223.115946] CPU: 83 PID: 160919 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [933223.126365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [933223.135913] RIP: 0033:0x7fffffffe062 [933223.139702] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [933223.158752] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [933223.165640] RAX: 0000000000029992 RBX: 0000000000000000 RCX: 00007fffffffe05a [933223.174585] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [933223.181976] RBP: 000000c000193e38 R08: 000000c0004125b0 R09: 0000000000000000 [933223.190735] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [933223.199512] R13: 0000000000000036 R14: 000000c0004c5520 R15: 0000000000025e55 [933223.208262] FS: 000000c000130890 GS: 0000000000000000 [933307.785616] exe[137088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f78ccd839 cs:33 sp:7fae48e9fee8 ax:0 si:20002880 di:ffffffffff600000 [933307.946790] exe[136029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f78ccd839 cs:33 sp:7fae48e9fee8 ax:0 si:20002880 di:ffffffffff600000 [933308.523932] exe[132871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f78ccd839 cs:33 sp:7fae48e9fee8 ax:0 si:20002880 di:ffffffffff600000 [933388.792664] potentially unexpected fatal signal 5. [933388.797728] CPU: 17 PID: 137278 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [933388.808172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [933388.817646] RIP: 0033:0x7fffffffe062 [933388.821480] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [933388.841870] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [933388.848681] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [933388.857560] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [933388.866333] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [933388.873717] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [933388.881089] R13: 0000000000000040 R14: 000000c00019e820 R15: 000000000000af19 [933388.889841] FS: 0000000001fc7e50 GS: 0000000000000000 [933458.096308] potentially unexpected fatal signal 5. [933458.101354] CPU: 28 PID: 183668 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [933458.111794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [933458.121266] RIP: 0033:0x7fffffffe062 [933458.125054] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [933458.144264] RSP: 002b:000000c000513d98 EFLAGS: 00000297 [933458.149742] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [933458.157109] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [933458.164490] RBP: 000000c000513e38 R08: 0000000000000000 R09: 0000000000000000 [933458.171857] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000513e20 [933458.179217] R13: 000000000000003c R14: 000000c0004afba0 R15: 000000000000cab9 [933458.187005] FS: 000000c000130890 GS: 0000000000000000 [933972.345886] potentially unexpected fatal signal 11. [933972.351026] CPU: 64 PID: 204443 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [933972.361440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [933972.370947] RIP: 0033:0x558439243e69 [933972.374724] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [933972.394001] RSP: 002b:00007f8dc5f38448 EFLAGS: 00010213 [933972.399486] RAX: 0000000000000016 RBX: 000055843928d3b9 RCX: 0000558439243e57 [933972.408281] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f8dc5f395c0 [933972.417050] RBP: 00007f8dc5f3959c R08: 00000000223ca6f8 R09: 00000000000001e2 [933972.425803] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8dc5f395c0 [933972.434569] R13: 000055843928d3b9 R14: 000000000003a64d R15: 0000000000000004 [933972.443342] FS: 0000558439e92480 GS: 0000000000000000 [934096.610039] potentially unexpected fatal signal 5. [934096.615081] CPU: 43 PID: 204309 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [934096.625502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [934096.635028] RIP: 0033:0x7fffffffe062 [934096.638815] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [934096.657859] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [934096.663326] RAX: 0000000000033429 RBX: 0000000000000000 RCX: 00007fffffffe05a [934096.670698] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [934096.679459] RBP: 000000c00018fe38 R08: 000000c000634010 R09: 0000000000000000 [934096.688250] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [934096.697014] R13: 0000000000000032 R14: 000000c00049ed00 R15: 0000000000031e01 [934096.705782] FS: 000000c000130890 GS: 0000000000000000 [934234.109489] exe[113975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55caabdf3839 cs:33 sp:7f5a9bffeee8 ax:0 si:20000080 di:ffffffffff600000 [934235.343269] exe[186088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556bbc951839 cs:33 sp:7fe1fcbfeee8 ax:0 si:20000080 di:ffffffffff600000 [934238.522049] exe[198350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564967a31839 cs:33 sp:7f5ba9d2dee8 ax:0 si:20000080 di:ffffffffff600000 [934246.340849] exe[213610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556284f6a839 cs:33 sp:7fe36fd1dee8 ax:0 si:20000080 di:ffffffffff600000 [934247.268920] exe[195198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56053dd52839 cs:33 sp:7ea694b22ee8 ax:0 si:20000080 di:ffffffffff600000 [934280.741125] exe[213989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561392103839 cs:33 sp:7ef051e56ee8 ax:0 si:20000080 di:ffffffffff600000 [934324.776825] exe[215050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616593f6839 cs:33 sp:7ebb1d10fee8 ax:0 si:20000080 di:ffffffffff600000 [934415.479971] exe[174477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fa31565839 cs:33 sp:7fd8be34cee8 ax:0 si:20000080 di:ffffffffff600000 [934508.745969] exe[163089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560677e45839 cs:33 sp:7ee87df0aee8 ax:0 si:20000080 di:ffffffffff600000 [934528.258185] exe[130041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3b1973839 cs:33 sp:7fae0edfeee8 ax:0 si:20000080 di:ffffffffff600000 [934632.884309] exe[173961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b2ca05839 cs:33 sp:7f88a308eee8 ax:0 si:20000080 di:ffffffffff600000 [934651.911012] exe[213618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e683c9839 cs:33 sp:7f0038787ee8 ax:0 si:20000080 di:ffffffffff600000 [934654.689650] exe[212454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3005c839 cs:33 sp:7f1edfc4cee8 ax:0 si:20000080 di:ffffffffff600000 [934654.868670] exe[212427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3005c839 cs:33 sp:7f1edfc4cee8 ax:0 si:20000080 di:ffffffffff600000 [934745.782030] exe[226006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56406c684839 cs:33 sp:7f8b89bd9ee8 ax:0 si:20000080 di:ffffffffff600000 [935330.042029] potentially unexpected fatal signal 5. [935330.047095] CPU: 54 PID: 234330 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [935330.057485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [935330.066927] RIP: 0033:0x7fffffffe062 [935330.070714] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [935330.089737] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [935330.095296] RAX: 000000000003b040 RBX: 0000000000000000 RCX: 00007fffffffe05a [935330.104116] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [935330.111493] RBP: 000000c000193e38 R08: 000000c00075d1e0 R09: 0000000000000000 [935330.120233] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [935330.128961] R13: 000000000000003e R14: 000000c000007d40 R15: 0000000000036be9 [935330.137702] FS: 000000c000130490 GS: 0000000000000000 [935663.690789] exe[216793] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8220c5839 cs:33 sp:7fe039b97858 ax:0 si:55f82211e062 di:ffffffffff600000 [935665.782413] exe[246429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556bbc951839 cs:33 sp:7fe1fcbfe858 ax:0 si:556bbc9aa062 di:ffffffffff600000 [935669.116654] exe[228795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb94c61839 cs:33 sp:7f87175ae858 ax:0 si:55eb94cba062 di:ffffffffff600000 [935669.705719] exe[247151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af5b7cd839 cs:33 sp:7eb27d0e8858 ax:0 si:55af5b826062 di:ffffffffff600000 [935877.374045] exe[147253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3b1973839 cs:33 sp:7fae0edfe858 ax:0 si:55b3b19cc062 di:ffffffffff600000 [935927.378661] exe[250219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a5cbd0839 cs:33 sp:7ebcf235c858 ax:0 si:562a5cc29062 di:ffffffffff600000 [935949.793804] exe[249843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c96069839 cs:33 sp:7f5d8b1fe858 ax:0 si:562c960c2062 di:ffffffffff600000 [936014.408228] exe[252565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bfc2ca40a cs:33 sp:7f126039bee8 ax:12 si:ffffffffff600000 di:555bfc336ff2 [936014.464947] exe[198536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bfc2ca40a cs:33 sp:7f126039bee8 ax:12 si:ffffffffff600000 di:555bfc336ff2 [936014.491515] exe[252559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bfc2ca40a cs:33 sp:7f1260359ee8 ax:12 si:ffffffffff600000 di:555bfc336ff2 [936014.542341] exe[180188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bfc2ca40a cs:33 sp:7f126037aee8 ax:12 si:ffffffffff600000 di:555bfc336ff2 [936086.517614] exe[222862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b2ca05839 cs:33 sp:7f88a308e858 ax:0 si:562b2ca5e062 di:ffffffffff600000 [936093.164569] exe[252378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e5fbd5839 cs:33 sp:7f69a9072858 ax:0 si:557e5fc2e062 di:ffffffffff600000 [936093.417946] exe[222214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f586067839 cs:33 sp:7f9ec8421858 ax:0 si:55f5860c0062 di:ffffffffff600000 [936127.771950] exe[138625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616593f6839 cs:33 sp:7ebb1d10f858 ax:0 si:56165944f062 di:ffffffffff600000 [936505.059831] exe[241013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c88862839 cs:33 sp:7fe3ac98f858 ax:0 si:556c888bb062 di:ffffffffff600000 [936683.280989] potentially unexpected fatal signal 5. [936683.286049] CPU: 12 PID: 258399 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [936683.296455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [936683.305888] RIP: 0033:0x7fffffffe062 [936683.309691] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [936683.328687] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [936683.334144] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [936683.341544] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [936683.348907] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [936683.357678] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [936683.365102] R13: 0000000000000016 R14: 000000c00021e340 R15: 0000000000026998 [936683.372443] FS: 000000c000130490 GS: 0000000000000000 [936683.806089] potentially unexpected fatal signal 5. [936683.811260] CPU: 81 PID: 258397 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [936683.821789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [936683.831219] RIP: 0033:0x7fffffffe062 [936683.835017] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [936683.854135] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [936683.859604] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [936683.866969] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [936683.874325] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [936683.881672] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [936683.889029] R13: 0000000000000016 R14: 000000c00021e340 R15: 0000000000026998 [936683.896392] FS: 000000c000130490 GS: 0000000000000000 [936798.945823] exe[249415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56406c684839 cs:33 sp:7f8b89bd9858 ax:0 si:56406c6dd062 di:ffffffffff600000 [937068.705028] potentially unexpected fatal signal 5. [937068.710186] CPU: 67 PID: 185177 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [937068.720608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [937068.730065] RIP: 0033:0x7fffffffe062 [937068.733866] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [937068.753120] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [937068.759964] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [937068.768720] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [937068.777454] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [937068.786200] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [937068.794901] R13: 000000000000001c R14: 000000c0001be9c0 R15: 000000000002d17a [937068.802288] FS: 000000c000130490 GS: 0000000000000000 [937123.789726] potentially unexpected fatal signal 11. [937123.794925] CPU: 73 PID: 197919 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [937123.805401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [937123.814952] RIP: 0033:0x55eb94c6cb8f [937123.818749] Code: 25 10 00 00 00 be 18 00 00 00 48 8d b8 e0 02 00 00 66 48 0f 6e c7 66 0f 6c c0 0f 11 80 d8 02 00 00 b8 11 01 00 00 0f 05 89 d0 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 ba ff ff ff ff 89 d0 c3 66 [937123.837800] RSP: 002b:00007f026e765438 EFLAGS: 00010202 [937123.843282] RAX: 0000000000003f6e RBX: 0000000000000000 RCX: 000055eb94c6cb53 [937123.850654] RDX: 0000000000003f6e RSI: 0000000000000000 RDI: 0000000001200011 [937123.858012] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [937123.866756] R10: 000055eb958bf750 R11: 0000000000000246 R12: 0000000000000001 [937123.875599] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [937123.882957] FS: 000055eb958bf480 GS: 0000000000000000 [938033.633416] potentially unexpected fatal signal 5. [938033.638686] CPU: 26 PID: 305662 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [938033.649085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [938033.658796] RIP: 0033:0x7fffffffe062 [938033.662615] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [938033.681634] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [938033.688472] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [938033.695859] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [938033.704592] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [938033.713347] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [938033.722099] R13: 0000000000000036 R14: 000000c00021e340 R15: 0000000000045a62 [938033.729559] FS: 000000c000130890 GS: 0000000000000000 [938296.345793] exe[301956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c10c59c40a cs:33 sp:7fced4710ee8 ax:12 si:ffffffffff600000 di:55c10c608ff2 [938297.106377] exe[308120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c10c59c40a cs:33 sp:7fced4710ee8 ax:12 si:ffffffffff600000 di:55c10c608ff2 [938297.107147] exe[307510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c10c59c40a cs:33 sp:7fced46efee8 ax:12 si:ffffffffff600000 di:55c10c608ff2 [938297.246540] exe[306373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c10c59c40a cs:33 sp:7fced46ceee8 ax:12 si:ffffffffff600000 di:55c10c608ff2 [938593.018239] exe[264305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6ab16a40a cs:33 sp:7f14d02dbee8 ax:12 si:ffffffffff600000 di:55b6ab1d6ff2 [938593.136527] exe[268772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6ab16a40a cs:33 sp:7f14d02dbee8 ax:12 si:ffffffffff600000 di:55b6ab1d6ff2 [938593.292731] exe[266678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6ab16a40a cs:33 sp:7f14d02dbee8 ax:12 si:ffffffffff600000 di:55b6ab1d6ff2 [938698.149917] exe[310010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56416f45a839 cs:33 sp:7ecf5ff02858 ax:0 si:56416f4b3062 di:ffffffffff600000 [940215.866527] exe[282300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d0e01740a cs:33 sp:7facfe4afee8 ax:12 si:ffffffffff600000 di:558d0e083ff2 [940215.955372] exe[343894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d0e01740a cs:33 sp:7facfe4afee8 ax:12 si:ffffffffff600000 di:558d0e083ff2 [940216.088350] exe[343671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d0e01740a cs:33 sp:7facfe4afee8 ax:12 si:ffffffffff600000 di:558d0e083ff2 [940291.604406] potentially unexpected fatal signal 5. [940291.609466] CPU: 81 PID: 344946 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [940291.619862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [940291.629290] RIP: 0033:0x7fffffffe062 [940291.633070] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [940291.652233] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [940291.657789] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [940291.665137] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [940291.673978] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [940291.682882] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [940291.691607] R13: 000000000000001e R14: 000000c0004a71e0 R15: 000000000003f377 [940291.700377] FS: 000000000229acd0 GS: 0000000000000000 [940938.728149] potentially unexpected fatal signal 5. [940938.733198] CPU: 34 PID: 354760 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [940938.743628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [940938.753174] RIP: 0033:0x7fffffffe062 [940938.756984] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [940938.775971] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [940938.781439] RAX: 00005652f2840000 RBX: 0000000000000000 RCX: 00007fffffffe05a [940938.790203] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 00005652f2840000 [940938.798954] RBP: 000000c00018fe38 R08: 0000000000000009 R09: 00000000009fa000 [940938.807688] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00018fe20 [940938.816694] R13: 000000000000001c R14: 000000c00047a340 R15: 000000000005471f [940938.825428] FS: 000000c000180490 GS: 0000000000000000 [941133.812422] potentially unexpected fatal signal 5. [941133.817452] CPU: 63 PID: 378811 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [941133.827974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [941133.837423] RIP: 0033:0x7fffffffe062 [941133.841263] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [941133.860250] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [941133.867118] RAX: 000055de4da00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [941133.874485] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 000055de4da00000 [941133.881837] RBP: 000000c00018de38 R08: 0000000000000009 R09: 0000000010200000 [941133.889205] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00018de20 [941133.896588] R13: 000000000000001c R14: 000000c00047ab60 R15: 0000000000058067 [941133.903968] FS: 000000c000130890 GS: 0000000000000000 [941406.654497] potentially unexpected fatal signal 11. [941406.659620] CPU: 0 PID: 355229 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [941406.669942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [941406.679469] RIP: 0033:0x5627b63be6b9 [941406.683273] Code: 40 0f 94 c5 89 ef e8 56 08 00 00 48 89 c3 45 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff <64> 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 e8 93 09 00 00 45 85 [941406.702304] RSP: 002b:00007fec7ae47440 EFLAGS: 00010202 [941406.707754] RAX: 0000000000001b73 RBX: 0000000000000000 RCX: 00005627b63beb53 [941406.716550] RDX: 0000000000001b73 RSI: 0000000000000000 RDI: 0000000001200011 [941406.725349] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [941406.734133] R10: 00005627b7011750 R11: 0000000000000246 R12: 0000000000001b73 [941406.742981] R13: ffffffffffffffb0 R14: 0000000000000001 R15: 0000000000000000 [941406.751753] FS: 00005627b7011480 GS: 0000000000000000 [941665.499716] exe[425621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645b9ff9b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1100200 [941666.100287] exe[440889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645b9ff9b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1100200 [941666.180326] exe[437181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645b9ff9b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1100200 [941666.484049] exe[435265] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645b9ff9b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:1100200 [944489.978751] host.test[549658] bad frame in rt_sigreturn frame:000000008e442c10 ip:ffffffffffffd8ef sp:ffffffffffffd8ef orax:ffffffffffffffff [944489.991739] potentially unexpected fatal signal 11. [944489.996877] CPU: 54 PID: 549658 Comm: host.test Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [944490.007835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [944490.017332] RIP: d8ef:0xffffffffffffd8ef [944490.022860] Code: Unable to access opcode bytes at RIP 0xffffffffffffd8c5. [944490.031362] RSP: ffff:ffffffffffffd8ef EFLAGS: 00050ac7 [944490.038214] RAX: 0000000000000000 RBX: 000000c00003800f RCX: ffffffffffffd8ef [944490.047027] RDX: 0000000000000002 RSI: 000000000000000e RDI: 0000000000b2901a [944490.054440] RBP: 0001000000000030 R08: 00000000004697fd R09: 0000000000485936 [944490.063183] R10: 000000c00046fc50 R11: 000000c00046fcc8 R12: 000000000048595e [944490.071932] R13: 000000000047ba38 R14: 0000000000a23060 R15: 000000c0001a2840 [944490.079291] FS: 00007f49ee05d740 GS: 0000000000000000 [944578.680792] potentially unexpected fatal signal 11. [944578.685930] CPU: 28 PID: 534508 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [944578.696355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [944578.705842] RIP: 0033:0x55ea29dba787 [944578.710200] Code: fa 09 00 e8 db fa ff ff 48 8d 3d 91 fa 09 00 e8 cf fa ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 53 89 fb 48 83 ec 10 <64> 8b 04 25 ac ff ff ff 85 c0 74 2a 89 fe 31 c0 bf 3c 00 00 00 e8 [944578.730630] RSP: 002b:00007f59555381a0 EFLAGS: 00010206 [944578.736114] RAX: 0000000000000000 RBX: 000000000000000b RCX: 000055ea29e0fb29 [944578.743509] RDX: 00007f59555381c0 RSI: 00007f59555382f0 RDI: 000000000000000b [944578.750884] RBP: 000055ea29e5b47a R08: 0000000000000000 R09: 0000000000000000 [944578.758253] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [944578.765632] R13: 0000000000000061 R14: 000055ea29f2f050 R15: 00007ffc9aa3e228 [944578.773043] FS: 0000000000000000 GS: 0000000000000000 [945248.351865] exe[637723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ca6c9b4b1 cs:33 sp:7f28d4dbb4c8 ax:8 si:1 di:7f28d4dbb5c0 [945248.436669] exe[632488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ca6c9b4b1 cs:33 sp:7f28d4dbb4c8 ax:8 si:1 di:7f28d4dbb5c0 [945248.520189] exe[625221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ca6c9b4b1 cs:33 sp:7f28d4dbb4c8 ax:8 si:1 di:7f28d4dbb5c0 [945816.660320] exe[613120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eef05840a cs:33 sp:7f1a9abb3ee8 ax:12 si:ffffffffff600000 di:556eef0c4ff2 [945816.767649] exe[614541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eef05840a cs:33 sp:7f1a9abb3ee8 ax:12 si:ffffffffff600000 di:556eef0c4ff2 [945816.801727] exe[632327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eef05840a cs:33 sp:7f1a9abb3ee8 ax:12 si:ffffffffff600000 di:556eef0c4ff2 [945816.899970] exe[632327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eef05840a cs:33 sp:7f1a9abb3ee8 ax:12 si:ffffffffff600000 di:556eef0c4ff2 [946136.654874] exe[654032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560522da3839 cs:33 sp:7f3d15eea858 ax:0 si:560522dfc062 di:ffffffffff600000 [946137.560528] exe[663487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560522da3839 cs:33 sp:7f3d15eea858 ax:0 si:560522dfc062 di:ffffffffff600000 [946137.661695] exe[616103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560522da3839 cs:33 sp:7f3d15eea858 ax:0 si:560522dfc062 di:ffffffffff600000 [946138.789060] exe[618437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560522da3839 cs:33 sp:7f3d15eea858 ax:0 si:560522dfc062 di:ffffffffff600000 [948202.175668] potentially unexpected fatal signal 5. [948202.180799] CPU: 38 PID: 709141 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [948202.191215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [948202.200677] RIP: 0033:0x7fffffffe062 [948202.204510] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [948202.223635] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [948202.230497] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [948202.237874] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [948202.246667] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [948202.252671] potentially unexpected fatal signal 5. [948202.254025] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018de20 [948202.260434] CPU: 92 PID: 709011 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [948202.260436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [948202.260440] RIP: 0033:0x7fffffffe062 [948202.260442] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [948202.260443] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [948202.260445] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [948202.260446] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [948202.260447] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [948202.260450] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018de20 [948202.260452] R13: 000000000000001c R14: 000000c000162820 R15: 00000000000919d1 [948202.260460] FS: 000000c000130490 GS: 0000000000000000 [948202.261672] potentially unexpected fatal signal 5. [948202.261675] CPU: 44 PID: 709105 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [948202.261676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [948202.261678] RIP: 0033:0x7fffffffe062 [948202.261680] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [948202.261681] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [948202.261682] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [948202.261683] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [948202.261683] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [948202.261684] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [948202.261684] R13: 000000000000001c R14: 000000c000162820 R15: 00000000000919d1 [948202.261685] FS: 000000c000130490 GS: 0000000000000000 [948202.267832] R13: 000000000000001c R14: 000000c000162820 R15: 00000000000919d1 [948202.267834] FS: 000000c000130490 GS: 0000000000000000 [948212.370996] potentially unexpected fatal signal 5. [948212.376046] CPU: 16 PID: 710332 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [948212.386458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [948212.396029] RIP: 0033:0x7fffffffe062 [948212.399850] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [948212.418871] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [948212.425698] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [948212.433057] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [948212.440428] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [948212.447784] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [948212.456524] R13: 000000000000001c R14: 000000c0005069c0 R15: 00000000000920d8 [948212.464043] FS: 000000c000588090 GS: 0000000000000000 [948214.099046] potentially unexpected fatal signal 5. [948214.099396] potentially unexpected fatal signal 5. [948214.104104] CPU: 59 PID: 598936 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [948214.109115] CPU: 12 PID: 599151 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [948214.109117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [948214.109121] RIP: 0033:0x7fffffffe062 [948214.109123] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [948214.109124] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [948214.109125] RAX: 00000000000ad773 RBX: 0000000000000000 RCX: 00007fffffffe05a [948214.109126] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [948214.109126] RBP: 000000c00018fe38 R08: 000000c0004324c0 R09: 0000000000000000 [948214.109127] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [948214.109127] R13: 0000000000000036 R14: 000000c00049ed00 R15: 000000000009237d [948214.109128] FS: 000000c000180490 GS: 0000000000000000 [948214.118317] potentially unexpected fatal signal 5. [948214.119538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [948214.129950] CPU: 76 PID: 605823 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [948214.129951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [948214.129955] RIP: 0033:0x7fffffffe062 [948214.129958] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [948214.129958] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [948214.129960] RAX: 00000000000ad772 RBX: 0000000000000000 RCX: 00007fffffffe05a [948214.129960] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [948214.129961] RBP: 000000c00018fe38 R08: 000000c000433e10 R09: 0000000000000000 [948214.129961] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [948214.129962] R13: 0000000000000036 R14: 000000c00049ed00 R15: 000000000009237d [948214.129963] FS: 000000c000180490 GS: 0000000000000000 [948214.134171] potentially unexpected fatal signal 5. [948214.139454] RIP: 0033:0x7fffffffe062 [948214.139457] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [948214.139458] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [948214.139460] RAX: 00000000000ad76d RBX: 0000000000000000 RCX: 00007fffffffe05a [948214.139461] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [948214.139461] RBP: 000000c00018fe38 R08: 000000c0007381f0 R09: 0000000000000000 [948214.139462] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [948214.139463] R13: 0000000000000036 R14: 000000c00049ed00 R15: 000000000009237d [948214.139464] FS: 000000c000180490 GS: 0000000000000000 [948214.403138] CPU: 57 PID: 632703 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [948214.414949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [948214.425770] RIP: 0033:0x7fffffffe062 [948214.431072] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [948214.451455] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [948214.458273] RAX: 00000000000ad771 RBX: 0000000000000000 RCX: 00007fffffffe05a [948214.467008] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [948214.475765] RBP: 000000c00018fe38 R08: 000000c0010fbd20 R09: 0000000000000000 [948214.483127] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [948214.490572] R13: 0000000000000036 R14: 000000c00049ed00 R15: 000000000009237d [948214.499341] FS: 000000c000180490 GS: 0000000000000000 [948223.998666] potentially unexpected fatal signal 5. [948224.003707] CPU: 79 PID: 671311 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [948224.014223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [948224.024019] RIP: 0033:0x7fffffffe062 [948224.027822] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [948224.046828] RSP: 002b:000000c00051dd98 EFLAGS: 00000297 [948224.053638] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [948224.061003] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [948224.068369] RBP: 000000c00051de38 R08: 0000000000000000 R09: 0000000000000000 [948224.077118] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00051de20 [948224.085864] R13: 000000000000002e R14: 000000c000166820 R15: 0000000000092aac [948224.093221] FS: 000000c000130890 GS: 0000000000000000 [948283.650593] potentially unexpected fatal signal 5. [948283.655667] CPU: 70 PID: 722810 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [948283.666084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [948283.675536] RIP: 0033:0x7fffffffe062 [948283.679376] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [948283.698477] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [948283.705323] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [948283.712703] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [948283.721433] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [948283.728826] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [948283.737606] R13: 000000000000001c R14: 000000c0001aa820 R15: 00000000000adcc3 [948283.744999] FS: 000000c000130490 GS: 0000000000000000 [948309.299939] potentially unexpected fatal signal 5. [948309.304988] CPU: 15 PID: 727582 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [948309.315398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [948309.324877] RIP: 0033:0x7fffffffe062 [948309.328718] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [948309.349131] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [948309.355979] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [948309.364743] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [948309.373484] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [948309.382268] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [948309.391021] R13: 000000000000001e R14: 000000c00016e340 R15: 00000000000b1489 [948309.399775] FS: 000000000229acd0 GS: 0000000000000000 [949808.580493] exe[741856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c4dee340a cs:33 sp:7fb9b0cfdee8 ax:12 si:ffffffffff600000 di:560c4df4fff2 [949808.629397] exe[741856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c4dee340a cs:33 sp:7fb9b0cfdee8 ax:12 si:ffffffffff600000 di:560c4df4fff2 [949808.674880] exe[741856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c4dee340a cs:33 sp:7fb9b0cfdee8 ax:12 si:ffffffffff600000 di:560c4df4fff2 [949808.699880] exe[754621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c4dee340a cs:33 sp:7fb9b0cfdee8 ax:12 si:ffffffffff600000 di:560c4df4fff2 [951318.825896] exe[719223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556713c65839 cs:33 sp:7ff6e0e9d858 ax:0 si:556713cbe062 di:ffffffffff600000 [951318.931936] exe[733895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556713c65839 cs:33 sp:7ff6e0e9d858 ax:0 si:556713cbe062 di:ffffffffff600000 [951319.037733] exe[762755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556713c65839 cs:33 sp:7ff6e0e9d858 ax:0 si:556713cbe062 di:ffffffffff600000 [951319.132375] exe[776510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556713c65839 cs:33 sp:7ff6e0e9d858 ax:0 si:556713cbe062 di:ffffffffff600000 [951820.483455] potentially unexpected fatal signal 5. [951820.488515] CPU: 87 PID: 774570 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [951820.498913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [951820.508369] RIP: 0033:0x7fffffffe062 [951820.512194] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [951820.531211] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [951820.538040] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [951820.546786] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [951820.554145] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [951820.562878] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [951820.571622] R13: 000000000000003e R14: 000000c0001609c0 R15: 00000000000adaa1 [951820.580346] FS: 000000c000180090 GS: 0000000000000000 [951908.929537] exe[799547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579714b7839 cs:33 sp:7f93d08f4858 ax:0 si:557971510062 di:ffffffffff600000 [952314.266377] potentially unexpected fatal signal 5. [952314.271403] CPU: 46 PID: 739698 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [952314.281888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [952314.291324] RIP: 0033:0x7fffffffe062 [952314.295187] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [952314.314202] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [952314.319650] RAX: 00000000000c7e54 RBX: 0000000000000000 RCX: 00007fffffffe05a [952314.327059] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [952314.339684] RBP: 000000c00013de38 R08: 000000c0009903d0 R09: 0000000000000000 [952314.347053] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [952314.354412] R13: 000000000000001c R14: 000000c00049e680 R15: 00000000000b48aa [952314.363183] FS: 000000c000130490 GS: 0000000000000000 [952358.584876] potentially unexpected fatal signal 5. [952358.589932] CPU: 93 PID: 751450 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [952358.591741] potentially unexpected fatal signal 5. [952358.600367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [952358.605380] CPU: 8 PID: 785464 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [952358.614889] RIP: 0033:0x7fffffffe062 [952358.614892] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [952358.614893] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [952358.614894] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [952358.614897] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [952358.625244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [952358.625249] RIP: 0033:0x7fffffffe062 [952358.625252] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [952358.629044] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [952358.629045] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [952358.629046] R13: 000000000000001c R14: 000000c0005c0b60 R15: 00000000000b4f53 [952358.629047] FS: 000000c000130490 GS: 0000000000000000 [952358.713597] potentially unexpected fatal signal 5. [952358.718043] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [952358.718045] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [952358.718045] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [952358.718046] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [952358.718046] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [952358.718047] R13: 000000000000001c R14: 000000c0005c0b60 R15: 00000000000b4f53 [952358.718048] FS: 000000c000130490 GS: 0000000000000000 [952358.785225] CPU: 17 PID: 774282 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [952358.797026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [952358.806620] RIP: 0033:0x7fffffffe062 [952358.810423] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [952358.829450] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [952358.836405] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [952358.843768] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [952358.852537] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [952358.861273] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [952358.870049] R13: 000000000000001c R14: 000000c0005c0b60 R15: 00000000000b4f53 [952358.873392] potentially unexpected fatal signal 5. [952358.878877] FS: 000000c000130490 GS: 0000000000000000 [952358.883896] CPU: 58 PID: 758829 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [952358.883898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [952358.883902] RIP: 0033:0x7fffffffe062 [952358.883905] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [952358.883905] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [952358.883907] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [952358.883907] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [952358.883908] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [952358.883908] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [952358.883909] R13: 000000000000001c R14: 000000c0005c0b60 R15: 00000000000b4f53 [952358.883910] FS: 000000c000130490 GS: 0000000000000000 [952364.538855] potentially unexpected fatal signal 5. [952364.544021] CPU: 42 PID: 821239 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [952364.554457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [952364.563899] RIP: 0033:0x7fffffffe062 [952364.567692] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [952364.586718] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [952364.592185] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [952364.600934] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [952364.608303] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [952364.617055] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [952364.624449] R13: 000000000000001c R14: 000000c0006a6820 R15: 00000000000b5194 [952364.633234] FS: 000000c000180090 GS: 0000000000000000 [952632.589666] exe[836039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f928518b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [952632.712842] exe[836478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f928518b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [952632.833970] exe[836478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f928518b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:8000 [953163.669508] exe[817940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608827aa839 cs:33 sp:7fb3df172858 ax:0 si:560882803070 di:ffffffffff600000 [953164.475632] exe[816410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608827aa839 cs:33 sp:7fb3df172858 ax:0 si:560882803070 di:ffffffffff600000 [953164.549573] exe[847315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d0e722839 cs:33 sp:7fdb95b8c858 ax:0 si:558d0e77b070 di:ffffffffff600000 [953164.573859] exe[852781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608827aa839 cs:33 sp:7fb3df172858 ax:0 si:560882803070 di:ffffffffff600000 [953165.353274] exe[852862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608827aa839 cs:33 sp:7fb3df172858 ax:0 si:560882803070 di:ffffffffff600000 [953165.356526] exe[847315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d0e722839 cs:33 sp:7fdb95b8c858 ax:0 si:558d0e77b070 di:ffffffffff600000 [953165.466400] exe[830686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d0e722839 cs:33 sp:7fdb95b8c858 ax:0 si:558d0e77b070 di:ffffffffff600000 [954580.700084] exe[872890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567e5972839 cs:33 sp:7f99d4b89858 ax:0 si:5567e59cb097 di:ffffffffff600000 [954580.831391] exe[873577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567e5972839 cs:33 sp:7f99d4b89858 ax:0 si:5567e59cb097 di:ffffffffff600000 [954580.958584] exe[873663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567e5972839 cs:33 sp:7f99d4b89858 ax:0 si:5567e59cb097 di:ffffffffff600000 [954660.212125] exe[808700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642f334f40a cs:33 sp:7ff5efdfcee8 ax:12 si:ffffffffff600000 di:5642f33bbff2 [954661.082090] exe[816698] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642f334f40a cs:33 sp:7ff5efdfcee8 ax:12 si:ffffffffff600000 di:5642f33bbff2 [954661.980667] exe[817717] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642f334f40a cs:33 sp:7ff5efdfcee8 ax:12 si:ffffffffff600000 di:5642f33bbff2 [955437.325271] potentially unexpected fatal signal 5. [955437.330309] CPU: 95 PID: 894415 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [955437.340793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [955437.350234] RIP: 0033:0x7fffffffe062 [955437.354019] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [955437.358372] potentially unexpected fatal signal 5. [955437.373035] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [955437.378136] CPU: 66 PID: 879473 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [955437.378140] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [955437.383604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [955437.395371] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [955437.395373] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [955437.395373] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [955437.395374] R13: 0000000000000036 R14: 000000c0004c7380 R15: 00000000000c2b24 [955437.395374] FS: 000000c000130890 GS: 0000000000000000 [955437.452383] potentially unexpected fatal signal 5. [955437.455868] RIP: 0033:0x7fffffffe062 [955437.455872] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [955437.462250] CPU: 62 PID: 894427 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [955437.462252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [955437.462255] RIP: 0033:0x7fffffffe062 [955437.462257] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [955437.462258] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [955437.462259] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [955437.462260] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [955437.462261] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [955437.462261] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [955437.462262] R13: 000000000000003e R14: 000000c000168820 R15: 00000000000c2b28 [955437.462262] FS: 000000c000130c90 GS: 0000000000000000 [955437.586488] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [955437.591951] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [955437.599304] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [955437.606662] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [955437.614030] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [955437.622751] R13: 0000000000000036 R14: 000000c0004c7380 R15: 00000000000c2b24 [955437.631506] FS: 000000c000130890 GS: 0000000000000000 [955925.659708] potentially unexpected fatal signal 5. [955925.664875] CPU: 8 PID: 824547 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [955925.675211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [955925.684666] RIP: 0033:0x7fffffffe062 [955925.688475] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [955925.707662] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [955925.713102] RAX: 00000000000e2c88 RBX: 0000000000000000 RCX: 00007fffffffe05a [955925.720563] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [955925.729297] RBP: 000000c00013de38 R08: 000000c0036785b0 R09: 0000000000000000 [955925.736667] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [955925.744067] R13: 000000000000001e R14: 000000c000502680 R15: 00000000000c805b [955925.752795] FS: 000000c000500090 GS: 0000000000000000 [955925.865698] potentially unexpected fatal signal 5. [955925.870721] CPU: 71 PID: 853417 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [955925.881131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [955925.888805] potentially unexpected fatal signal 5. [955925.890607] RIP: 0033:0x7fffffffe062 [955925.895619] CPU: 54 PID: 819317 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [955925.900760] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [955925.900761] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [955925.900763] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [955925.900763] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [955925.900764] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [955925.900765] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [955925.900765] R13: 000000000000001e R14: 000000c000502680 R15: 00000000000c805b [955925.900766] FS: 000000c000500090 GS: 0000000000000000 [955925.983251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [955925.994089] RIP: 0033:0x7fffffffe062 [955925.999254] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [955926.019611] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [955926.026448] RAX: 00000000000e2c84 RBX: 0000000000000000 RCX: 00007fffffffe05a [955926.035194] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [955926.043941] RBP: 000000c00013de38 R08: 000000c0001f2e20 R09: 0000000000000000 [955926.052673] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [955926.061411] R13: 000000000000001e R14: 000000c000502680 R15: 00000000000c805b [955926.070171] FS: 000000c000500090 GS: 0000000000000000 [955934.699328] potentially unexpected fatal signal 5. [955934.704382] CPU: 69 PID: 899791 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [955934.714836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [955934.724382] RIP: 0033:0x7fffffffe062 [955934.728209] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [955934.747265] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [955934.754079] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [955934.761541] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [955934.768915] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [955934.777674] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [955934.785043] R13: 0000000000000036 R14: 000000c0001b16c0 R15: 00000000000dab49 [955934.793803] FS: 0000000001fc7e50 GS: 0000000000000000 [955970.008196] potentially unexpected fatal signal 5. [955970.013273] CPU: 9 PID: 932982 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [955970.023726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [955970.033173] RIP: 0033:0x7fffffffe062 [955970.036974] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [955970.055968] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [955970.061444] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [955970.068800] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [955970.076166] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [955970.083543] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [955970.090910] R13: 000000000000001e R14: 000000c0001836c0 R15: 00000000000c8902 [955970.098287] FS: 000000000229acd0 GS: 0000000000000000 [956112.367282] exe[925207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb8669e839 cs:33 sp:7fbc8a9fe858 ax:0 si:55fb866f7070 di:ffffffffff600000 [957092.390375] exe[955721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561319323839 cs:33 sp:7f59ac130858 ax:0 si:56131937c062 di:ffffffffff600000 [959050.261946] potentially unexpected fatal signal 5. [959050.265776] potentially unexpected fatal signal 5. [959050.266989] CPU: 28 PID: 896670 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [959050.272091] CPU: 20 PID: 907456 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [959050.282460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [959050.282465] RIP: 0033:0x7fffffffe062 [959050.282470] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [959050.292862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [959050.292867] RIP: 0033:0x7fffffffe062 [959050.292870] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [959050.292871] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [959050.292875] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [959050.302322] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [959050.302324] RAX: 0000000000004d80 RBX: 0000000000000000 RCX: 00007fffffffe05a [959050.302327] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [959050.307515] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [959050.307516] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [959050.307516] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [959050.307517] R13: 0000000000000034 R14: 000000c0001604e0 R15: 00000000000dae7f [959050.307518] FS: 000000c000180090 GS: 0000000000000000 [959050.405018] potentially unexpected fatal signal 5. [959050.410561] RBP: 000000c00018fe38 R08: 000000c00048c2e0 R09: 0000000000000000 [959050.410562] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [959050.410563] R13: 0000000000000034 R14: 000000c0001604e0 R15: 00000000000dae7f [959050.410564] FS: 000000c000180090 GS: 0000000000000000 [959050.467556] CPU: 48 PID: 969060 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [959050.478054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [959050.487592] RIP: 0033:0x7fffffffe062 [959050.492760] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [959050.511756] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [959050.518603] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [959050.527363] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [959050.536113] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [959050.544876] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [959050.553589] R13: 0000000000000034 R14: 000000c0001604e0 R15: 00000000000dae7f [959050.560975] FS: 000000c000180090 GS: 0000000000000000 [959443.368852] exe[22257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959443.454060] exe[22522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959443.552295] exe[22321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959476.298590] exe[22391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959476.397797] exe[22307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959476.504343] exe[22487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959476.594441] exe[30117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959476.677243] exe[22461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959476.778374] exe[22321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959476.884570] exe[26407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959476.959736] exe[22260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959477.043720] exe[22328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959477.149766] exe[22391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55685abc1839 cs:33 sp:7ff6ac1fe858 ax:0 si:55685ac1a070 di:ffffffffff600000 [959537.390467] potentially unexpected fatal signal 5. [959537.395512] CPU: 58 PID: 977643 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [959537.406017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [959537.415770] RIP: 0033:0x7fffffffe062 [959537.419576] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [959537.438656] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [959537.444108] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [959537.452951] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [959537.460320] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [959537.469160] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [959537.476540] R13: 000000000000001c R14: 000000c000183380 R15: 00000000000e2f6e [959537.485288] FS: 000000000229acd0 GS: 0000000000000000 [959542.871379] potentially unexpected fatal signal 5. [959542.872728] potentially unexpected fatal signal 5. [959542.876411] CPU: 30 PID: 38981 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [959542.879553] potentially unexpected fatal signal 5. [959542.879557] CPU: 51 PID: 39093 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [959542.879558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [959542.879562] RIP: 0033:0x7fffffffe062 [959542.879565] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [959542.879566] RSP: 002b:000000c0001d7cb0 EFLAGS: 00000297 [959542.879568] RAX: 0000000000009c88 RBX: 0000000000000000 RCX: 00007fffffffe05a [959542.879569] RDX: 0000000000000000 RSI: 000000c0001d8000 RDI: 0000000000012f00 [959542.879569] RBP: 000000c0001d7d40 R08: 000000c0009a24c0 R09: 0000000000000000 [959542.879570] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0001d7bd8 [959542.879571] R13: 000000c000180000 R14: 000000c000179d40 R15: 000000000000982b [959542.879572] FS: 00007f497b7fe6c0 GS: 0000000000000000 [959542.881426] CPU: 95 PID: 39124 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [959542.881427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [959542.881431] RIP: 0033:0x7fffffffe062 [959542.881433] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [959542.881435] RSP: 002b:000000c0001d7cb0 EFLAGS: 00000297 [959542.891753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [959542.891757] RIP: 0033:0x7fffffffe062 [959542.891760] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [959542.891760] RSP: 002b:000000c0001d7cb0 EFLAGS: 00000297 [959542.891762] RAX: 0000000000009c84 RBX: 0000000000000000 RCX: 00007fffffffe05a [959542.891763] RDX: 0000000000000000 RSI: 000000c0001d8000 RDI: 0000000000012f00 [959542.891763] RBP: 000000c0001d7d40 R08: 000000c0001d8010 R09: 0000000000000000 [959542.891764] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0001d7bd8 [959542.891765] R13: 000000c000180000 R14: 000000c000179d40 R15: 000000000000982b [959542.891766] FS: 00007f497b7fe6c0 GS: 0000000000000000 [959543.143290] RAX: 0000000000009c8a RBX: 0000000000000000 RCX: 00007fffffffe05a [959543.152070] RDX: 0000000000000000 RSI: 000000c0001d8000 RDI: 0000000000012f00 [959543.160826] RBP: 000000c0001d7d40 R08: 000000c0001d94b0 R09: 0000000000000000 [959543.169613] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0001d7bd8 [959543.178385] R13: 000000c000180000 R14: 000000c000179d40 R15: 000000000000982b [959543.187142] FS: 00007f497b7fe6c0 GS: 0000000000000000 [959587.393224] potentially unexpected fatal signal 5. [959587.398274] CPU: 78 PID: 43472 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [959587.408598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [959587.418059] RIP: 0033:0x7fffffffe062 [959587.419904] potentially unexpected fatal signal 5. [959587.421848] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [959587.426851] CPU: 28 PID: 43474 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [959587.426853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [959587.426855] RIP: 0033:0x7fffffffe062 [959587.426857] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [959587.445958] RSP: 002b:000000c00043bd98 EFLAGS: 00000297 [959587.456258] RSP: 002b:000000c00043bd98 EFLAGS: 00000297 [959587.467115] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [959587.467116] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [959587.467117] RBP: 000000c00043be38 R08: 0000000000000000 R09: 0000000000000000 [959587.467117] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00043be20 [959587.467118] R13: 000000000000001c R14: 000000c00048f040 R15: 00000000000e46d8 [959587.467119] FS: 000000c00042a090 GS: 0000000000000000 [959587.547516] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [959587.554906] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [959587.563643] RBP: 000000c00043be38 R08: 0000000000000000 R09: 0000000000000000 [959587.572375] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00043be20 [959587.581114] R13: 000000000000001c R14: 000000c00048f040 R15: 00000000000e46d8 [959587.589946] FS: 000000c00042a090 GS: 0000000000000000 [959884.632521] potentially unexpected fatal signal 5. [959884.637553] CPU: 19 PID: 39287 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [959884.647877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [959884.657311] RIP: 0033:0x7fffffffe062 [959884.661093] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [959884.680083] RSP: 002b:000000c000855cb0 EFLAGS: 00000297 [959884.685563] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [959884.694331] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [959884.701713] RBP: 000000c000855d40 R08: 0000000000000000 R09: 0000000000000000 [959884.710470] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000855bd8 [959884.719255] R13: 000000c000138c00 R14: 000000c000523380 R15: 000000000000915c [959884.728000] FS: 00007fca10e886c0 GS: 0000000000000000 [960217.361564] warn_bad_vsyscall: 3 callbacks suppressed [960217.361568] exe[67572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564549ff4839 cs:33 sp:7f27842f0858 ax:0 si:56454a04d062 di:ffffffffff600000 [960217.409780] exe[69531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564549ff4839 cs:33 sp:7f27842f0858 ax:0 si:56454a04d062 di:ffffffffff600000 [960217.460916] exe[67430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564549ff4839 cs:33 sp:7f27842f0858 ax:0 si:56454a04d062 di:ffffffffff600000 [960229.969059] exe[78659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a52a5d839 cs:33 sp:7f282018d858 ax:0 si:562a52ab6062 di:ffffffffff600000 [960230.024515] exe[68116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a52a5d839 cs:33 sp:7f282018d858 ax:0 si:562a52ab6062 di:ffffffffff600000 [960230.082337] exe[67286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a52a5d839 cs:33 sp:7f282018d858 ax:0 si:562a52ab6062 di:ffffffffff600000 [960230.138159] exe[67410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a52a5d839 cs:33 sp:7f282018d858 ax:0 si:562a52ab6062 di:ffffffffff600000 [960230.200928] exe[67256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a52a5d839 cs:33 sp:7f282018d858 ax:0 si:562a52ab6062 di:ffffffffff600000 [960371.805598] exe[67572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a52a5d839 cs:33 sp:7f282018d858 ax:0 si:562a52ab6062 di:ffffffffff600000 [960371.860160] exe[85824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a52a5d839 cs:33 sp:7f282018d858 ax:0 si:562a52ab6062 di:ffffffffff600000 [960371.926201] exe[79292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a52a5d839 cs:33 sp:7f282018d858 ax:0 si:562a52ab6062 di:ffffffffff600000 [960371.928261] exe[67535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a52a5d839 cs:33 sp:7f282016c858 ax:0 si:562a52ab6062 di:ffffffffff600000 [961782.814248] exe[45481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b3771839 cs:33 sp:7ef059481ee8 ax:0 si:200000c0 di:ffffffffff600000 [961782.857358] exe[87253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b3771839 cs:33 sp:7ef059481ee8 ax:0 si:200000c0 di:ffffffffff600000 [961782.857427] exe[96982] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b3771839 cs:33 sp:7ef059460ee8 ax:0 si:200000c0 di:ffffffffff600000 [961782.931308] exe[87253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b3771839 cs:33 sp:7ef059481ee8 ax:0 si:200000c0 di:ffffffffff600000 [961782.952627] exe[87253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595b3771839 cs:33 sp:7ef059481ee8 ax:0 si:200000c0 di:ffffffffff600000 [961872.758987] exe[84585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b208a0b839 cs:33 sp:7fdb8f8eb858 ax:0 si:55b208a64070 di:ffffffffff600000 [961872.818420] exe[84576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b208a0b839 cs:33 sp:7fdb8f8eb858 ax:0 si:55b208a64070 di:ffffffffff600000 [961872.871999] exe[88096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b208a0b839 cs:33 sp:7fdb8f8ca858 ax:0 si:55b208a64070 di:ffffffffff600000 [962173.526039] exe[68116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564549ff4839 cs:33 sp:7f27842f0ee8 ax:0 si:20000080 di:ffffffffff600000 [962173.582021] exe[67236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564549ff4839 cs:33 sp:7f27842f0ee8 ax:0 si:20000080 di:ffffffffff600000 [962173.584141] exe[83103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564549ff4839 cs:33 sp:7f27842cfee8 ax:0 si:20000080 di:ffffffffff600000 [962173.659965] exe[85821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564549ff4839 cs:33 sp:7f27842f0ee8 ax:0 si:20000080 di:ffffffffff600000 [962173.683484] exe[69366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564549ff4839 cs:33 sp:7f27842aeee8 ax:0 si:20000080 di:ffffffffff600000 [962482.079782] exe[90360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a52a5d839 cs:33 sp:7f282018d858 ax:0 si:562a52ab6062 di:ffffffffff600000 [962482.135597] exe[92894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a52a5d839 cs:33 sp:7f282018d858 ax:0 si:562a52ab6062 di:ffffffffff600000 [962482.188106] exe[103889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a52a5d839 cs:33 sp:7f282018d858 ax:0 si:562a52ab6062 di:ffffffffff600000 [963148.552283] potentially unexpected fatal signal 5. [963148.552432] potentially unexpected fatal signal 5. [963148.557323] CPU: 20 PID: 63199 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [963148.562340] CPU: 56 PID: 139364 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [963148.562342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [963148.562346] RIP: 0033:0x7fffffffe062 [963148.562349] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [963148.562350] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [963148.562351] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [963148.562352] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [963148.562352] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [963148.562353] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [963148.562353] R13: 000000000000001c R14: 000000c00047c9c0 R15: 0000000000009d71 [963148.562354] FS: 000000000229acd0 GS: 0000000000000000 [963148.625237] potentially unexpected fatal signal 5. [963148.628128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [963148.635474] CPU: 68 PID: 53182 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [963148.635476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [963148.635480] RIP: 0033:0x7fffffffe062 [963148.635482] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [963148.635483] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [963148.635486] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [963148.635487] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [963148.635488] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [963148.635489] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [963148.642854] RIP: 0033:0x7fffffffe062 [963148.642857] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [963148.642858] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [963148.642859] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [963148.642860] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [963148.642860] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [963148.642861] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [963148.642862] R13: 000000000000001c R14: 000000c000672340 R15: 0000000000009d6a [963148.642863] FS: 000000c000130890 GS: 0000000000000000 [963148.835799] R13: 000000000000001c R14: 000000c000672340 R15: 0000000000009d6a [963148.843169] FS: 000000c000130890 GS: 0000000000000000 [963198.563169] potentially unexpected fatal signal 5. [963198.568231] CPU: 19 PID: 74537 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [963198.578578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [963198.588041] RIP: 0033:0x7fffffffe062 [963198.591823] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [963198.610824] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [963198.616276] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [963198.623626] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [963198.630998] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [963198.638359] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [963198.645733] R13: 000000000000001c R14: 000000c0004cd520 R15: 000000000000adda [963198.653137] FS: 000000c000130890 GS: 0000000000000000 [963198.800638] potentially unexpected fatal signal 5. [963198.802327] potentially unexpected fatal signal 5. [963198.806365] CPU: 62 PID: 110664 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [963198.806368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [963198.812774] CPU: 20 PID: 142215 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [963198.812776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [963198.812781] RIP: 0033:0x7fffffffe062 [963198.824663] RIP: 0033:0x7fffffffe062 [963198.824666] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [963198.824667] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [963198.824673] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [963198.824673] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [963198.824674] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [963198.824678] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [963198.834164] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [963198.834165] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [963198.834168] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [963198.834168] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [963198.834169] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [963198.834170] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [963198.834171] R13: 000000000000001c R14: 000000c0004cd520 R15: 000000000000adda [963198.834171] FS: 000000c000130890 GS: 0000000000000000 [963198.867004] potentially unexpected fatal signal 5. [963198.884507] R13: 000000000000001c R14: 000000c0004cd520 R15: 000000000000adda [963198.884508] FS: 000000c000130890 GS: 0000000000000000 [963199.014431] CPU: 33 PID: 44830 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [963199.024755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [963199.035578] RIP: 0033:0x7fffffffe062 [963199.040757] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [963199.059782] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [963199.066616] RAX: 0000000000022ba1 RBX: 0000000000000000 RCX: 00007fffffffe05a [963199.075356] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [963199.082729] RBP: 000000c00013de38 R08: 000000c000177000 R09: 0000000000000000 [963199.091545] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [963199.098904] R13: 000000000000003a R14: 000000c000007d40 R15: 000000000000addb [963199.107653] FS: 000000000229acd0 GS: 0000000000000000 [964183.480850] exe[131569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b4957e839 cs:33 sp:7fdc279fe858 ax:0 si:557b495d7062 di:ffffffffff600000 [964184.225420] exe[133758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b4957e839 cs:33 sp:7fdc279fe858 ax:0 si:557b495d7062 di:ffffffffff600000 [964185.111558] exe[168457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b4957e839 cs:33 sp:7fdc279bc858 ax:0 si:557b495d7062 di:ffffffffff600000 [964490.629817] exe[180145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555dc3e3839 cs:33 sp:7ed758f11858 ax:0 si:5555dc43c097 di:ffffffffff600000 [964490.682958] exe[180145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555dc3e3839 cs:33 sp:7ed758f11858 ax:0 si:5555dc43c097 di:ffffffffff600000 [964490.721546] exe[164127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555dc3e3839 cs:33 sp:7ed758ef0858 ax:0 si:5555dc43c097 di:ffffffffff600000 [964490.774943] exe[176987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5555dc3e3839 cs:33 sp:7ed758f11858 ax:0 si:5555dc43c097 di:ffffffffff600000 [965101.057929] exe[199921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55950cb76839 cs:33 sp:7eaff55f5858 ax:0 si:55950cbcf062 di:ffffffffff600000 [965101.096999] exe[199921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55950cb76839 cs:33 sp:7eaff55f5858 ax:0 si:55950cbcf062 di:ffffffffff600000 [965101.139320] exe[188749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55950cb76839 cs:33 sp:7eaff55d4858 ax:0 si:55950cbcf062 di:ffffffffff600000 [965382.635127] exe[206064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55950cb76839 cs:33 sp:7eaff55f5858 ax:0 si:55950cbcf062 di:ffffffffff600000 [965382.675678] exe[206223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55950cb76839 cs:33 sp:7eaff55f5858 ax:0 si:55950cbcf062 di:ffffffffff600000 [965382.714741] exe[206064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55950cb76839 cs:33 sp:7eaff55f5858 ax:0 si:55950cbcf062 di:ffffffffff600000 [965382.737125] exe[188748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55950cb76839 cs:33 sp:7eaff55f5858 ax:0 si:55950cbcf062 di:ffffffffff600000 [966109.242803] exe[175337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e76c7b1839 cs:33 sp:7f5e90749ee8 ax:0 si:20000480 di:ffffffffff600000 [966109.361355] exe[217269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e76c7b1839 cs:33 sp:7f5e90749ee8 ax:0 si:20000480 di:ffffffffff600000 [966109.470128] exe[148591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e76c7b1839 cs:33 sp:7f5e90728ee8 ax:0 si:20000480 di:ffffffffff600000 [966272.943840] potentially unexpected fatal signal 5. [966272.948872] CPU: 18 PID: 129837 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [966272.959305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [966272.968767] RIP: 0033:0x7fffffffe062 [966272.972565] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [966272.991562] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [966272.997036] RAX: 0000000000035c8b RBX: 0000000000000000 RCX: 00007fffffffe05a [966273.005773] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [966273.014526] RBP: 000000c00018fe38 R08: 000000c0009004c0 R09: 0000000000000000 [966273.023281] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [966273.032120] R13: 0000000000000036 R14: 000000c00016f520 R15: 000000000001fa7d [966273.039492] FS: 000000c000130890 GS: 0000000000000000 [966273.048863] potentially unexpected fatal signal 5. [966273.054031] CPU: 22 PID: 130351 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [966273.058436] potentially unexpected fatal signal 5. [966273.064450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [966273.069461] CPU: 56 PID: 130263 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [966273.080312] RIP: 0033:0x7fffffffe062 [966273.090695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [966273.090700] RIP: 0033:0x7fffffffe062 [966273.090704] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [966273.095862] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [966273.095865] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [966273.105396] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [966273.105398] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [966273.105399] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [966273.105401] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [966273.105401] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [966273.105402] R13: 0000000000000036 R14: 000000c00016f520 R15: 000000000001fa7d [966273.105406] FS: 000000c000130890 GS: 0000000000000000 [966273.110610] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [966273.217980] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [966273.226782] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [966273.235606] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [966273.244332] R13: 0000000000000036 R14: 000000c00016f520 R15: 000000000001fa7d [966273.251693] FS: 000000c000130890 GS: 0000000000000000 [966284.364285] exe[201207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563178642839 cs:33 sp:7f0c7a547858 ax:0 si:56317869b062 di:ffffffffff600000 [966284.593053] exe[207601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563178642839 cs:33 sp:7f0c7a526858 ax:0 si:56317869b062 di:ffffffffff600000 [966284.794541] exe[213617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563178642839 cs:33 sp:7f0c7a526858 ax:0 si:56317869b062 di:ffffffffff600000 [966597.210978] potentially unexpected fatal signal 5. [966597.216026] CPU: 63 PID: 216498 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [966597.226455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [966597.235905] RIP: 0033:0x7fffffffe062 [966597.239710] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [966597.258907] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [966597.264359] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [966597.271715] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [966597.279097] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [966597.287799] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [966597.296549] R13: 0000000000000036 R14: 000000c000481d40 R15: 0000000000034d2e [966597.305284] FS: 000000c000130890 GS: 0000000000000000 [966669.207901] exe[185017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55950cb76839 cs:33 sp:7eaff55f5858 ax:0 si:55950cbcf097 di:ffffffffff600000 [966669.261044] exe[181296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55950cb76839 cs:33 sp:7eaff55f5858 ax:0 si:55950cbcf097 di:ffffffffff600000 [966669.315392] exe[185033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55950cb76839 cs:33 sp:7eaff55f5858 ax:0 si:55950cbcf097 di:ffffffffff600000 [966955.672846] potentially unexpected fatal signal 5. [966955.677886] CPU: 88 PID: 244816 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [966955.688297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [966955.697744] RIP: 0033:0x7fffffffe062 [966955.701639] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [966955.720690] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [966955.726216] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [966955.733582] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 00005619d9c00000 [966955.742333] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [966955.751181] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [966955.759776] R13: 0000000000000002 R14: 000000c00051e1a0 R15: 000000000003ba53 [966955.767159] FS: 000000c000130490 GS: 0000000000000000 [966987.972743] potentially unexpected fatal signal 5. [966987.977786] CPU: 80 PID: 247896 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [966987.988205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [966987.997684] RIP: 0033:0x7fffffffe062 [966988.001534] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [966988.021951] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [966988.028790] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [966988.037541] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [966988.046296] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [966988.055054] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [966988.063798] R13: 000000000000001c R14: 000000c0004c2820 R15: 000000000003c5a6 [966988.072542] FS: 000000000229acd0 GS: 0000000000000000 [967684.367424] exe[273341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967684.414950] exe[273403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd35858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967685.188251] exe[272102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd35858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967686.296533] exe[272108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e605269839 cs:33 sp:7f7da998b858 ax:0 si:55e6052c2070 di:ffffffffff600000 [967686.352827] exe[271817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e605269839 cs:33 sp:7f7da998b858 ax:0 si:55e6052c2070 di:ffffffffff600000 [967686.401552] exe[273132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e605269839 cs:33 sp:7f7da998b858 ax:0 si:55e6052c2070 di:ffffffffff600000 [967686.444059] exe[272244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e605269839 cs:33 sp:7f7da998b858 ax:0 si:55e6052c2070 di:ffffffffff600000 [967686.489977] exe[271875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e605269839 cs:33 sp:7f7da998b858 ax:0 si:55e6052c2070 di:ffffffffff600000 [967917.052599] potentially unexpected fatal signal 5. [967917.057651] CPU: 78 PID: 306910 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [967917.068088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [967917.077604] RIP: 0033:0x7fffffffe062 [967917.081440] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [967917.100690] RSP: 002b:000000c0006c1cb0 EFLAGS: 00000297 [967917.107526] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [967917.116288] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [967917.125038] RBP: 000000c0006c1d40 R08: 0000000000000000 R09: 0000000000000000 [967917.133795] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006c1bf8 [967917.142548] R13: 0000000002a3c900 R14: 000000c0004d4680 R15: 000000000003852b [967917.151395] FS: 00000000049753c0 GS: 0000000000000000 [967931.540580] exe[271916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967931.584719] exe[271631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967931.631558] exe[272083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967938.884326] exe[276293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967938.927751] exe[271701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967938.971142] exe[272108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967939.014735] exe[272102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967939.054262] exe[273398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967939.095652] exe[272053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967939.136181] exe[272257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967939.182408] exe[272078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967939.224928] exe[272258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [967939.267621] exe[272010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598cb9f6839 cs:33 sp:7f7f9bd56858 ax:0 si:5598cba4f070 di:ffffffffff600000 [968290.048448] warn_bad_vsyscall: 2 callbacks suppressed [968290.048451] exe[278994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd134f440a cs:33 sp:7ef7680c0ee8 ax:12 si:ffffffffff600000 di:55bd13560ff2 [968290.104238] exe[289594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd134f440a cs:33 sp:7ef7680c0ee8 ax:12 si:ffffffffff600000 di:55bd13560ff2 [968290.896742] exe[275640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd134f440a cs:33 sp:7ef76809fee8 ax:12 si:ffffffffff600000 di:55bd13560ff2 [968602.721541] exe[292963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b7bf8e839 cs:33 sp:7f2339d72ee8 ax:0 si:20000680 di:ffffffffff600000 [968602.831963] exe[296069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b7bf8e839 cs:33 sp:7f2339d72ee8 ax:0 si:20000680 di:ffffffffff600000 [968603.046452] exe[277973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b7bf8e839 cs:33 sp:7f2339d72ee8 ax:0 si:20000680 di:ffffffffff600000 [969781.135810] exe[341484] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603f5392839 cs:33 sp:7f576ea3c858 ax:0 si:5603f53eb097 di:ffffffffff600000 [969781.297093] exe[352926] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603f5392839 cs:33 sp:7f576ea3c858 ax:0 si:5603f53eb097 di:ffffffffff600000 [969781.297134] exe[352843] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603f5392839 cs:33 sp:7f576ddfe858 ax:0 si:5603f53eb097 di:ffffffffff600000 [969781.461806] exe[341484] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603f5392839 cs:33 sp:7f576ddfe858 ax:0 si:5603f53eb097 di:ffffffffff600000 [970301.758513] exe[361797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffd86d7b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [970301.865021] exe[337168] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffd86d7b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [970302.216151] exe[337169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ffd86d7b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [971097.758363] potentially unexpected fatal signal 5. [971097.763397] CPU: 74 PID: 274371 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [971097.773820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [971097.783388] RIP: 0033:0x7fffffffe062 [971097.787345] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [971097.806436] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [971097.811880] RAX: 000000000005ede9 RBX: 0000000000000000 RCX: 00007fffffffe05a [971097.819437] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [971097.826802] RBP: 000000c00018fe38 R08: 000000c0005642e0 R09: 0000000000000000 [971097.834208] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [971097.841617] R13: 000000000000001c R14: 000000c0001649c0 R15: 0000000000042f43 [971097.850366] FS: 000000c000130c90 GS: 0000000000000000 [971167.977744] potentially unexpected fatal signal 5. [971167.982990] CPU: 95 PID: 393266 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [971167.993530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [971168.003117] RIP: 0033:0x7fffffffe062 [971168.006954] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [971168.026312] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [971168.033176] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [971168.041954] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [971168.050732] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [971168.059499] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [971168.068265] R13: 000000000000001c R14: 000000c00015e9c0 R15: 0000000000044652 [971168.077054] FS: 000000c00048e490 GS: 0000000000000000 [971171.409086] potentially unexpected fatal signal 5. [971171.414190] CPU: 3 PID: 287365 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [971171.424526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [971171.433993] RIP: 0033:0x7fffffffe062 [971171.437836] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [971171.458293] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [971171.465139] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [971171.473899] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [971171.482813] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [971171.491590] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [971171.500599] R13: 000000000000001c R14: 000000c0001a0340 R15: 000000000004482c [971171.509386] FS: 000000c000130890 GS: 0000000000000000 [971195.133071] exe[390965] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615a9b10b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000200 [971195.185471] exe[396272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615a9b10b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000200 [971195.249886] exe[391192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615a9b10b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80000200 [971439.886744] potentially unexpected fatal signal 5. [971439.891784] CPU: 63 PID: 319174 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [971439.902202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [971439.911663] RIP: 0033:0x7fffffffe062 [971439.915467] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [971439.934456] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [971439.939896] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [971439.947246] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [971439.954613] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [971439.962003] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [971439.969366] R13: 0000000000000034 R14: 000000c000582340 R15: 000000000004a2f3 [971439.976744] FS: 000000c000130490 GS: 0000000000000000 [972086.248291] exe[406683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972086.367929] exe[433491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972086.415822] exe[431276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972086.521020] exe[442569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972086.553967] exe[443940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972086.586771] exe[442569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972086.617339] exe[404810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972086.649665] exe[405118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972086.697755] exe[442560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972086.725940] exe[404863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972104.331296] warn_bad_vsyscall: 58 callbacks suppressed [972104.331299] exe[438648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972104.431583] exe[440936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972104.551833] exe[443930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972104.656672] exe[436770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972104.750383] exe[442890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972104.852048] exe[440923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972104.947437] exe[436145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972105.049079] exe[429188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972105.167399] exe[429085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972105.304318] exe[404863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972109.420025] warn_bad_vsyscall: 20 callbacks suppressed [972109.420028] exe[436770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972109.518539] exe[429188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972109.628063] exe[431217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972109.742189] exe[406683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972109.811487] exe[404810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c16e858 ax:0 si:558d175f8097 di:ffffffffff600000 [972109.934686] exe[433491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972110.020392] exe[404863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972110.130834] exe[429188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972110.218435] exe[436243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972110.323949] exe[439234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972114.444235] warn_bad_vsyscall: 74 callbacks suppressed [972114.444239] exe[405118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972114.446448] exe[404863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972114.598991] exe[435627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972114.684579] exe[442560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972114.714710] exe[405118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972114.742489] exe[431224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972114.772573] exe[443930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972114.800600] exe[431224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972114.830115] exe[431224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972114.858962] exe[442560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972119.479721] warn_bad_vsyscall: 83 callbacks suppressed [972119.479725] exe[429150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972119.640024] exe[429235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972119.747423] exe[440872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972119.859762] exe[439210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972119.965504] exe[436150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972120.090020] exe[440923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972120.233516] exe[440885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972120.373432] exe[440022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972120.472478] exe[431262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972120.574897] exe[441023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972124.499669] warn_bad_vsyscall: 93 callbacks suppressed [972124.499673] exe[436301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972124.606270] exe[440936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972124.713421] exe[436158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972124.837169] exe[442569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972124.893230] exe[404882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972125.029886] exe[429235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972125.134232] exe[435629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972125.233362] exe[429150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972125.567381] exe[435583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972125.724535] exe[442033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972129.514031] warn_bad_vsyscall: 80 callbacks suppressed [972129.514035] exe[435629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972129.549684] exe[429054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972129.583766] exe[443827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972129.613641] exe[443827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972129.651183] exe[435583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972129.680849] exe[435583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972129.710058] exe[435583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972129.739340] exe[443827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972129.773674] exe[443827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972129.802315] exe[443827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972134.542483] warn_bad_vsyscall: 74 callbacks suppressed [972134.542487] exe[440872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972134.654373] exe[444082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972134.762198] exe[435614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972135.431860] exe[440881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972135.532312] exe[443838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972136.343677] exe[438629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972136.437118] exe[435614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972137.220016] exe[440963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972137.314643] exe[436675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972137.417409] exe[442560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972140.004316] warn_bad_vsyscall: 6 callbacks suppressed [972140.004319] exe[404810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972140.102017] exe[439234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972140.190287] exe[441033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972140.291733] exe[440881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972140.521713] exe[404882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972140.611088] exe[404810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972140.708071] exe[436145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972140.737890] exe[436301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972140.825369] exe[441888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972140.911858] exe[435527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972145.047142] warn_bad_vsyscall: 27 callbacks suppressed [972145.047146] exe[435587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972145.838004] exe[429004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972145.880741] exe[439960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972145.972439] exe[435527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972146.722219] exe[440881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8070 di:ffffffffff600000 [972146.815464] exe[436243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8070 di:ffffffffff600000 [972146.855411] exe[441854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8070 di:ffffffffff600000 [972146.974460] exe[404887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8070 di:ffffffffff600000 [972146.986022] exe[404836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8070 di:ffffffffff600000 [972147.087464] exe[433491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972150.067565] warn_bad_vsyscall: 10 callbacks suppressed [972150.067569] exe[405118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972150.257370] exe[431262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c16e858 ax:0 si:558d175f8062 di:ffffffffff600000 [972151.088696] exe[436145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c16e858 ax:0 si:558d175f8062 di:ffffffffff600000 [972151.756505] exe[439285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972151.856655] exe[407456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c16e858 ax:0 si:558d175f8062 di:ffffffffff600000 [972152.679248] exe[439315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972152.723669] exe[439315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972155.509045] exe[442033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972156.219909] exe[440881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972156.306562] exe[442608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972157.123910] exe[442608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972157.225922] exe[442569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972158.005124] exe[441029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972158.039725] exe[443838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972158.146135] exe[442608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972158.903331] exe[439346] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972158.996145] exe[443930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972160.693093] warn_bad_vsyscall: 3 callbacks suppressed [972160.693097] exe[435587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972160.781995] exe[439258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972161.577838] exe[436150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972161.607289] exe[436150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972161.640215] exe[436150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972161.673911] exe[436150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972161.704561] exe[436150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972161.734051] exe[441854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972161.762124] exe[436158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972161.790278] exe[436158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8097 di:ffffffffff600000 [972165.892865] warn_bad_vsyscall: 92 callbacks suppressed [972165.892868] exe[439236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972166.063638] exe[436839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972166.119214] exe[435629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972166.236406] exe[436243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972166.373302] exe[440963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972166.411066] exe[435583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972166.564547] exe[439273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8062 di:ffffffffff600000 [972166.604106] exe[439234] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c18f858 ax:0 si:558d175f8062 di:ffffffffff600000 [972166.753093] exe[429054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972166.901346] exe[440894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1759f839 cs:33 sp:7f422c1b0858 ax:0 si:558d175f8097 di:ffffffffff600000 [972698.651187] warn_bad_vsyscall: 12 callbacks suppressed [972698.651190] exe[452850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d0afaa839 cs:33 sp:7f911fe80858 ax:0 si:564d0b003062 di:ffffffffff600000 [972698.738716] exe[441022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d0afaa839 cs:33 sp:7f911fe80858 ax:0 si:564d0b003062 di:ffffffffff600000 [972698.826682] exe[446026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d0afaa839 cs:33 sp:7f911fe80858 ax:0 si:564d0b003062 di:ffffffffff600000 [972744.552184] exe[353610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614a1ab8839 cs:33 sp:7ef921e84858 ax:0 si:5614a1b11070 di:ffffffffff600000 [972744.619621] exe[464880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614a1ab8839 cs:33 sp:7ef921e84858 ax:0 si:5614a1b11070 di:ffffffffff600000 [972744.648795] exe[464880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614a1ab8839 cs:33 sp:7ef921e21858 ax:0 si:5614a1b11070 di:ffffffffff600000 [972744.801425] exe[373093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614a1ab8839 cs:33 sp:7ef921e84858 ax:0 si:5614a1b11070 di:ffffffffff600000 [972746.928637] exe[464634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972746.988569] exe[464634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972747.060352] exe[464753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972747.144593] exe[464646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972747.225235] exe[352391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972747.292949] exe[464940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972749.581813] warn_bad_vsyscall: 74 callbacks suppressed [972749.581816] exe[464699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd097 di:ffffffffff600000 [972749.692627] exe[354473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd097 di:ffffffffff600000 [972749.712663] exe[349967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd097 di:ffffffffff600000 [972749.733263] exe[359960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd097 di:ffffffffff600000 [972749.758684] exe[354473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd097 di:ffffffffff600000 [972749.778857] exe[349967] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd097 di:ffffffffff600000 [972749.799679] exe[349990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd097 di:ffffffffff600000 [972749.820192] exe[349984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd097 di:ffffffffff600000 [972749.840084] exe[359960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd097 di:ffffffffff600000 [972749.860449] exe[349990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd097 di:ffffffffff600000 [972754.928229] warn_bad_vsyscall: 46 callbacks suppressed [972754.928233] exe[351359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f12858 ax:0 si:555a343dd070 di:ffffffffff600000 [972755.803769] exe[420616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972755.852690] exe[353610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972755.930203] exe[417780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972756.874289] exe[417335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972756.932345] exe[446873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972757.738059] exe[464612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972757.759263] exe[464612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972757.781459] exe[464695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972757.802443] exe[464695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972759.959206] warn_bad_vsyscall: 64 callbacks suppressed [972759.959209] exe[464697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd062 di:ffffffffff600000 [972760.012191] exe[381958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd062 di:ffffffffff600000 [972760.013419] exe[373023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd062 di:ffffffffff600000 [972760.076709] exe[379451] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd062 di:ffffffffff600000 [972760.099299] exe[379452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd062 di:ffffffffff600000 [972760.159214] exe[464630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972760.211355] exe[464634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972760.295256] exe[387125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972760.410648] exe[346618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972760.491626] exe[349980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972764.964916] warn_bad_vsyscall: 68 callbacks suppressed [972764.964919] exe[349982] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972765.057103] exe[347880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972765.077948] exe[347880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972765.144708] exe[452794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972765.225080] exe[379225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972765.249133] exe[351511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972765.303681] exe[356063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972765.428461] exe[452794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972765.503920] exe[354700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972765.530226] exe[354700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972770.569039] warn_bad_vsyscall: 114 callbacks suppressed [972770.569043] exe[352410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd097 di:ffffffffff600000 [972770.635094] exe[356423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972770.680377] exe[353609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972770.739893] exe[377382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972770.739959] exe[352410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f34858 ax:0 si:555a343dd070 di:ffffffffff600000 [972770.924496] exe[464740] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972770.970795] exe[464743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972771.020666] exe[354700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972771.103625] exe[417819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd097 di:ffffffffff600000 [972771.166433] exe[417780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd097 di:ffffffffff600000 [972775.635203] warn_bad_vsyscall: 71 callbacks suppressed [972775.635206] exe[464922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd097 di:ffffffffff600000 [972775.711447] exe[465613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd097 di:ffffffffff600000 [972775.763346] exe[465146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972775.815808] exe[374638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972775.835348] exe[355951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972775.887517] exe[355937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972775.935401] exe[372122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972775.993995] exe[372660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972776.058969] exe[354675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd070 di:ffffffffff600000 [972776.123892] exe[436307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a34384839 cs:33 sp:7edb41f55858 ax:0 si:555a343dd062 di:ffffffffff600000 [974665.324812] warn_bad_vsyscall: 30 callbacks suppressed [974665.324817] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974665.661545] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974665.715471] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974665.942068] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974666.200903] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974666.495326] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974666.948367] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974667.216714] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974667.464672] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974667.837283] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974670.547353] warn_bad_vsyscall: 12 callbacks suppressed [974670.547356] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974670.886346] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974670.907872] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974671.168570] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974671.429326] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974671.762160] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974671.797837] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974672.029265] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974672.301834] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974672.609128] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974675.577744] warn_bad_vsyscall: 11 callbacks suppressed [974675.577748] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974675.632823] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974676.002910] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974676.251541] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974676.257698] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974676.476241] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974676.729027] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974677.200139] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974677.452944] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974677.799853] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974680.632137] warn_bad_vsyscall: 11 callbacks suppressed [974680.632140] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974680.700870] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974680.905138] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974681.165111] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974681.498259] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974681.714392] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974682.072605] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974682.831857] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974683.453960] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974683.474491] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974686.440722] warn_bad_vsyscall: 7 callbacks suppressed [974686.440725] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974686.826373] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974687.078606] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974687.290160] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974687.494033] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974687.761553] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974688.228484] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974688.435841] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974688.635016] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974688.891423] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974691.522260] warn_bad_vsyscall: 9 callbacks suppressed [974691.522264] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974691.567521] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974692.201271] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974693.840460] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974694.102523] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974694.141958] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974694.176446] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974694.214565] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974694.249645] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974694.284462] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974696.588183] warn_bad_vsyscall: 31 callbacks suppressed [974696.588187] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974696.838809] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974696.889641] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974697.213824] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974697.247938] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974697.541444] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974697.834051] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974698.096711] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974698.102421] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974698.401241] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974701.639028] warn_bad_vsyscall: 8 callbacks suppressed [974701.639031] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974701.686755] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974701.954830] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974702.454842] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974702.753231] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974702.969676] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974703.398433] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974703.661150] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974703.667409] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974704.051632] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974706.646116] warn_bad_vsyscall: 70 callbacks suppressed [974706.646119] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974706.685836] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974706.718731] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974706.940116] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974707.156760] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [974707.395409] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [974707.570015] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [974707.989753] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974708.220502] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974708.435008] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974709.141531] potentially unexpected fatal signal 5. [974709.146587] CPU: 94 PID: 407152 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [974709.156993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [974709.166425] RIP: 0033:0x7fffffffe062 [974709.170246] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [974709.189555] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [974709.194989] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [974709.203734] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [974709.211119] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [974709.219852] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [974709.228587] R13: 0000000000000024 R14: 000000c00069c9c0 R15: 000000000005f20f [974709.235967] FS: 000000000229acd0 GS: 0000000000000000 [974709.323870] potentially unexpected fatal signal 5. [974709.329010] CPU: 7 PID: 466990 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [974709.339335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [974709.350159] RIP: 0033:0x7fffffffe062 [974709.355326] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [974709.375732] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [974709.382546] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [974709.391276] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [974709.400001] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [974709.407351] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [974709.414698] R13: 0000000000000024 R14: 000000c00069c9c0 R15: 000000000005f20f [974709.422039] FS: 000000000229acd0 GS: 0000000000000000 [974709.599100] potentially unexpected fatal signal 5. [974709.604106] CPU: 63 PID: 404599 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [974709.614524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [974709.623977] RIP: 0033:0x7fffffffe062 [974709.627758] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [974709.646742] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [974709.652184] RAX: 0000000000079c89 RBX: 0000000000000000 RCX: 00007fffffffe05a [974709.659524] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [974709.666910] RBP: 000000c00018fe38 R08: 000000c000fa7870 R09: 0000000000000000 [974709.674345] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [974709.681701] R13: 0000000000000024 R14: 000000c00069c9c0 R15: 000000000005f20f [974709.689297] FS: 000000000229acd0 GS: 0000000000000000 [974712.492716] warn_bad_vsyscall: 4 callbacks suppressed [974712.492718] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974712.845473] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974713.059019] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974714.572139] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974724.806991] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974734.982298] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974745.280644] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974745.525572] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974745.770278] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974746.183307] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974746.440766] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974746.629896] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974746.680460] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974747.013271] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974747.324929] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974747.519758] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974750.287467] warn_bad_vsyscall: 8 callbacks suppressed [974750.287471] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974750.340582] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974750.588386] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974750.596660] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974750.870978] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974751.270877] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974751.319178] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974751.620040] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974752.043001] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974752.465327] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974755.307964] warn_bad_vsyscall: 38 callbacks suppressed [974755.307967] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974755.652956] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974755.953613] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974756.002415] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974756.296925] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974756.557615] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974756.778944] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974757.117283] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [974757.385203] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [974757.608336] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [974760.314343] warn_bad_vsyscall: 68 callbacks suppressed [974760.314347] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974760.567672] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974760.718203] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974760.919139] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974761.682313] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974761.983845] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974762.183416] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974762.190234] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974762.440105] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974762.684255] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974765.501226] warn_bad_vsyscall: 12 callbacks suppressed [974765.501229] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974765.933316] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974766.221870] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974766.629983] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974766.907786] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974766.953658] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974767.214168] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974767.233736] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974767.467090] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974767.698793] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974770.516723] warn_bad_vsyscall: 24 callbacks suppressed [974770.516727] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974770.554172] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974770.587954] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974770.621013] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974770.654488] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974770.688927] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974770.722756] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974770.757646] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974770.791258] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974770.835263] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974775.671340] warn_bad_vsyscall: 83 callbacks suppressed [974775.671343] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974776.124388] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974776.348247] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974776.389953] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974776.436899] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974776.485523] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974776.520898] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974776.564404] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974776.602223] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974776.644475] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974780.694615] warn_bad_vsyscall: 37 callbacks suppressed [974780.694619] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974780.949143] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974780.990227] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974781.216839] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974781.491088] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974781.811739] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974782.264395] potentially unexpected fatal signal 5. [974782.269444] CPU: 10 PID: 395823 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [974782.279895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [974782.289401] RIP: 0033:0x7fffffffe062 [974782.293228] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [974782.312286] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [974782.319108] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [974782.327855] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [974782.336624] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [974782.345368] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [974782.354122] R13: 0000000000000024 R14: 000000c0001a2ea0 R15: 000000000006052d [974782.362863] FS: 000000c000180090 GS: 0000000000000000 [974782.415838] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974783.328843] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974783.548596] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974783.758960] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974785.872880] warn_bad_vsyscall: 9 callbacks suppressed [974785.872884] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974786.157712] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974786.196953] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974786.548642] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974786.803574] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974787.031506] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974787.072248] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974787.905841] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974788.113908] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974788.294361] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974791.396934] warn_bad_vsyscall: 39 callbacks suppressed [974791.396937] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974791.457099] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974791.664502] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974791.723505] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974791.999494] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974792.306261] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974792.376861] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974792.723176] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974792.764169] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974793.195443] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974796.557487] warn_bad_vsyscall: 11 callbacks suppressed [974796.557491] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974796.569568] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [974971.416731] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974971.832107] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [974972.255667] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975035.718172] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975035.932130] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975036.115010] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975036.149403] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975091.111191] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975091.511009] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975091.713374] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975145.269033] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975145.759861] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975149.702246] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975149.883035] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975150.053302] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975200.451947] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975200.677168] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975200.714144] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975200.863138] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975200.897636] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975239.643966] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975239.851028] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975240.028422] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975240.164254] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975351.857360] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975352.193887] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975352.403805] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975379.677430] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975405.883507] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975406.169275] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975406.480616] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975406.528934] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975439.187598] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975439.424721] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975439.624609] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975439.662672] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975507.353986] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975507.594331] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975507.601442] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975507.904728] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975520.253272] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975520.471164] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975520.684880] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975540.508652] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975540.838649] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975541.013613] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975599.800784] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975599.990653] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975600.153450] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975600.159438] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975602.232657] exe[503517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d9752440a cs:33 sp:7eaa59c37ee8 ax:12 si:ffffffffff600000 di:555d97590ff2 [975602.291667] exe[503517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d9752440a cs:33 sp:7eaa59c37ee8 ax:12 si:ffffffffff600000 di:555d97590ff2 [975602.348712] exe[503516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d9752440a cs:33 sp:7eaa59c37ee8 ax:12 si:ffffffffff600000 di:555d97590ff2 [975644.652887] potentially unexpected fatal signal 5. [975644.657992] CPU: 26 PID: 454225 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [975644.668429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [975644.677912] RIP: 0033:0x7fffffffe062 [975644.681693] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [975644.700878] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [975644.706382] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [975644.715139] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [975644.722519] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [975644.731367] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [975644.738763] R13: 0000000000000034 R14: 000000c000469520 R15: 000000000006d9a6 [975644.746232] FS: 000000c000180090 GS: 0000000000000000 [975647.828002] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975648.052605] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975648.059886] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975648.264875] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975674.552700] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975674.768546] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975674.976792] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975689.998453] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975690.274226] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975690.530171] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975704.794947] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975705.021290] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975705.220071] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975718.360103] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975718.792795] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975719.041247] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975771.777342] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975772.124765] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975772.201867] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975772.518723] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975776.042293] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975776.277653] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975776.429373] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975776.468756] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975787.930393] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975788.184393] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975788.362602] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975833.334220] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975833.573708] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975833.612168] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975833.826878] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [975957.379237] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [975957.626088] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [975957.810867] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [975984.531703] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975984.739237] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975984.964743] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975985.034697] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748097 di:ffffffffff600000 [975996.251370] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [975996.587068] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748070 di:ffffffffff600000 [975996.810586] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748070 di:ffffffffff600000 [976016.517109] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976016.801383] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976017.099945] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976119.701146] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [976119.890376] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [976119.936110] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [976120.107268] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [976120.149380] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [976128.445246] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976128.674658] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976128.884949] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976152.270282] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976152.495565] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976152.682996] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976152.727251] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976181.880780] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976182.182178] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976182.382301] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976206.430409] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976206.719235] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976206.938842] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976207.090205] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976319.482340] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976319.768605] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976319.985649] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976327.201323] exe[548444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613cf4d7b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000 [976327.245050] exe[542888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613cf4d7b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000 [976328.030578] exe[544571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613cf4d7b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000 [976367.283315] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976367.572967] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976367.610760] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976367.806595] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976367.845501] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976367.879320] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976367.910288] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976367.948787] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976367.980571] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976368.016685] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976429.556325] warn_bad_vsyscall: 26 callbacks suppressed [976429.556329] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [976429.925238] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [976429.962091] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [976430.005933] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [976430.173341] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [976430.231261] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [976441.330300] exe[557105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c97f440a cs:33 sp:7f7c75172ee8 ax:12 si:ffffffffff600000 di:55d9c9860ff2 [976441.473791] exe[528925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c97f440a cs:33 sp:7f7c75151ee8 ax:12 si:ffffffffff600000 di:55d9c9860ff2 [976441.510863] exe[558721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c97f440a cs:33 sp:7f7c75151ee8 ax:12 si:ffffffffff600000 di:55d9c9860ff2 [976441.544413] exe[558721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c97f440a cs:33 sp:7f7c75151ee8 ax:12 si:ffffffffff600000 di:55d9c9860ff2 [976441.582179] exe[551241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c97f440a cs:33 sp:7f7c75151ee8 ax:12 si:ffffffffff600000 di:55d9c9860ff2 [976441.615648] exe[551242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c97f440a cs:33 sp:7f7c75151ee8 ax:12 si:ffffffffff600000 di:55d9c9860ff2 [976441.644649] exe[551242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c97f440a cs:33 sp:7f7c75151ee8 ax:12 si:ffffffffff600000 di:55d9c9860ff2 [976441.678378] exe[551242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c97f440a cs:33 sp:7f7c75151ee8 ax:12 si:ffffffffff600000 di:55d9c9860ff2 [976441.708180] exe[551242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c97f440a cs:33 sp:7f7c75151ee8 ax:12 si:ffffffffff600000 di:55d9c9860ff2 [976441.738094] exe[551242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9c97f440a cs:33 sp:7f7c75151ee8 ax:12 si:ffffffffff600000 di:55d9c9860ff2 [976451.605820] warn_bad_vsyscall: 43 callbacks suppressed [976451.605823] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [976452.013324] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [976452.082392] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748070 di:ffffffffff600000 [976452.315631] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [976504.675080] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976505.134143] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976505.363066] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976505.398303] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976505.436922] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976505.474026] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976505.507755] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976505.541975] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976505.577032] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976505.612514] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976587.984529] warn_bad_vsyscall: 3 callbacks suppressed [976587.984533] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976588.370510] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976588.587741] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976640.795397] exe[548065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b2f76e839 cs:33 sp:7ec652427858 ax:0 si:559b2f7c7097 di:ffffffffff600000 [976640.896901] exe[548065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b2f76e839 cs:33 sp:7ec652427858 ax:0 si:559b2f7c7097 di:ffffffffff600000 [976640.950706] exe[548066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b2f76e839 cs:33 sp:7ec652427858 ax:0 si:559b2f7c7097 di:ffffffffff600000 [976690.285396] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976690.519727] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976690.564921] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976690.781358] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976691.833837] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976692.079583] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976692.283359] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976692.326728] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976717.802999] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976718.201508] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976718.239447] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976718.277083] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976718.312496] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976718.349019] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976718.382554] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976718.417033] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976718.449218] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976718.484679] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976754.254113] warn_bad_vsyscall: 57 callbacks suppressed [976754.254116] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976754.501732] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976754.678932] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976767.723780] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976767.962067] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [976768.166930] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977024.110462] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [977024.642623] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [977024.829463] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [977024.885186] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [977328.021259] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977328.247860] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977328.557663] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977328.604863] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977329.500651] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977330.397634] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977330.780277] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977330.823621] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977330.861301] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977376.541938] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977376.931612] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977376.983375] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977377.190808] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977377.243282] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977477.280573] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977477.584932] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977477.793766] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977546.912553] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977547.258784] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977547.472028] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977567.824313] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977568.112305] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977568.294913] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977568.341793] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977592.687277] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [977592.982790] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [977593.207752] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [977593.249281] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748070 di:ffffffffff600000 [977639.252875] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977639.460711] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977639.678541] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977643.065056] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977643.412353] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977643.613908] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977654.197242] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977654.546435] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977654.582773] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977654.826262] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977905.543878] exe[509869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564387124839 cs:33 sp:7f3622a3e858 ax:0 si:56438717d070 di:ffffffffff600000 [977905.652918] exe[511008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564387124839 cs:33 sp:7f3622a3e858 ax:0 si:56438717d070 di:ffffffffff600000 [977905.688123] exe[510968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564387124839 cs:33 sp:7f3622a3e858 ax:0 si:56438717d070 di:ffffffffff600000 [977905.842754] exe[571167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564387124839 cs:33 sp:7f3622a3e858 ax:0 si:56438717d070 di:ffffffffff600000 [977905.894849] exe[571167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564387124839 cs:33 sp:7f36225fe858 ax:0 si:56438717d070 di:ffffffffff600000 [977910.609413] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977910.918573] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977911.130974] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977911.173790] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977933.885224] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977934.279440] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977934.509557] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977977.131638] exe[595556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556383b30839 cs:33 sp:7ee28f268858 ax:0 si:556383b89062 di:ffffffffff600000 [977977.315711] exe[595623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556383b30839 cs:33 sp:7ee28f268858 ax:0 si:556383b89062 di:ffffffffff600000 [977977.350366] exe[595623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556383b30839 cs:33 sp:7ee28f268858 ax:0 si:556383b89062 di:ffffffffff600000 [977977.381149] exe[595621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556383b30839 cs:33 sp:7ee28f268858 ax:0 si:556383b89062 di:ffffffffff600000 [977977.412015] exe[595623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556383b30839 cs:33 sp:7ee28f268858 ax:0 si:556383b89062 di:ffffffffff600000 [977977.440376] exe[595601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556383b30839 cs:33 sp:7ee28f268858 ax:0 si:556383b89062 di:ffffffffff600000 [977977.468559] exe[595601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556383b30839 cs:33 sp:7ee28f268858 ax:0 si:556383b89062 di:ffffffffff600000 [977977.497289] exe[595623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556383b30839 cs:33 sp:7ee28f268858 ax:0 si:556383b89062 di:ffffffffff600000 [977977.526551] exe[595601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556383b30839 cs:33 sp:7ee28f268858 ax:0 si:556383b89062 di:ffffffffff600000 [977977.554682] exe[595621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556383b30839 cs:33 sp:7ee28f268858 ax:0 si:556383b89062 di:ffffffffff600000 [977995.991327] warn_bad_vsyscall: 50 callbacks suppressed [977995.991331] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977996.255552] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [977996.490744] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978098.211826] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978098.432915] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978098.660561] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978128.030583] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978128.590185] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978128.644858] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978128.901002] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978138.114335] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978138.337600] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978138.517957] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978321.241151] potentially unexpected fatal signal 5. [978321.246189] CPU: 48 PID: 529455 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [978321.256610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [978321.266077] RIP: 0033:0x7fffffffe062 [978321.269944] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [978321.289205] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [978321.294642] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [978321.301993] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [978321.309453] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [978321.316839] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [978321.324211] R13: 000000000000001c R14: 000000c000460680 R15: 0000000000079f85 [978321.331666] FS: 000000c000130c90 GS: 0000000000000000 [978321.830735] potentially unexpected fatal signal 5. [978321.835765] CPU: 20 PID: 553326 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [978321.846248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [978321.855722] RIP: 0033:0x7fffffffe062 [978321.859535] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [978321.878530] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [978321.883984] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [978321.891351] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [978321.898707] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [978321.906080] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [978321.913474] R13: 000000000000001c R14: 000000c000460680 R15: 0000000000079f85 [978321.920936] FS: 000000c000130c90 GS: 0000000000000000 [978322.352787] potentially unexpected fatal signal 5. [978322.357829] CPU: 82 PID: 610375 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [978322.368233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [978322.377673] RIP: 0033:0x7fffffffe062 [978322.381461] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [978322.400474] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [978322.405950] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [978322.413312] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [978322.420827] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [978322.429570] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [978322.436911] R13: 000000000000001c R14: 000000c00047c820 R15: 0000000000079f7c [978322.444268] FS: 000000000229acd0 GS: 0000000000000000 [978362.673924] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [978363.031097] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [978363.078697] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [978363.265478] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [978363.310842] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [978393.939261] potentially unexpected fatal signal 5. [978393.944322] CPU: 15 PID: 613648 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [978393.954752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [978393.964214] RIP: 0033:0x7fffffffe062 [978393.968068] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [978393.987359] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [978393.992803] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [978394.000173] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [978394.007547] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [978394.014929] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [978394.022288] R13: 000000000000001c R14: 000000c0004669c0 R15: 000000000007b136 [978394.029735] FS: 000000c000506090 GS: 0000000000000000 [978394.291223] potentially unexpected fatal signal 5. [978394.296303] CPU: 43 PID: 504588 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [978394.306721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [978394.316175] RIP: 0033:0x7fffffffe062 [978394.319971] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [978394.338998] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [978394.344457] RAX: 0000000000095d14 RBX: 0000000000000000 RCX: 00007fffffffe05a [978394.351810] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [978394.360630] RBP: 000000c00013de38 R08: 000000c0004de790 R09: 0000000000000000 [978394.367981] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [978394.375362] R13: 000000000000001c R14: 000000c0005ce1a0 R15: 000000000007b128 [978394.382721] FS: 000000000229acd0 GS: 0000000000000000 [978462.759630] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978462.995583] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978463.167192] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978463.203791] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978463.244712] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978463.278817] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978463.313672] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978463.348249] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978463.382215] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978463.418053] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978475.902636] warn_bad_vsyscall: 25 callbacks suppressed [978475.902639] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978476.162026] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978476.162327] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978476.404803] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e37f858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978548.592587] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978548.980702] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978549.155282] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978620.020905] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [978620.396376] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [978620.611840] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748070 di:ffffffffff600000 [978642.524600] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978643.016100] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978643.257996] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978661.318325] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978661.565340] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978661.598909] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978661.789254] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978750.109656] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978750.659695] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978750.853080] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978855.032989] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978855.224944] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978855.387224] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978865.622129] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978865.844318] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978865.877741] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978866.092275] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978866.128238] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978883.126348] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978883.499837] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978883.554308] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [978883.787467] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [979056.987342] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [979057.188198] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [979057.387763] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [979098.154161] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [979098.459274] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748097 di:ffffffffff600000 [979098.705961] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [979098.742509] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [979098.779815] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [979098.814743] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [979098.851821] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [979099.018238] exe[321067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [979099.054346] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [979099.088965] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748097 di:ffffffffff600000 [979117.346917] warn_bad_vsyscall: 25 callbacks suppressed [979117.346920] exe[321061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [979117.576275] exe[326470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [979117.614612] exe[321059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3a0858 ax:0 si:55ad8d748062 di:ffffffffff600000 [979117.828047] exe[369557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad8d6ef839 cs:33 sp:7ee52e3c1858 ax:0 si:55ad8d748062 di:ffffffffff600000 [979339.609829] exe[579419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ab4f3d839 cs:33 sp:7ed41d3f0858 ax:0 si:563ab4f96097 di:ffffffffff600000 [979339.705181] exe[576486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ab4f3d839 cs:33 sp:7ed41d3f0858 ax:0 si:563ab4f96097 di:ffffffffff600000 [979339.780000] exe[579179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ab4f3d839 cs:33 sp:7ed41d3f0858 ax:0 si:563ab4f96097 di:ffffffffff600000 [981025.439026] exe[597320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d5836d839 cs:33 sp:7f9c18160ee8 ax:0 si:200000c0 di:ffffffffff600000 [981025.508782] exe[624431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d5836d839 cs:33 sp:7f9c1813fee8 ax:0 si:200000c0 di:ffffffffff600000 [981025.583010] exe[597708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d5836d839 cs:33 sp:7f9c18160ee8 ax:0 si:200000c0 di:ffffffffff600000 [981025.586504] exe[597292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d5836d839 cs:33 sp:7f9c1813fee8 ax:0 si:200000c0 di:ffffffffff600000 [981582.643711] exe[597341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c6afdc40a cs:33 sp:7f1e2e9a3ee8 ax:12 si:ffffffffff600000 di:559c6b048ff2 [981582.769760] exe[597404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c6afdc40a cs:33 sp:7f1e2e9a3ee8 ax:12 si:ffffffffff600000 di:559c6b048ff2 [981582.862891] exe[696120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c6afdc40a cs:33 sp:7f1e2e9a3ee8 ax:12 si:ffffffffff600000 di:559c6b048ff2 [981582.907150] exe[597342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c6afdc40a cs:33 sp:7f1e2e9a3ee8 ax:12 si:ffffffffff600000 di:559c6b048ff2 [982053.470457] potentially unexpected fatal signal 5. [982053.475502] CPU: 55 PID: 721215 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [982053.486030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [982053.495566] RIP: 0033:0x7fffffffe062 [982053.499378] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [982053.518405] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [982053.525308] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [982053.532671] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [982053.540044] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [982053.548789] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [982053.557594] R13: 0000000000000036 R14: 000000c000519d40 R15: 00000000000978e6 [982053.566347] FS: 000000c000130490 GS: 0000000000000000 [982624.504696] exe[728867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e46ea42839 cs:33 sp:7fc7f8841858 ax:0 si:55e46ea9b070 di:ffffffffff600000 [982624.548639] exe[728820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e46ea42839 cs:33 sp:7fc7f8820858 ax:0 si:55e46ea9b070 di:ffffffffff600000 [982624.589972] exe[728706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e46ea42839 cs:33 sp:7fc7f8841858 ax:0 si:55e46ea9b070 di:ffffffffff600000 [982624.612567] exe[728489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e46ea42839 cs:33 sp:7fc7f8841858 ax:0 si:55e46ea9b070 di:ffffffffff600000 [983013.686136] exe[736319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcfa5f40a cs:33 sp:7efec001fee8 ax:12 si:ffffffffff600000 di:55dfcfacbff2 [983013.810112] exe[738742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcfa5f40a cs:33 sp:7efec001fee8 ax:12 si:ffffffffff600000 di:55dfcfacbff2 [983013.840447] exe[738742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcfa5f40a cs:33 sp:7efec001fee8 ax:12 si:ffffffffff600000 di:55dfcfacbff2 [983013.865877] exe[738742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcfa5f40a cs:33 sp:7efec001fee8 ax:12 si:ffffffffff600000 di:55dfcfacbff2 [983013.888377] exe[738742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcfa5f40a cs:33 sp:7efec001fee8 ax:12 si:ffffffffff600000 di:55dfcfacbff2 [983013.910131] exe[738742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcfa5f40a cs:33 sp:7efec001fee8 ax:12 si:ffffffffff600000 di:55dfcfacbff2 [983013.930679] exe[738742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcfa5f40a cs:33 sp:7efec001fee8 ax:12 si:ffffffffff600000 di:55dfcfacbff2 [983013.952418] exe[738742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcfa5f40a cs:33 sp:7efec001fee8 ax:12 si:ffffffffff600000 di:55dfcfacbff2 [983013.973722] exe[738742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcfa5f40a cs:33 sp:7efec001fee8 ax:12 si:ffffffffff600000 di:55dfcfacbff2 [983013.994527] exe[738742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcfa5f40a cs:33 sp:7efec001fee8 ax:12 si:ffffffffff600000 di:55dfcfacbff2 [983364.923873] warn_bad_vsyscall: 25 callbacks suppressed [983364.923885] exe[734217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88610f40a cs:33 sp:7f7c0988dee8 ax:12 si:ffffffffff600000 di:55c88617bff2 [983365.003149] exe[733466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88610f40a cs:33 sp:7f7c0988dee8 ax:12 si:ffffffffff600000 di:55c88617bff2 [983365.035813] exe[733477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88610f40a cs:33 sp:7f7c0988dee8 ax:12 si:ffffffffff600000 di:55c88617bff2 [983365.098374] exe[732199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88610f40a cs:33 sp:7f7c0982aee8 ax:12 si:ffffffffff600000 di:55c88617bff2 [983365.119582] exe[732199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88610f40a cs:33 sp:7f7c0982aee8 ax:12 si:ffffffffff600000 di:55c88617bff2 [983365.140608] exe[732199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88610f40a cs:33 sp:7f7c0982aee8 ax:12 si:ffffffffff600000 di:55c88617bff2 [983365.165495] exe[732199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88610f40a cs:33 sp:7f7c0982aee8 ax:12 si:ffffffffff600000 di:55c88617bff2 [983365.185943] exe[732199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88610f40a cs:33 sp:7f7c0982aee8 ax:12 si:ffffffffff600000 di:55c88617bff2 [983365.206571] exe[732199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88610f40a cs:33 sp:7f7c0982aee8 ax:12 si:ffffffffff600000 di:55c88617bff2 [983365.227528] exe[732199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88610f40a cs:33 sp:7f7c0982aee8 ax:12 si:ffffffffff600000 di:55c88617bff2 [985615.741977] potentially unexpected fatal signal 5. [985615.747027] CPU: 75 PID: 794227 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [985615.757450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [985615.766929] RIP: 0033:0x7fffffffe062 [985615.770749] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [985615.789754] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [985615.796594] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [985615.803970] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [985615.812715] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [985615.821498] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [985615.830260] R13: 000000000000001c R14: 000000c00047e9c0 R15: 00000000000aee2f [985615.839081] FS: 000000c000130890 GS: 0000000000000000 [987186.221807] warn_bad_vsyscall: 58 callbacks suppressed [987186.221810] exe[838187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3a6965839 cs:33 sp:7fa89087d858 ax:0 si:55c3a69be062 di:ffffffffff600000 [987186.828849] exe[837851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3a6965839 cs:33 sp:7fa89087d858 ax:0 si:55c3a69be062 di:ffffffffff600000 [987186.968904] exe[784963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3a6965839 cs:33 sp:7fa89087d858 ax:0 si:55c3a69be062 di:ffffffffff600000 [987258.954010] exe[833503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f677849839 cs:33 sp:7ea0ffbc7858 ax:0 si:55f6778a2062 di:ffffffffff600000 [987259.013083] exe[828973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f677849839 cs:33 sp:7ea0ffbc7858 ax:0 si:55f6778a2062 di:ffffffffff600000 [987259.066349] exe[833311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f677849839 cs:33 sp:7ea0ffbc7858 ax:0 si:55f6778a2062 di:ffffffffff600000 [987505.590002] exe[799823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55835d42d839 cs:33 sp:7f2715b57858 ax:0 si:55835d486097 di:ffffffffff600000 [987505.661309] exe[799828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55835d42d839 cs:33 sp:7f2715b57858 ax:0 si:55835d486097 di:ffffffffff600000 [987505.784591] exe[800094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55835d42d839 cs:33 sp:7f2715b57858 ax:0 si:55835d486097 di:ffffffffff600000 [987506.045589] exe[822558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987506.146601] exe[827628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987506.219304] exe[799827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987506.336841] exe[825002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987506.404412] exe[824629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987506.467369] exe[822818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987506.537321] exe[800091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987510.595693] warn_bad_vsyscall: 60 callbacks suppressed [987510.595696] exe[834119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987510.659386] exe[804318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987510.714785] exe[800094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987510.778519] exe[827692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53070 di:ffffffffff600000 [987510.829933] exe[804167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53070 di:ffffffffff600000 [987510.899450] exe[799988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53070 di:ffffffffff600000 [987510.971621] exe[824950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987511.034399] exe[827638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631455858 ax:0 si:557015a53097 di:ffffffffff600000 [987511.100460] exe[822558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987511.158277] exe[802764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987515.599170] warn_bad_vsyscall: 169 callbacks suppressed [987515.599174] exe[827631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53062 di:ffffffffff600000 [987515.624855] exe[827631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53062 di:ffffffffff600000 [987515.648553] exe[827631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53062 di:ffffffffff600000 [987515.670439] exe[827631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53062 di:ffffffffff600000 [987515.690144] exe[827631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53062 di:ffffffffff600000 [987515.711365] exe[827631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53062 di:ffffffffff600000 [987515.734567] exe[827631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53062 di:ffffffffff600000 [987515.754869] exe[827631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53062 di:ffffffffff600000 [987515.775761] exe[827631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53062 di:ffffffffff600000 [987515.796190] exe[827631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53062 di:ffffffffff600000 [987520.794710] warn_bad_vsyscall: 103 callbacks suppressed [987520.794713] exe[824627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987520.828770] exe[824629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987521.236742] exe[799950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987521.295679] exe[802686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987522.121147] exe[802796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987522.210722] exe[802764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987522.244866] exe[800066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631476858 ax:0 si:557015a53062 di:ffffffffff600000 [987522.993846] exe[804170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987523.045938] exe[799891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987523.846554] exe[804476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987526.005305] warn_bad_vsyscall: 8 callbacks suppressed [987526.005308] exe[802212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987526.074438] exe[802386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987526.862756] exe[824627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987526.952475] exe[822818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987527.317171] exe[818547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987527.369439] exe[824950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987527.422960] exe[827743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987527.481462] exe[799939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987527.530799] exe[799891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987528.367497] exe[804170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987531.677329] warn_bad_vsyscall: 9 callbacks suppressed [987531.677333] exe[799891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987531.749780] exe[802764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987532.533368] exe[804184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987533.432518] exe[804318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987533.894300] exe[804170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987533.894477] exe[804167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53097 di:ffffffffff600000 [987534.774057] exe[824629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53097 di:ffffffffff600000 [987534.794317] exe[827692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53097 di:ffffffffff600000 [987534.821887] exe[827692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53097 di:ffffffffff600000 [987534.842229] exe[827692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53097 di:ffffffffff600000 [987536.882444] warn_bad_vsyscall: 44 callbacks suppressed [987536.882447] exe[818363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987536.938766] exe[799891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987536.961546] exe[802213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987537.012530] exe[824629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987537.038859] exe[824629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987537.093322] exe[824944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987537.887465] exe[806402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987537.976879] exe[799827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987537.999192] exe[822818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987538.755647] exe[818328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987541.894717] warn_bad_vsyscall: 144 callbacks suppressed [987541.894720] exe[807135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987542.686894] exe[822562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987542.738059] exe[807135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987543.141412] exe[818363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987543.192659] exe[799772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987543.218373] exe[799787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987544.001905] exe[804162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53097 di:ffffffffff600000 [987544.002112] exe[804318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987544.074512] exe[804176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987544.877271] exe[822608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987547.135205] warn_bad_vsyscall: 1 callbacks suppressed [987547.135208] exe[804476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987547.213308] exe[800167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53097 di:ffffffffff600000 [987547.271791] exe[824629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53097 di:ffffffffff600000 [987548.981633] exe[800167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987549.208660] exe[814316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987549.265560] exe[815326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53062 di:ffffffffff600000 [987550.079825] exe[804293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987550.158209] exe[818127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987550.950361] exe[824956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987550.950564] exe[827790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53097 di:ffffffffff600000 [987552.254065] warn_bad_vsyscall: 8 callbacks suppressed [987552.254069] exe[799773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987552.282277] exe[818323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53062 di:ffffffffff600000 [987553.106907] exe[827790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987553.158831] exe[833371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987553.973794] exe[799772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987554.012399] exe[799772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53097 di:ffffffffff600000 [987554.895950] exe[824629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987555.001876] exe[800172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53097 di:ffffffffff600000 [987555.292668] exe[804176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987555.369323] exe[799886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987557.866273] warn_bad_vsyscall: 4 callbacks suppressed [987557.866277] exe[824948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987557.926687] exe[799823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987558.336240] exe[800056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631455858 ax:0 si:557015a53062 di:ffffffffff600000 [987558.411473] exe[824628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987559.194159] exe[814316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987559.239698] exe[824950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f0631497858 ax:0 si:557015a53097 di:ffffffffff600000 [987560.060293] exe[799773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53097 di:ffffffffff600000 [987560.906230] exe[804854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987560.957091] exe[800066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [987561.040674] exe[825002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570159fa839 cs:33 sp:7f06314b8858 ax:0 si:557015a53062 di:ffffffffff600000 [988437.454868] warn_bad_vsyscall: 4 callbacks suppressed [988437.454872] exe[858748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e3ac8c839 cs:33 sp:7f24f0c3cee8 ax:0 si:200056c0 di:ffffffffff600000 [988437.596603] exe[859434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e3ac8c839 cs:33 sp:7f24f0c3cee8 ax:0 si:200056c0 di:ffffffffff600000 [988437.874939] exe[840229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e3ac8c839 cs:33 sp:7f24f07feee8 ax:0 si:200056c0 di:ffffffffff600000 [989073.747512] exe[871868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592d429f839 cs:33 sp:7eae60b3c858 ax:0 si:5592d42f8062 di:ffffffffff600000 [989073.992900] exe[871634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592d429f839 cs:33 sp:7eae60b1b858 ax:0 si:5592d42f8062 di:ffffffffff600000 [989074.023793] exe[871635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592d429f839 cs:33 sp:7eae60b1b858 ax:0 si:5592d42f8062 di:ffffffffff600000 [989074.061481] exe[871868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592d429f839 cs:33 sp:7eae60b1b858 ax:0 si:5592d42f8062 di:ffffffffff600000 [989074.099114] exe[871634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592d429f839 cs:33 sp:7eae60b1b858 ax:0 si:5592d42f8062 di:ffffffffff600000 [989074.134537] exe[874613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592d429f839 cs:33 sp:7eae60b1b858 ax:0 si:5592d42f8062 di:ffffffffff600000 [989074.167593] exe[872797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592d429f839 cs:33 sp:7eae60b1b858 ax:0 si:5592d42f8062 di:ffffffffff600000 [989074.204153] exe[871635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592d429f839 cs:33 sp:7eae60b1b858 ax:0 si:5592d42f8062 di:ffffffffff600000 [989074.240290] exe[871634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592d429f839 cs:33 sp:7eae60b1b858 ax:0 si:5592d42f8062 di:ffffffffff600000 [989074.275495] exe[871634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592d429f839 cs:33 sp:7eae60b1b858 ax:0 si:5592d42f8062 di:ffffffffff600000 [989224.716820] potentially unexpected fatal signal 5. [989224.721880] CPU: 74 PID: 831307 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [989224.732307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [989224.741814] RIP: 0033:0x7fffffffe062 [989224.745645] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [989224.764641] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [989224.770106] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [989224.777473] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [989224.784944] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [989224.792302] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [989224.799673] R13: 000000000000001e R14: 000000c000581040 R15: 00000000000c2140 [989224.807118] FS: 000000000229acd0 GS: 0000000000000000 [989273.900986] potentially unexpected fatal signal 5. [989273.906044] CPU: 61 PID: 800414 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [989273.916458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [989273.925937] RIP: 0033:0x7fffffffe062 [989273.929783] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [989273.950170] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [989273.957007] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [989273.965770] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [989273.973271] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [989273.982001] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [989273.990753] R13: 0000000000000014 R14: 000000c000476b60 R15: 00000000000c3265 [989273.999487] FS: 000000c00050c090 GS: 0000000000000000 [989362.243525] warn_bad_vsyscall: 32 callbacks suppressed [989362.243529] exe[875853] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce668b5839 cs:33 sp:7f608c17d858 ax:0 si:55ce6690e070 di:ffffffffff600000 [989362.362122] exe[892183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce668b5839 cs:33 sp:7f608c15c858 ax:0 si:55ce6690e070 di:ffffffffff600000 [989362.488241] exe[879009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce668b5839 cs:33 sp:7f608c17d858 ax:0 si:55ce6690e070 di:ffffffffff600000 [991220.892796] exe[877276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce668b140a cs:33 sp:7f608c17dee8 ax:12 si:ffffffffff600000 di:55ce6691dff2 [991221.097322] exe[914261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce668b140a cs:33 sp:7f608c17dee8 ax:12 si:ffffffffff600000 di:55ce6691dff2 [991221.777281] exe[875489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce668b140a cs:33 sp:7f608c17dee8 ax:12 si:ffffffffff600000 di:55ce6691dff2 [991517.796995] potentially unexpected fatal signal 5. [991517.802016] CPU: 94 PID: 872290 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [991517.812521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [991517.821946] RIP: 0033:0x7fffffffe062 [991517.825726] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [991517.844811] RSP: 002b:000000c0006c5cb0 EFLAGS: 00000297 [991517.850237] RAX: 00007fbe2c122000 RBX: 0000000000000000 RCX: 00007fffffffe05a [991517.857585] RDX: 0000000000000003 RSI: 0000000000020000 RDI: 00007fbe2c122000 [991517.864943] RBP: 000000c0006c5d40 R08: 0000000000000009 R09: 0000000011083000 [991517.872298] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0006c5bd8 [991517.879699] R13: 000000c000138800 R14: 000000c0004ffa00 R15: 00000000000d4762 [991517.887059] FS: 00007f6b4ffff6c0 GS: 0000000000000000 [991807.070574] potentially unexpected fatal signal 5. [991807.075635] CPU: 78 PID: 966908 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [991807.086059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [991807.095484] RIP: 0033:0x7fffffffe062 [991807.099279] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [991807.118284] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [991807.123757] RAX: 00005594f19a0000 RBX: 0000000000000000 RCX: 00007fffffffe05a [991807.132511] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 00005594f19a0000 [991807.139862] RBP: 000000c00018fe38 R08: 0000000000000009 R09: 000000000b966000 [991807.148641] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00018fe20 [991807.157376] R13: 0000000000000004 R14: 000000c00058d1e0 R15: 00000000000d63aa [991807.166140] FS: 000000c000130890 GS: 0000000000000000 [991916.249820] exe[869134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55602aeb940a cs:33 sp:7ea0c3b4fee8 ax:12 si:ffffffffff600000 di:55602af25ff2 [991916.535914] exe[869121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55602aeb940a cs:33 sp:7ea0c3b4fee8 ax:12 si:ffffffffff600000 di:55602af25ff2 [991916.761831] exe[874036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55602aeb940a cs:33 sp:7ea0c3b4fee8 ax:12 si:ffffffffff600000 di:55602af25ff2 [992262.379521] exe[987777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557543b3839 cs:33 sp:7ee79bf23858 ax:0 si:55575440c070 di:ffffffffff600000 [992262.477843] exe[987777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557543b3839 cs:33 sp:7ee79bf23858 ax:0 si:55575440c070 di:ffffffffff600000 [992262.634218] exe[987781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557543b3839 cs:33 sp:7ee79bf23858 ax:0 si:55575440c070 di:ffffffffff600000 [992262.709068] exe[18157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557543b3839 cs:33 sp:7ee79bf23858 ax:0 si:55575440c070 di:ffffffffff600000 [992356.570353] potentially unexpected fatal signal 5. [992356.575405] CPU: 94 PID: 878784 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [992356.585818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [992356.595492] RIP: 0033:0x7fffffffe062 [992356.599291] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [992356.618387] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [992356.623887] RAX: 00007fe8ec600000 RBX: 0000000000000000 RCX: 00007fffffffe05a [992356.632736] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 00007fe8ec600000 [992356.640109] RBP: 000000c00018fe38 R08: 0000000000000009 R09: 000000000b400000 [992356.648874] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00018fe20 [992356.656292] R13: 000000000000001c R14: 000000c0001604e0 R15: 00000000000d67f9 [992356.663677] FS: 000000000229acd0 GS: 0000000000000000 [992467.872232] potentially unexpected fatal signal 5. [992467.877284] CPU: 6 PID: 986846 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [992467.887606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [992467.897070] RIP: 0033:0x7fffffffe062 [992467.900859] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [992467.920015] RSP: 002b:000000c000737cb0 EFLAGS: 00000297 [992467.926817] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [992467.934188] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000055b793200000 [992467.942923] RBP: 000000c000737d40 R08: 0000000000000000 R09: 0000000000000000 [992467.951961] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000737bd8 [992467.960821] R13: 000000c000138800 R14: 000000c000455380 R15: 00000000000d7853 [992467.969558] FS: 00007f41219896c0 GS: 0000000000000000 [992532.842178] exe[52270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56356f238839 cs:33 sp:7f6ef727a858 ax:0 si:56356f291070 di:ffffffffff600000 [992687.882685] exe[57785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560dd17b9839 cs:33 sp:7ff630043858 ax:0 si:560dd1812070 di:ffffffffff600000 [992704.637290] exe[72652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559536c31839 cs:33 sp:7ea52091a858 ax:0 si:559536c8a070 di:ffffffffff600000 [992884.511368] potentially unexpected fatal signal 5. [992884.516418] CPU: 22 PID: 94865 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [992884.521436] potentially unexpected fatal signal 5. [992884.526770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [992884.531801] CPU: 54 PID: 94855 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [992884.531804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [992884.541254] RIP: 0033:0x7fffffffe062 [992884.541258] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [992884.551596] RIP: 0033:0x7fffffffe062 [992884.551599] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [992884.551601] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [992884.551602] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [992884.551603] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [992884.551604] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [992884.551605] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [992884.551605] R13: 0000000000000040 R14: 000000c000580b60 R15: 00000000000d83ee [992884.551606] FS: 000000c000180490 GS: 0000000000000000 [992884.658979] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [992884.665845] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [992884.674564] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [992884.681956] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [992884.690696] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [992884.699527] R13: 0000000000000040 R14: 000000c000580b60 R15: 00000000000d83ee [992884.708359] FS: 000000c000180490 GS: 0000000000000000 [992912.750186] potentially unexpected fatal signal 5. [992912.755251] CPU: 31 PID: 98751 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [992912.765597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [992912.775148] RIP: 0033:0x7fffffffe062 [992912.778976] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [992912.798020] RSP: 002b:000000c000239cb0 EFLAGS: 00000297 [992912.804841] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [992912.812242] RDX: 0000000000000000 RSI: 0000000000010000 RDI: 000000c0011a2000 [992912.819626] RBP: 000000c000239d40 R08: 0000000000000000 R09: 0000000000000000 [992912.828378] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000239bf8 [992912.837121] R13: 0000000002a3c900 R14: 000000c0005e64e0 R15: 00000000000dc160 [992912.844534] FS: 00000000058b53c0 GS: 0000000000000000 [992990.986422] potentially unexpected fatal signal 5. [992990.991465] CPU: 46 PID: 96238 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [992991.001971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [992991.011428] RIP: 0033:0x7fffffffe062 [992991.015231] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [992991.034259] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [992991.041098] RAX: 000055c10c1ed000 RBX: 0000000000000000 RCX: 00007fffffffe05a [992991.049953] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 000055c10c1ed000 [992991.058708] RBP: 000000c00018fe38 R08: 0000000000000009 R09: 000000000199a000 [992991.067461] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00018fe20 [992991.076291] R13: 0000000000000036 R14: 000000c00058f6c0 R15: 00000000000174d4 [992991.085031] FS: 000000c00060c490 GS: 0000000000000000 [993157.278324] potentially unexpected fatal signal 11. [993157.283539] CPU: 35 PID: 141981 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [993157.294064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [993157.303567] RIP: 0033:0x55abb0d9b216 [993157.307401] Code: 1f 44 00 00 48 8b 0d d9 e4 c9 00 4c 63 05 c2 e4 c9 00 48 8b 05 c3 e4 c9 00 49 01 c8 48 39 c8 72 13 4c 39 c0 73 0e 48 8d 50 04 <89> 38 48 89 15 a9 e4 c9 00 c3 52 48 8d 35 13 ff 09 00 48 89 c2 48 [993157.326517] RSP: 002b:00007f5f37a10308 EFLAGS: 00010287 [993157.333344] RAX: 0000001b2d320000 RBX: 0000000000000003 RCX: 0000001b2d320000 [993157.342112] RDX: 0000001b2d320004 RSI: 00000000ffffff9c RDI: 0000000000000000 [993157.350878] RBP: 0000000000000001 R08: 0000001b2d360000 R09: 0000000000000000 [993157.359628] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [993157.368369] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [993157.375754] FS: 000055abb1a40480 GS: 0000000000000000 [993310.379721] host.test[179796] bad frame in rt_sigreturn frame:000000008e442c10 ip:ffffffffffffd8ef sp:ffffffffffffd8ef orax:ffffffffffffffff [993310.396068] potentially unexpected fatal signal 11. [993310.402079] CPU: 72 PID: 179796 Comm: host.test Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [993310.414458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [993310.425314] RIP: d8ef:0xffffffffffffd8ef [993310.431249] Code: Unable to access opcode bytes at RIP 0xffffffffffffd8c5. [993310.439730] RSP: ffff:ffffffffffffd8ef EFLAGS: 00050ac7 [993310.446623] RAX: 0000000000000000 RBX: 000000c00003800f RCX: ffffffffffffd8ef [993310.455362] RDX: 0000000000000002 RSI: 000000000000000e RDI: 0000000000b2919a [993310.464147] RBP: 0001000000000030 R08: 00000000004697fd R09: 0000000000485936 [993310.472898] R10: 000000c00046fc50 R11: 000000c00046fcc8 R12: 000000000048595e [993310.481762] R13: 000000000047ba38 R14: 0000000000a230e0 R15: 000000c0001a2840 [993310.490524] FS: 00007fc7e65e0740 GS: 0000000000000000 [993367.567542] potentially unexpected fatal signal 5. [993367.572593] CPU: 92 PID: 211212 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [993367.583032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [993367.592695] RIP: 0033:0x7fffffffe062 [993367.596519] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [993367.615534] RSP: 002b:000000c0004dfd98 EFLAGS: 00000297 [993367.622390] RAX: 0000561326600000 RBX: 0000000000000000 RCX: 00007fffffffe05a [993367.631177] RDX: 0000000000000003 RSI: 0000000000131000 RDI: 0000561326600000 [993367.639917] RBP: 000000c0004dfe38 R08: 0000000000000009 R09: 000000000c400000 [993367.648663] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0004dfe20 [993367.649422] potentially unexpected fatal signal 5. [993367.656030] R13: 000000000000001c R14: 000000c000157d40 R15: 000000000002403a [993367.661079] CPU: 43 PID: 51250 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [993367.668544] FS: 000000c0004d2090 GS: 0000000000000000 [993367.685724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [993367.695202] RIP: 0033:0x7fffffffe062 [993367.700708] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [993367.719729] RSP: 002b:000000c0006b7cb0 EFLAGS: 00000297 [993367.725194] RAX: 00007ff249820000 RBX: 0000000000000000 RCX: 00007fffffffe05a [993367.732577] RDX: 0000000000000005 RSI: 0000000000002000 RDI: 00007ff249820000 [993367.741306] RBP: 000000c0006b7d40 R08: 0000000000000009 R09: 0000000000000000 [993367.748670] R10: 0000000000008011 R11: 0000000000000206 R12: 000000c0006b7bd8 [993367.757444] R13: 0000000002886f60 R14: 000000c0001a3ba0 R15: 00000000000eeca8 [993367.764803] FS: 0000000004f3e3c0 GS: 0000000000000000 [993367.822921] potentially unexpected fatal signal 11. [993367.828527] CPU: 66 PID: 169201 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [993367.838960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [993367.848430] RIP: 0033:0x557263abbf6f [993367.853601] Code: 00 00 00 e9 33 0c 05 00 0f 1f 00 e9 3b f8 ff ff 0f 1f 00 81 fa 00 01 00 00 74 d6 8b 57 10 83 e2 7f 83 fa 01 0f 85 92 00 00 00 <64> 8b 04 25 d0 02 00 00 39 47 08 75 30 8b 47 04 83 f8 ff 0f 84 bc [993367.857050] potentially unexpected fatal signal 5. [993367.872611] RSP: 002b:00007f8a4c3fd150 EFLAGS: 00010246 [993367.877651] CPU: 91 PID: 211826 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [993367.877653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [993367.877656] RIP: 0033:0x7fffffffe062 [993367.877659] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [993367.877660] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [993367.877662] RAX: 0000555eb3383000 RBX: 0000000000000000 RCX: 00007fffffffe05a [993367.877662] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000555eb3383000 [993367.877663] RBP: 000000c00013de38 R08: 0000000000000009 R09: 0000000003df9000 [993367.877666] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00013de20 [993367.884479] RAX: 0000000000000000 RBX: 00005572647367f0 RCX: 00005572647367d0 [993367.884480] RDX: 0000000000000001 RSI: 0000000000000001 RDI: 0000557263be4f20 [993367.884480] RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000 [993367.884481] R10: 0000000000021000 R11: 0000000000000010 R12: 00007f8a4c3fd470 [993367.884482] R13: ffffffffffffffc0 R14: 0000000000001000 R15: 0000000000000000 [993367.884482] FS: 0000557264735480 GS: 0000000000000000 [993367.974401] potentially unexpected fatal signal 5. [993367.979461] potentially unexpected fatal signal 5. [993367.979464] CPU: 88 PID: 210021 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [993367.979465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [993367.979469] RIP: 0033:0x7fffffffe062 [993367.979472] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [993367.979473] RSP: 002b:000000c0006b7cb0 EFLAGS: 00000297 [993367.979475] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [993367.979475] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [993367.979476] RBP: 000000c0006b7d40 R08: 0000000000000000 R09: 0000000000000000 [993367.979477] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006b7bd8 [993367.979477] R13: 0000000002886f60 R14: 000000c0001a3ba0 R15: 00000000000eeca8 [993367.979478] FS: 0000000004f3e3c0 GS: 0000000000000000 [993367.980646] R13: 000000000000001c R14: 000000c0004ced00 R15: 000000000002471b [993367.988038] CPU: 18 PID: 3873 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [993367.988039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [993367.988042] RIP: 0033:0x7fffffffe062 [993367.988044] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [993367.988045] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [993367.988047] RAX: 00005635cd538000 RBX: 0000000000000000 RCX: 00007fffffffe05a [993367.988047] RDX: 0000000000000001 RSI: 00000000000b7000 RDI: 00005635cd538000 [993367.988048] RBP: 000000c00013de38 R08: 0000000000000009 R09: 00000000100a0000 [993367.988049] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00013de20 [993367.988049] R13: 0000000000000032 R14: 000000c000183a00 R15: 00000000000f3ac3 [993367.988050] FS: 000000c00058c090 GS: 0000000000000000 [993368.010574] potentially unexpected fatal signal 11. [993368.014699] FS: 000000c000130490 GS: 0000000000000000 [993368.125250] potentially unexpected fatal signal 5. [993368.128865] CPU: 65 PID: 125809 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [993368.139683] CPU: 88 PID: 51520 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [993368.139684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [993368.139686] RIP: 0033:0x7fffffffe062 [993368.139690] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [993368.143484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [993368.143487] RIP: 0033:0x565363d5579f [993368.143489] Code: 66 2e 0f 1f 84 00 00 00 00 00 90 c5 f9 6e c6 89 f8 25 ff 0f 00 00 c4 e2 7d 78 c0 c5 f1 ef c9 3d e0 0f 00 00 0f 87 91 01 00 00 fe 6f 17 c5 fd 74 da c5 f5 74 d2 c5 ed eb db c5 fd d7 c3 85 c0 [993368.143490] RSP: 002b:00007f3681f51d78 EFLAGS: 00010283 [993368.143492] RAX: 0000000000000390 RBX: 00007f3681f522e0 RCX: 0000000000000000 [993368.143492] RDX: 00007f3681f52460 RSI: 0000000000000025 RDI: 0000565363db4390 [993368.143493] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [993368.143493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000565363db4390 [993368.143494] R13: 00007f3681f52460 R14: 0000000000000000 R15: 00007f3681f522e0 [993368.143495] FS: 00005653649b8480 GS: 0000000000000000 [993368.363590] RSP: 002b:000000c0006b7cb0 EFLAGS: 00000297 [993368.369084] RAX: 0000562901cdf000 RBX: 0000000000000000 RCX: 00007fffffffe05a [993368.376454] RDX: 0000000000000003 RSI: 00000000000b7000 RDI: 0000562901cdf000 [993368.383923] RBP: 000000c0006b7d40 R08: 0000000000000009 R09: 00000000071e3000 [993368.391309] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0006b7bd8 [993368.398689] R13: 0000000002886f60 R14: 000000c0001a3ba0 R15: 00000000000eeca8 [993368.406166] FS: 0000000004f3e3c0 GS: 0000000000000000 [993368.553555] potentially unexpected fatal signal 5. [993368.558604] CPU: 21 PID: 126973 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [993368.569023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [993368.578511] RIP: 0033:0x7fffffffe062 [993368.582304] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [993368.601417] RSP: 002b:000000c000671cb0 EFLAGS: 00000297 [993368.606885] RAX: 0000560dd2418000 RBX: 0000000000000000 RCX: 00007fffffffe05a [993368.614241] RDX: 0000000000000003 RSI: 0000000000021000 RDI: 0000560dd2418000 [993368.621608] RBP: 000000c000671d40 R08: 0000000000000009 R09: 00000000061da000 [993368.628967] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c000671bf8 [993368.636355] R13: 000000c000138c00 R14: 000000c0003096c0 R15: 000000000000a704 [993368.643741] FS: 00007f8eaed896c0 GS: 0000000000000000 [994483.668847] exe[272579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564fe91e0839 cs:33 sp:7fbdf8839858 ax:0 si:564fe9239070 di:ffffffffff600000 [994483.766055] exe[283000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564fe91e0839 cs:33 sp:7fbdf8839858 ax:0 si:564fe9239070 di:ffffffffff600000 [994483.863042] exe[272355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564fe91e0839 cs:33 sp:7fbdf8839858 ax:0 si:564fe9239070 di:ffffffffff600000 [994483.958308] exe[280896] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564fe91e0839 cs:33 sp:7fbdf8839858 ax:0 si:564fe9239070 di:ffffffffff600000 [994483.964495] exe[262415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a55e77e839 cs:33 sp:7f426b7fd858 ax:0 si:55a55e7d7070 di:ffffffffff600000 [994483.967972] exe[275304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eed07a7839 cs:33 sp:7f41a9a74858 ax:0 si:55eed0800070 di:ffffffffff600000 [994484.050199] exe[283005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eed07a7839 cs:33 sp:7f41a9a74858 ax:0 si:55eed0800070 di:ffffffffff600000 [994484.061708] exe[280655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564fe91e0839 cs:33 sp:7fbdf8839858 ax:0 si:564fe9239070 di:ffffffffff600000 [994484.109775] exe[238827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a55e77e839 cs:33 sp:7f426b7fd858 ax:0 si:55a55e7d7070 di:ffffffffff600000 [994484.153133] exe[283005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eed07a7839 cs:33 sp:7f41a9a74858 ax:0 si:55eed0800070 di:ffffffffff600000 [994848.221349] warn_bad_vsyscall: 3 callbacks suppressed [994848.221352] exe[290153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f9c4c839 cs:33 sp:7f2e6baceee8 ax:0 si:20000040 di:ffffffffff600000 [994848.319035] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f9c4c839 cs:33 sp:7f2e6baceee8 ax:0 si:20000040 di:ffffffffff600000 [994848.342251] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f9c4c839 cs:33 sp:7f2e6baceee8 ax:0 si:20000040 di:ffffffffff600000 [994848.427758] exe[290153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f9c4c839 cs:33 sp:7f2e6ba8cee8 ax:0 si:20000040 di:ffffffffff600000 [994848.447503] exe[290153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f9c4c839 cs:33 sp:7f2e6ba8cee8 ax:0 si:20000040 di:ffffffffff600000 [994848.468540] exe[290153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f9c4c839 cs:33 sp:7f2e6ba8cee8 ax:0 si:20000040 di:ffffffffff600000 [994848.488823] exe[290153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f9c4c839 cs:33 sp:7f2e6ba8cee8 ax:0 si:20000040 di:ffffffffff600000 [994848.509027] exe[290153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f9c4c839 cs:33 sp:7f2e6ba8cee8 ax:0 si:20000040 di:ffffffffff600000 [994848.529080] exe[290153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f9c4c839 cs:33 sp:7f2e6ba8cee8 ax:0 si:20000040 di:ffffffffff600000 [994848.548251] exe[290153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f9c4c839 cs:33 sp:7f2e6ba8cee8 ax:0 si:20000040 di:ffffffffff600000 [995899.476593] warn_bad_vsyscall: 58 callbacks suppressed [995899.476597] exe[301969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c8a407839 cs:33 sp:7fc7875a3858 ax:0 si:564c8a460062 di:ffffffffff600000 [996137.429516] exe[271807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d10ba6839 cs:33 sp:7eab772bb858 ax:0 si:560d10bff070 di:ffffffffff600000 [996732.956852] exe[320067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612b4e1c839 cs:33 sp:7fbb29635858 ax:0 si:5612b4e75062 di:ffffffffff600000 [996733.066254] exe[318637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612b4e1c839 cs:33 sp:7fbb29635858 ax:0 si:5612b4e75062 di:ffffffffff600000 [996733.174728] exe[320014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612b4e1c839 cs:33 sp:7fbb29635858 ax:0 si:5612b4e75062 di:ffffffffff600000 [996733.280079] exe[320773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612b4e1c839 cs:33 sp:7fbb29635858 ax:0 si:5612b4e75062 di:ffffffffff600000 [996989.214955] potentially unexpected fatal signal 5. [996989.220021] CPU: 8 PID: 266481 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [996989.230612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [996989.240088] RIP: 0033:0x7fffffffe062 [996989.243886] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [996989.262887] RSP: 002b:000000c000597d98 EFLAGS: 00000297 [996989.268364] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [996989.275812] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [996989.284569] RBP: 000000c000597e38 R08: 0000000000000000 R09: 0000000000000000 [996989.293317] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000597e20 [996989.302127] R13: 000000000000001c R14: 000000c00019e680 R15: 0000000000036027 [996989.309503] FS: 000000c000588490 GS: 0000000000000000 [996989.432353] potentially unexpected fatal signal 5. [996989.437670] CPU: 46 PID: 324801 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [996989.448127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [996989.459019] RIP: 0033:0x7fffffffe062 [996989.462803] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [996989.481792] RSP: 002b:000000c000597d98 EFLAGS: 00000297 [996989.488605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [996989.495994] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [996989.504721] RBP: 000000c000597e38 R08: 0000000000000000 R09: 0000000000000000 [996989.512178] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000597e20 [996989.516010] potentially unexpected fatal signal 5. [996989.520914] R13: 000000000000001c R14: 000000c00019e680 R15: 0000000000036027 [996989.520916] FS: 000000c000588490 GS: 0000000000000000 [996989.525929] CPU: 45 PID: 324802 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [996989.525930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [996989.525932] RIP: 0033:0x7fffffffe062 [996989.525934] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [996989.525935] RSP: 002b:000000c000597d98 EFLAGS: 00000297 [996989.525937] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [996989.525937] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [996989.525938] RBP: 000000c000597e38 R08: 0000000000000000 R09: 0000000000000000 [996989.525938] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000597e20 [996989.525939] R13: 000000000000001c R14: 000000c00019e680 R15: 0000000000036027 [996989.525939] FS: 000000c000588490 GS: 0000000000000000 [997004.400402] potentially unexpected fatal signal 5. [997004.405447] CPU: 82 PID: 246449 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [997004.415896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [997004.425351] RIP: 0033:0x7fffffffe062 [997004.429207] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [997004.448242] RSP: 002b:000000c00058fd98 EFLAGS: 00000297 [997004.453989] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [997004.461461] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [997004.470215] RBP: 000000c00058fe38 R08: 0000000000000000 R09: 0000000000000000 [997004.478987] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00058fe20 [997004.487752] R13: 0000000000000036 R14: 000000c00050b1e0 R15: 0000000000036d3f [997004.496576] FS: 000000c000130890 GS: 0000000000000000 [997009.254136] potentially unexpected fatal signal 5. [997009.259170] CPU: 56 PID: 229153 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [997009.269622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [997009.279077] RIP: 0033:0x7fffffffe062 [997009.282872] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [997009.301997] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [997009.308836] RAX: 000000000004ffa2 RBX: 0000000000000000 RCX: 00007fffffffe05a [997009.317589] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [997009.324977] RBP: 000000c00013de38 R08: 000000c000491c30 R09: 0000000000000000 [997009.332732] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [997009.340102] R13: 000000000000003e R14: 000000c0006024e0 R15: 0000000000037065 [997009.348836] FS: 000000c000130890 GS: 0000000000000000 [997014.278337] potentially unexpected fatal signal 5. [997014.283384] CPU: 61 PID: 231309 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [997014.294167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [997014.303699] RIP: 0033:0x7fffffffe062 [997014.307508] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [997014.326589] RSP: 002b:000000c00052fd98 EFLAGS: 00000297 [997014.332027] RAX: 000000000005061f RBX: 0000000000000000 RCX: 00007fffffffe05a [997014.339394] RDX: 0000000000000000 RSI: 000000c000530000 RDI: 0000000000012f00 [997014.346798] RBP: 000000c00052fe38 R08: 000000c0009a35a0 R09: 0000000000000000 [997014.355558] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00052fe20 [997014.364343] R13: 0000000000000036 R14: 000000c000173ba0 R15: 000000000003749f [997014.373104] FS: 000000c000130490 GS: 0000000000000000 [997946.503355] exe[328726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b44e3a40a cs:33 sp:7eea4a10dee8 ax:12 si:ffffffffff600000 di:556b44ea6ff2 [997946.550564] exe[328726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b44e3a40a cs:33 sp:7eea4a10dee8 ax:12 si:ffffffffff600000 di:556b44ea6ff2 [997946.576425] exe[328721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b44e3a40a cs:33 sp:7eea4a0ecee8 ax:12 si:ffffffffff600000 di:556b44ea6ff2 [997946.619505] exe[328726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b44e3a40a cs:33 sp:7eea4a10dee8 ax:12 si:ffffffffff600000 di:556b44ea6ff2 [997946.641180] exe[328726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556b44e3a40a cs:33 sp:7eea4a0ecee8 ax:12 si:ffffffffff600000 di:556b44ea6ff2 [998803.171305] exe[377106] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565068567839 cs:33 sp:7edff629d858 ax:0 si:5650685c0070 di:ffffffffff600000 [999204.949121] exe[369136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb4478839 cs:33 sp:7fe686f36858 ax:0 si:561fb44d1062 di:ffffffffff600000 [999205.081265] exe[367629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb4478839 cs:33 sp:7fe686f36858 ax:0 si:561fb44d1062 di:ffffffffff600000 [999205.180729] exe[381464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb4478839 cs:33 sp:7fe686f36858 ax:0 si:561fb44d1062 di:ffffffffff600000 [999205.289646] exe[383021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb4478839 cs:33 sp:7fe686f36858 ax:0 si:561fb44d1062 di:ffffffffff600000 [1000611.049429] potentially unexpected fatal signal 5. [1000611.054548] CPU: 35 PID: 328492 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1000611.065170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1000611.074702] RIP: 0033:0x7fffffffe062 [1000611.078634] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1000611.097896] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1000611.103421] RAX: 0000000000061635 RBX: 0000000000000000 RCX: 00007fffffffe05a [1000611.110888] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [1000611.118337] RBP: 000000c000193e38 R08: 000000c000a2c010 R09: 0000000000000000 [1000611.125777] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1000611.133248] R13: 000000000000001c R14: 000000c0004769c0 R15: 00000000000500e8 [1000611.142075] FS: 000000c000130890 GS: 0000000000000000 [1000612.098315] potentially unexpected fatal signal 5. [1000612.103456] CPU: 28 PID: 398972 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1000612.114223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1000612.115948] potentially unexpected fatal signal 5. [1000612.123854] RIP: 0033:0x7fffffffe062 [1000612.128952] CPU: 56 PID: 363299 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1000612.128954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1000612.128958] RIP: 0033:0x7fffffffe062 [1000612.128961] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1000612.128962] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1000612.128963] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1000612.128964] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1000612.128964] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1000612.128965] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1000612.128966] R13: 000000000000001c R14: 000000c0004aaea0 R15: 000000000005031c [1000612.128966] FS: 000000c000130890 GS: 0000000000000000 [1000612.228264] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1000612.247384] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1000612.254243] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1000612.261686] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1000612.270532] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1000612.279358] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1000612.286805] R13: 000000000000001c R14: 000000c0004aaea0 R15: 000000000005031c [1000612.294248] FS: 000000c000130890 GS: 0000000000000000 [1000615.273611] potentially unexpected fatal signal 5. [1000615.278739] CPU: 61 PID: 371380 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1000615.289235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1000615.298770] RIP: 0033:0x7fffffffe062 [1000615.302656] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1000615.323146] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1000615.330055] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1000615.338893] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1000615.347806] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1000615.356628] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1000615.365462] R13: 0000000000000010 R14: 000000c0001b04e0 R15: 0000000000050627 [1000615.372915] FS: 000000c000130890 GS: 0000000000000000 [1000615.447594] potentially unexpected fatal signal 5. [1000615.453852] CPU: 34 PID: 349303 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1000615.465823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1000615.476815] RIP: 0033:0x7fffffffe062 [1000615.482070] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1000615.501188] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1000615.508080] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1000615.512905] potentially unexpected fatal signal 5. [1000615.516917] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1000615.523385] CPU: 80 PID: 365877 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1000615.523386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1000615.523390] RIP: 0033:0x7fffffffe062 [1000615.523392] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1000615.523393] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1000615.523394] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1000615.523395] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1000615.523396] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1000615.523396] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1000615.523398] R13: 0000000000000010 R14: 000000c0001b04e0 R15: 0000000000050627 [1000615.532207] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1000615.532208] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1000615.532209] R13: 0000000000000010 R14: 000000c0001b04e0 R15: 0000000000050627 [1000615.532209] FS: 000000c000130890 GS: 0000000000000000 [1000615.538201] potentially unexpected fatal signal 5. [1000615.542690] FS: 000000c000130890 GS: 0000000000000000 [1000615.548798] potentially unexpected fatal signal 5. [1000615.553618] CPU: 46 PID: 332800 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1000615.553621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1000615.558886] CPU: 93 PID: 336161 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1000615.558887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1000615.558891] RIP: 0033:0x7fffffffe062 [1000615.558894] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1000615.558894] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1000615.558896] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1000615.558896] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1000615.558897] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1000615.558898] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1000615.558898] R13: 0000000000000010 R14: 000000c0001b04e0 R15: 0000000000050627 [1000615.558899] FS: 000000c000130890 GS: 0000000000000000 [1000615.790880] RIP: 0033:0x7fffffffe062 [1000615.794753] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1000615.813845] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1000615.820749] RAX: 0000000000061786 RBX: 0000000000000000 RCX: 00007fffffffe05a [1000615.829561] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [1000615.838386] RBP: 000000c00013de38 R08: 000000c0008944c0 R09: 0000000000000000 [1000615.845936] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1000615.854771] R13: 0000000000000010 R14: 000000c0001b04e0 R15: 0000000000050627 [1000615.863576] FS: 000000c000130890 GS: 0000000000000000 [1000616.312264] potentially unexpected fatal signal 5. [1000616.314699] potentially unexpected fatal signal 5. [1000616.317437] CPU: 73 PID: 332331 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1000616.322567] CPU: 36 PID: 332395 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1000616.322569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1000616.322573] RIP: 0033:0x7fffffffe062 [1000616.322576] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1000616.334459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1000616.334463] RIP: 0033:0x7fffffffe062 [1000616.334465] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1000616.334467] RSP: 002b:000000c000025cb0 EFLAGS: 00000297 [1000616.334468] RAX: 00000000000617e2 RBX: 0000000000000000 RCX: 00007fffffffe05a [1000616.334469] RDX: 0000000000000000 RSI: 000000c000026000 RDI: 0000000000012f00 [1000616.334469] RBP: 000000c000025d40 R08: 000000c0009b6970 R09: 0000000000000000 [1000616.334470] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000025bd8 [1000616.334470] R13: 000000c000138c00 R14: 000000c000290680 R15: 0000000000050733 [1000616.334471] FS: 00007f7f59d886c0 GS: 0000000000000000 [1000616.462511] RSP: 002b:000000c000025cb0 EFLAGS: 00000297 [1000616.469444] RAX: 00000000000617df RBX: 0000000000000000 RCX: 00007fffffffe05a [1000616.478283] RDX: 0000000000000000 RSI: 000000c000026000 RDI: 0000000000012f00 [1000616.485732] RBP: 000000c000025d40 R08: 000000c0006f6880 R09: 0000000000000000 [1000616.493179] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000025bd8 [1000616.501995] R13: 000000c000138c00 R14: 000000c000290680 R15: 0000000000050733 [1000616.509459] FS: 00007f7f59d886c0 GS: 0000000000000000 [1000623.487506] potentially unexpected fatal signal 5. [1000623.492643] CPU: 77 PID: 377953 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1000623.503150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1000623.512785] RIP: 0033:0x7fffffffe062 [1000623.516712] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1000623.537198] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1000623.544136] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1000623.552991] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1000623.561817] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1000623.570675] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [1000623.579583] R13: 000000000000000c R14: 000000c000168b60 R15: 000000000005124c [1000623.588502] FS: 000000c000508090 GS: 0000000000000000 [1000778.123200] exe[411213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555c0793d839 cs:33 sp:7fb49004d858 ax:0 si:555c07996062 di:ffffffffff600000 [1001350.382470] exe[413020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3580ee839 cs:33 sp:7fe32c39d858 ax:0 si:55d358147062 di:ffffffffff600000 [1003828.594896] exe[468568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a71398e839 cs:33 sp:7efcf0d94858 ax:0 si:55a7139e7062 di:ffffffffff600000 [1003828.883668] exe[484211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a71398e839 cs:33 sp:7efcf0d73858 ax:0 si:55a7139e7062 di:ffffffffff600000 [1003829.040124] exe[445202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a71398e839 cs:33 sp:7efcf0d52858 ax:0 si:55a7139e7062 di:ffffffffff600000 [1004218.652370] potentially unexpected fatal signal 5. [1004218.657505] CPU: 45 PID: 454615 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1004218.667991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1004218.677533] RIP: 0033:0x7fffffffe062 [1004218.681461] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1004218.701946] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1004218.708868] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1004218.716342] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1004218.725142] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1004218.732613] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1004218.741552] R13: 000000000000001c R14: 000000c000728340 R15: 00000000000618d2 [1004218.750387] FS: 000000c000180890 GS: 0000000000000000 [1004222.020521] potentially unexpected fatal signal 5. [1004222.025677] CPU: 74 PID: 492648 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1004222.036159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1004222.045784] RIP: 0033:0x7fffffffe062 [1004222.049705] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1004222.068806] RSP: 002b:000000c000169d98 EFLAGS: 00000297 [1004222.075777] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1004222.083252] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1004222.090736] RBP: 000000c000169e38 R08: 0000000000000000 R09: 0000000000000000 [1004222.098223] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000169e20 [1004222.105703] R13: 000000000000001c R14: 000000c0004bfa00 R15: 0000000000061c25 [1004222.113173] FS: 000000c000180090 GS: 0000000000000000 [1004222.339241] potentially unexpected fatal signal 5. [1004222.344381] CPU: 41 PID: 492651 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1004222.344578] potentially unexpected fatal signal 5. [1004222.354870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1004222.359363] potentially unexpected fatal signal 5. [1004222.359367] CPU: 93 PID: 416276 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1004222.359369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1004222.359373] RIP: 0033:0x7fffffffe062 [1004222.359376] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1004222.359377] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1004222.359380] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1004222.359381] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1004222.359382] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1004222.359383] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1004222.359384] R13: 0000000000000036 R14: 000000c000164680 R15: 0000000000061bc6 [1004222.359385] FS: 000000c000130490 GS: 0000000000000000 [1004222.359971] CPU: 46 PID: 492637 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1004222.369491] RIP: 0033:0x7fffffffe062 [1004222.374593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1004222.374596] RIP: 0033:0x7fffffffe062 [1004222.374598] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1004222.374599] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1004222.374601] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1004222.374601] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1004222.374602] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1004222.374602] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1004222.374603] R13: 000000000000001c R14: 000000c000510ea0 R15: 0000000000061bcf [1004222.374604] FS: 00000000022b05b0 GS: 0000000000000000 [1004222.568215] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1004222.587310] RSP: 002b:000000c000169d98 EFLAGS: 00000297 [1004222.592929] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1004222.600367] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1004222.607817] RBP: 000000c000169e38 R08: 0000000000000000 R09: 0000000000000000 [1004222.615253] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000169e20 [1004222.622786] R13: 000000000000001c R14: 000000c0004bfa00 R15: 0000000000061c25 [1004222.630415] FS: 000000c000180090 GS: 0000000000000000 [1004223.501630] potentially unexpected fatal signal 5. [1004223.506744] CPU: 58 PID: 427163 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1004223.517250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1004223.526796] RIP: 0033:0x7fffffffe062 [1004223.530668] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1004223.549757] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1004223.555300] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1004223.562755] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1004223.570218] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1004223.577791] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1004223.585231] R13: 000000000000001c R14: 000000c00045a4e0 R15: 0000000000061dee [1004223.592697] FS: 000000c00059e090 GS: 0000000000000000 [1004225.851064] potentially unexpected fatal signal 5. [1004225.856226] CPU: 58 PID: 492992 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1004225.866751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1004225.876394] RIP: 0033:0x7fffffffe062 [1004225.880319] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1004225.900899] RSP: 002b:000000c00058fd98 EFLAGS: 00000297 [1004225.907860] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1004225.916766] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1004225.925580] RBP: 000000c00058fe38 R08: 0000000000000000 R09: 0000000000000000 [1004225.934409] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00058fe20 [1004225.943354] R13: 0000000000000020 R14: 000000c000509380 R15: 000000000006211f [1004225.952171] FS: 000000c000180490 GS: 0000000000000000 [1004283.559526] exe[506938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0c935d839 cs:33 sp:7f0f09b28858 ax:0 si:55e0c93b6070 di:ffffffffff600000 [1004570.004153] exe[524182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559c05d13839 cs:33 sp:7fd80f9fe858 ax:0 si:559c05d6c062 di:ffffffffff600000 [1005313.827634] exe[564695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6d9b9ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2800000 [1005314.794953] exe[545716] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6d9b9ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2800000 [1005315.262301] exe[566475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6d9b9ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2800000 [1005696.908284] exe[564250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d797ec839 cs:33 sp:7fec353b3ee8 ax:0 si:20003040 di:ffffffffff600000 [1005699.767721] exe[507239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d797ec839 cs:33 sp:7fec3530eee8 ax:0 si:20003040 di:ffffffffff600000 [1005699.886335] exe[506733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d797ec839 cs:33 sp:7fec353b3ee8 ax:0 si:20003040 di:ffffffffff600000 [1006925.980432] exe[517315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564d59c3839 cs:33 sp:7fd6f45fe858 ax:0 si:5564d5a1c062 di:ffffffffff600000 [1006926.343231] exe[511604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564d59c3839 cs:33 sp:7fd6f45fe858 ax:0 si:5564d5a1c062 di:ffffffffff600000 [1006926.738249] exe[587862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564d59c3839 cs:33 sp:7fd6f45dd858 ax:0 si:5564d5a1c062 di:ffffffffff600000 [1007027.488072] exe[514812] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d1fcc240a cs:33 sp:7f3a1f964ee8 ax:12 si:ffffffffff600000 di:564d1fd2eff2 [1007027.552278] exe[503661] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d1fcc240a cs:33 sp:7f3a1f964ee8 ax:12 si:ffffffffff600000 di:564d1fd2eff2 [1007027.606636] exe[514825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d1fcc240a cs:33 sp:7f3a1f943ee8 ax:12 si:ffffffffff600000 di:564d1fd2eff2 [1007830.342117] potentially unexpected fatal signal 5. [1007830.347251] CPU: 56 PID: 516915 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1007830.357756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1007830.367321] RIP: 0033:0x7fffffffe062 [1007830.371242] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1007830.391705] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1007830.398722] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1007830.407603] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1007830.416398] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1007830.425418] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1007830.432874] R13: 000000000000001c R14: 000000c0000071e0 R15: 0000000000078741 [1007830.441694] FS: 000000c000130890 GS: 0000000000000000 [1007830.462565] potentially unexpected fatal signal 5. [1007830.468045] CPU: 78 PID: 514443 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1007830.480046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1007830.490947] RIP: 0033:0x7fffffffe062 [1007830.496014] potentially unexpected fatal signal 5. [1007830.496206] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1007830.501315] CPU: 32 PID: 498669 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1007830.521856] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1007830.521858] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1007830.521859] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1007830.521859] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1007830.521860] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1007830.521860] R13: 000000000000001c R14: 000000c00046c820 R15: 000000000007872f [1007830.521861] FS: 00000000022b05b0 GS: 0000000000000000 [1007830.579029] potentially unexpected fatal signal 5. [1007830.581446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1007830.587051] CPU: 4 PID: 615854 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1007830.592128] RIP: 0033:0x7fffffffe062 [1007830.592131] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1007830.592132] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1007830.592133] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1007830.592134] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1007830.592134] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1007830.592135] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1007830.592135] R13: 000000000000001c R14: 000000c00046c820 R15: 000000000007872f [1007830.592136] FS: 00000000022b05b0 GS: 0000000000000000 [1007830.618302] potentially unexpected fatal signal 5. [1007830.636543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1007830.636548] RIP: 0033:0x7fffffffe062 [1007830.636551] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1007830.636552] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1007830.643503] CPU: 8 PID: 528883 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1007830.643505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1007830.643509] RIP: 0033:0x7fffffffe062 [1007830.643511] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1007830.643512] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1007830.643513] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1007830.643514] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1007830.643515] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1007830.643517] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1007830.652352] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1007830.652353] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1007830.652354] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1007830.652354] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1007830.652355] R13: 000000000000001c R14: 000000c00046c820 R15: 000000000007872f [1007830.652356] FS: 00000000022b05b0 GS: 0000000000000000 [1007830.750477] potentially unexpected fatal signal 5. [1007830.753507] R13: 000000000000001c R14: 000000c0000071e0 R15: 0000000000078741 [1007830.758785] CPU: 76 PID: 514876 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1007830.758786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1007830.758790] RIP: 0033:0x7fffffffe062 [1007830.758792] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1007830.758793] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1007830.758794] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1007830.758795] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1007830.758795] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1007830.758796] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1007830.758796] R13: 000000000000001c R14: 000000c00046c820 R15: 000000000007872f [1007830.758797] FS: 00000000022b05b0 GS: 0000000000000000 [1007830.777886] potentially unexpected fatal signal 5. [1007830.777889] CPU: 16 PID: 615838 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1007830.777890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1007830.777894] RIP: 0033:0x7fffffffe062 [1007830.777896] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1007830.777898] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1007830.777899] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1007830.777902] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1007830.784805] FS: 000000c000130890 GS: 0000000000000000 [1007831.051032] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1007831.058487] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1007831.067335] R13: 000000000000001c R14: 000000c0000071e0 R15: 0000000000078741 [1007831.076169] FS: 000000c000130890 GS: 0000000000000000 [1007831.131931] potentially unexpected fatal signal 5. [1007831.137065] CPU: 60 PID: 550042 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1007831.147611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1007831.148560] potentially unexpected fatal signal 5. [1007831.157186] RIP: 0033:0x7fffffffe062 [1007831.163610] CPU: 10 PID: 514399 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1007831.163611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1007831.163616] RIP: 0033:0x7fffffffe062 [1007831.163618] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1007831.163619] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1007831.163621] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1007831.163621] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1007831.163622] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1007831.163622] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1007831.163623] R13: 000000000000001c R14: 000000c00046c820 R15: 000000000007872f [1007831.163623] FS: 00000000022b05b0 GS: 0000000000000000 [1007831.267895] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1007831.288510] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1007831.294072] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1007831.301540] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1007831.308981] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1007831.316438] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1007831.323881] R13: 000000000000001c R14: 000000c00046c820 R15: 000000000007872f [1007831.331321] FS: 00000000022b05b0 GS: 0000000000000000 [1008136.557032] exe[629968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fccf08839 cs:33 sp:7f938005aee8 ax:0 si:200001c0 di:ffffffffff600000 [1008136.670120] exe[638792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fccf08839 cs:33 sp:7f9380039ee8 ax:0 si:200001c0 di:ffffffffff600000 [1008136.793176] exe[631580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fccf08839 cs:33 sp:7f937fbfeee8 ax:0 si:200001c0 di:ffffffffff600000 [1008331.636575] exe[644470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d64ae65839 cs:33 sp:7fae6d85d858 ax:0 si:55d64aebe062 di:ffffffffff600000 [1008331.719955] exe[638835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d64ae65839 cs:33 sp:7fae6d83c858 ax:0 si:55d64aebe062 di:ffffffffff600000 [1008331.832017] exe[644216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d64ae65839 cs:33 sp:7fae6d85d858 ax:0 si:55d64aebe062 di:ffffffffff600000 [1008541.323751] exe[666429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae52c8840a cs:33 sp:7ed1e3919ee8 ax:12 si:ffffffffff600000 di:55ae52cf4ff2 [1008541.761866] exe[623943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae52c8840a cs:33 sp:7ed1e38f8ee8 ax:12 si:ffffffffff600000 di:55ae52cf4ff2 [1008542.674638] exe[666761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae52c8840a cs:33 sp:7ed1e38b6ee8 ax:12 si:ffffffffff600000 di:55ae52cf4ff2 [1009226.132448] exe[584463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6d9b9ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000 [1009226.677372] exe[599224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6d9b9ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000 [1009227.110555] exe[615276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6d9b9ab31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2000 [1009534.529517] potentially unexpected fatal signal 5. [1009534.534660] CPU: 6 PID: 692890 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1009534.545343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1009534.552947] potentially unexpected fatal signal 5. [1009534.554894] RIP: 0033:0x7fffffffe062 [1009534.559998] CPU: 75 PID: 692888 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1009534.560000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1009534.560004] RIP: 0033:0x7fffffffe062 [1009534.560006] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1009534.560007] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1009534.560008] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1009534.560009] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1009534.560010] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1009534.560010] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1009534.560011] R13: 0000000000000040 R14: 000000c0004edba0 R15: 00000000000a79f8 [1009534.560011] FS: 0000000001fdaef0 GS: 0000000000000000 [1009534.665032] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1009534.685549] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1009534.692475] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1009534.701327] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1009534.710167] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1009534.719017] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1009534.727881] R13: 0000000000000040 R14: 000000c0004edba0 R15: 00000000000a79f8 [1009534.736713] FS: 0000000001fdaef0 GS: 0000000000000000 [1009723.883205] potentially unexpected fatal signal 5. [1009723.888538] CPU: 90 PID: 645052 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1009723.899080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1009723.908895] RIP: 0033:0x7fffffffe062 [1009723.912777] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1009723.931910] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1009723.938846] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1009723.947687] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1009723.956510] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1009723.965361] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1009723.972949] R13: 000000000000001e R14: 000000c0004a6ea0 R15: 0000000000096f55 [1009723.981779] FS: 000000c000180090 GS: 0000000000000000 [1009750.111023] potentially unexpected fatal signal 5. [1009750.116156] CPU: 18 PID: 699417 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1009750.126674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1009750.136373] RIP: 0033:0x7fffffffe062 [1009750.140342] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1009750.161011] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1009750.167973] RAX: 000055642d09b000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1009750.176827] RDX: 0000000000000001 RSI: 0000000000021000 RDI: 000055642d09b000 [1009750.185707] RBP: 000000c000193e38 R08: 0000000000000009 R09: 0000000007a93000 [1009750.194565] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000193e20 [1009750.203462] R13: 000000000000001c R14: 000000c000458680 R15: 00000000000aa9c8 [1009750.212276] FS: 00000000022b05b0 GS: 0000000000000000 [1011039.942123] exe[775573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff727c839 cs:33 sp:7fced4d5f858 ax:0 si:555ff72d5062 di:ffffffffff600000 [1011040.161178] exe[778269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff727c839 cs:33 sp:7fced4d5f858 ax:0 si:555ff72d5062 di:ffffffffff600000 [1011040.241099] exe[778269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff727c839 cs:33 sp:7fced4d5f858 ax:0 si:555ff72d5062 di:ffffffffff600000 [1012497.063091] potentially unexpected fatal signal 5. [1012497.068221] CPU: 75 PID: 810780 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1012497.078731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1012497.088272] RIP: 0033:0x7fffffffe062 [1012497.092163] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1012497.111291] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1012497.118303] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1012497.127102] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1012497.135948] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1012497.143408] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1012497.152262] R13: 0000000000000040 R14: 000000c000378000 R15: 00000000000c5884 [1012497.159740] FS: 0000000001fdaef0 GS: 0000000000000000 [1012511.654341] potentially unexpected fatal signal 11. [1012511.659548] CPU: 22 PID: 810931 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1012511.667530] potentially unexpected fatal signal 11. [1012511.670057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1012511.675228] CPU: 53 PID: 811724 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1012511.675230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1012511.675236] RIP: 0033:0x55fba6b5db53 [1012511.684766] RIP: 0033:0x55fba6b5db8f [1012511.684769] Code: 25 10 00 00 00 be 18 00 00 00 48 8d b8 e0 02 00 00 66 48 0f 6e c7 66 0f 6c c0 0f 11 80 d8 02 00 00 b8 11 01 00 00 0f 05 89 d0 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 ba ff ff ff ff 89 d0 c3 66 [1012511.684770] RSP: 002b:00007f0c5dfcc438 EFLAGS: 00010206 [1012511.684771] RAX: 0000000000000218 RBX: 0000000000000000 RCX: 000055fba6b5db53 [1012511.684772] RDX: 0000000000000218 RSI: 0000000000000000 RDI: 0000000001200011 [1012511.684773] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [1012511.684773] R10: 000055fba77b0750 R11: 0000000000000246 R12: 0000000000000001 [1012511.684773] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [1012511.684774] FS: 000055fba77b0480 GS: 0000000000000000 [1012511.795296] Code: Unable to access opcode bytes at RIP 0x55fba6b5db29. [1012511.803525] RSP: 002b:00007f0c5dfcc438 EFLAGS: 00010246 [1012511.810742] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000055fba6b5db53 [1012511.819758] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [1012511.828587] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [1012511.837416] R10: 000055fba77b0750 R11: 0000000000000246 R12: 0000000000000001 [1012511.846238] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [1012511.855081] FS: 000055fba77b0480 GS: 0000000000000000 [1012606.024804] potentially unexpected fatal signal 5. [1012606.030956] CPU: 76 PID: 812553 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1012606.041455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1012606.051055] RIP: 0033:0x7fffffffe062 [1012606.055043] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1012606.075565] RSP: 002b:000000c000679cb0 EFLAGS: 00000297 [1012606.082537] RAX: 000055a5691c3000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1012606.091357] RDX: 0000000000000005 RSI: 00000000000a2000 RDI: 000055a5691c3000 [1012606.100231] RBP: 000000c000679d40 R08: 000000000000001c R09: 0000000000024000 [1012606.109081] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c000679bd8 [1012606.117926] R13: 000000c000180000 R14: 000000c0004ed040 R15: 00000000000c589b [1012606.126755] FS: 00007f41798886c0 GS: 0000000000000000 [1012745.409597] potentially unexpected fatal signal 5. [1012745.414723] CPU: 55 PID: 820235 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1012745.425263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1012745.434787] RIP: 0033:0x7fffffffe062 [1012745.438691] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1012745.457797] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1012745.464745] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1012745.473588] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1012745.481058] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1012745.488591] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1012745.497417] R13: 000000000000001c R14: 000000c000502340 R15: 00000000000b351d [1012745.504864] FS: 00000000022b05b0 GS: 0000000000000000 [1012751.815539] potentially unexpected fatal signal 5. [1012751.820666] CPU: 30 PID: 742648 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1012751.831178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1012751.840713] RIP: 0033:0x7fffffffe062 [1012751.844592] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1012751.863703] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1012751.869220] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1012751.877212] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1012751.884653] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1012751.892117] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1012751.899607] R13: 000000000000001c R14: 000000c0001a8680 R15: 00000000000b3077 [1012751.908705] FS: 000000c000130890 GS: 0000000000000000 [1012752.150499] potentially unexpected fatal signal 5. [1012752.155689] CPU: 92 PID: 820470 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1012752.166222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1012752.175891] RIP: 0033:0x7fffffffe062 [1012752.179826] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1012752.200312] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1012752.207254] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1012752.216088] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1012752.224937] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1012752.232418] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1012752.241255] R13: 000000000000001c R14: 000000c0001a8680 R15: 00000000000b3077 [1012752.250087] FS: 000000c000130890 GS: 0000000000000000 [1012778.915854] potentially unexpected fatal signal 5. [1012778.921132] CPU: 1 PID: 822744 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1012778.931549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1012778.941099] RIP: 0033:0x7fffffffe062 [1012778.944992] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1012778.964210] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1012778.971235] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1012778.980093] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1012778.988937] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1012778.997785] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [1012779.006616] R13: 000000000000001c R14: 000000c00047d860 R15: 00000000000c886d [1012779.015468] FS: 000000c000180090 GS: 0000000000000000 [1013532.583024] exe[867365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3c92740a cs:33 sp:7f89dee30ee8 ax:12 si:ffffffffff600000 di:55cf3c993ff2 [1013532.655319] exe[867269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3c92740a cs:33 sp:7f89dee30ee8 ax:12 si:ffffffffff600000 di:55cf3c993ff2 [1013533.447536] exe[860361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3c92740a cs:33 sp:7f89dee30ee8 ax:12 si:ffffffffff600000 di:55cf3c993ff2 [1013544.584806] potentially unexpected fatal signal 5. [1013544.585535] potentially unexpected fatal signal 5. [1013544.589963] CPU: 11 PID: 867444 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1013544.589966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1013544.595134] CPU: 48 PID: 868272 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1013544.595135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1013544.595140] RIP: 0033:0x7fffffffe062 [1013544.595142] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1013544.595143] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1013544.595144] RAX: 00007f051e4db000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1013544.595145] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f051e4db000 [1013544.595146] RBP: 000000c00013de38 R08: 0000000000000009 R09: 0000000003df8000 [1013544.595146] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00013de20 [1013544.595147] R13: 0000000000000034 R14: 000000c0001a91e0 R15: 00000000000cde4b [1013544.595148] FS: 000000c00050c090 GS: 0000000000000000 [1013544.618917] potentially unexpected fatal signal 5. [1013544.623976] potentially unexpected fatal signal 5. [1013544.623980] CPU: 42 PID: 852870 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1013544.623982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1013544.623986] RIP: 0033:0x7fffffffe062 [1013544.623989] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1013544.623990] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1013544.623992] RAX: 0000556bf5200000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1013544.623993] RDX: 0000000000000003 RSI: 00000000000dd000 RDI: 0000556bf5200000 [1013544.623994] RBP: 000000c00013de38 R08: 0000000000000009 R09: 000000000d400000 [1013544.623995] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00013de20 [1013544.623996] R13: 0000000000000034 R14: 000000c0001a91e0 R15: 00000000000cde4b [1013544.623997] FS: 000000c00050c090 GS: 0000000000000000 [1013544.625715] RIP: 0033:0x7fffffffe062 [1013544.625719] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1013544.636637] CPU: 83 PID: 852595 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1013544.636639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1013544.636643] RIP: 0033:0x7fffffffe062 [1013544.636645] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1013544.636646] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1013544.636647] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1013544.636648] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000055eaf0e00000 [1013544.636649] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1013544.636649] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1013544.636650] R13: 0000000000000034 R14: 000000c0001a91e0 R15: 00000000000cde4b [1013544.636651] FS: 000000c00050c090 GS: 0000000000000000 [1013544.969797] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1013544.976761] RAX: 000056222b3c8000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1013544.985585] RDX: 0000000000000001 RSI: 0000000000038000 RDI: 000056222b3c8000 [1013544.994422] RBP: 000000c00013de38 R08: 0000000000000009 R09: 000000000c44f000 [1013545.003253] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00013de20 [1013545.012093] R13: 0000000000000034 R14: 000000c0001a91e0 R15: 00000000000cde4b [1013545.020939] FS: 000000c00050c090 GS: 0000000000000000 [1015012.867153] exe[901353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566a1b71839 cs:33 sp:7fcc5c58b858 ax:0 si:5566a1bca097 di:ffffffffff600000 [1015012.943187] exe[876573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566a1b71839 cs:33 sp:7fcc5c56a858 ax:0 si:5566a1bca097 di:ffffffffff600000 [1015013.018772] exe[901353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566a1b71839 cs:33 sp:7fcc5c56a858 ax:0 si:5566a1bca097 di:ffffffffff600000 [1015100.871162] exe[902169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566a1b71839 cs:33 sp:7fcc5c58b858 ax:0 si:5566a1bca062 di:ffffffffff600000 [1015100.967115] exe[899735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566a1b71839 cs:33 sp:7fcc5c58b858 ax:0 si:5566a1bca062 di:ffffffffff600000 [1015605.039030] potentially unexpected fatal signal 5. [1015605.044192] CPU: 58 PID: 922285 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015605.054917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015605.064510] RIP: 0033:0x7fffffffe062 [1015605.068502] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1015605.087722] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1015605.094875] RAX: 00000000000e12b4 RBX: 0000000000000000 RCX: 00007fffffffe05a [1015605.103722] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [1015605.112576] RBP: 000000c000193e38 R08: 000000c0001bc5b0 R09: 0000000000000000 [1015605.121442] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1015605.130295] R13: 000000000000001a R14: 000000c000582340 R15: 00000000000e11de [1015605.139116] FS: 00000000022b05b0 GS: 0000000000000000 [1015659.747453] exe[834126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556bc342840a cs:33 sp:7f5d3651cee8 ax:12 si:ffffffffff600000 di:556bc3494ff2 [1015659.830154] exe[846115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556bc342840a cs:33 sp:7f5d3651cee8 ax:12 si:ffffffffff600000 di:556bc3494ff2 [1015659.933155] exe[833901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556bc342840a cs:33 sp:7f5d3651cee8 ax:12 si:ffffffffff600000 di:556bc3494ff2 [1015659.970216] exe[839972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556bc342840a cs:33 sp:7f5d3651cee8 ax:12 si:ffffffffff600000 di:556bc3494ff2 [1015687.071483] potentially unexpected fatal signal 5. [1015687.076619] CPU: 64 PID: 927793 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015687.087111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015687.096662] RIP: 0033:0x7fffffffe062 [1015687.100606] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1015687.121048] RSP: 002b:000000c00066fcb0 EFLAGS: 00000297 [1015687.127954] RAX: 00000000000e28de RBX: 0000000000000000 RCX: 00007fffffffe05a [1015687.136793] RDX: 0000000000000000 RSI: 000000c000670000 RDI: 0000000000012f00 [1015687.145611] RBP: 000000c00066fd40 R08: 000000c000a94a60 R09: 0000000000000000 [1015687.154434] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00066fbd8 [1015687.163276] R13: 000000c000180000 R14: 000000c000522680 R15: 00000000000e26e0 [1015687.172108] FS: 00007f4f290876c0 GS: 0000000000000000 [1015696.628250] potentially unexpected fatal signal 11. [1015696.633454] CPU: 85 PID: 929561 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015696.644121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015696.653697] RIP: 0033:0x564e820dbb31 [1015696.657677] Code: c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [1015696.678150] RSP: 002b:00007f79d4e46308 EFLAGS: 00010217 [1015696.685240] RAX: 0000000000000000 RBX: 000000000000054c RCX: 0000564e820dbb29 [1015696.694117] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000564e821faf8c [1015696.703636] RBP: 0000000000000032 R08: 0000564e821faf8c R09: 0000564e821faf8c [1015696.712597] R10: 00007f79d4e46440 R11: 0000000000000246 R12: 0000564e821faf8c [1015696.721696] R13: 000000000000057e R14: 00007f79d4e46460 R15: 00007f79d4e46440 [1015696.730525] FS: 0000564e82d2b480 GS: 0000000000000000 [1015700.700903] potentially unexpected fatal signal 5. [1015700.706024] CPU: 55 PID: 930534 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015700.716520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015700.726091] RIP: 0033:0x7fffffffe062 [1015700.730029] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1015700.750541] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1015700.757436] RAX: 00000000000e33b3 RBX: 0000000000000000 RCX: 00007fffffffe05a [1015700.766286] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [1015700.775107] RBP: 000000c00013de38 R08: 000000c0002da100 R09: 0000000000000000 [1015700.783947] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1015700.792788] R13: 0000000000000034 R14: 000000c00062a680 R15: 00000000000e317f [1015700.801646] FS: 000000c000130490 GS: 0000000000000000 [1015735.672343] potentially unexpected fatal signal 5. [1015735.677478] CPU: 75 PID: 932823 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015735.687987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015735.697552] RIP: 0033:0x7fffffffe062 [1015735.701457] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1015735.720541] RSP: 002b:000000c00003bcb0 EFLAGS: 00000297 [1015735.727465] RAX: 00000000000e4c65 RBX: 0000000000000000 RCX: 00007fffffffe05a [1015735.736278] RDX: 0000000000000000 RSI: 000000c00003c000 RDI: 0000000000012f00 [1015735.745118] RBP: 000000c00003bd40 R08: 000000c0008c92d0 R09: 0000000000000000 [1015735.753937] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00003bbd8 [1015735.762777] R13: 000000c000181800 R14: 000000c0004da9c0 R15: 00000000000e2d46 [1015735.771637] FS: 00007f9050dff6c0 GS: 0000000000000000 [1015769.889525] potentially unexpected fatal signal 5. [1015769.894640] CPU: 89 PID: 942938 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015769.905159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015769.914685] RIP: 0033:0x7fffffffe062 [1015769.918599] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1015769.936424] potentially unexpected fatal signal 5. [1015769.937680] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1015769.942794] CPU: 92 PID: 943977 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015769.942795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015769.948313] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1015769.960166] RIP: 0033:0x7fffffffe062 [1015769.960168] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1015769.960169] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1015769.960170] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1015769.960171] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1015769.960171] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1015769.960172] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1015769.960172] R13: 000000000000003c R14: 000000c0003fa4e0 R15: 00000000000e3c39 [1015769.960173] FS: 000000c000181890 GS: 0000000000000000 [1015770.056858] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1015770.064325] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1015770.073174] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [1015770.081991] R13: 000000000000003c R14: 000000c0003fa4e0 R15: 00000000000e3c39 [1015770.090812] FS: 000000c000181890 GS: 0000000000000000 [1015809.177562] potentially unexpected fatal signal 5. [1015809.182704] CPU: 88 PID: 952673 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015809.193209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015809.202835] RIP: 0033:0x7fffffffe062 [1015809.206710] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1015809.225798] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1015809.231366] RAX: 000055797d3ff000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1015809.238859] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 000055797d3ff000 [1015809.247720] RBP: 000000c00013de38 R08: 0000000000000009 R09: 00000000015ff000 [1015809.256557] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00013de20 [1015809.265390] R13: 0000000000000034 R14: 000000c0003fb520 R15: 00000000000e5b84 [1015809.274221] FS: 0000000001fdaef0 GS: 0000000000000000 [1015819.344271] potentially unexpected fatal signal 5. [1015819.349474] CPU: 6 PID: 958679 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015819.352347] potentially unexpected fatal signal 5. [1015819.359875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015819.364986] CPU: 52 PID: 958675 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015819.364987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015819.364991] RIP: 0033:0x7fffffffe062 [1015819.364993] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1015819.364994] RSP: 002b:000000c0007e9cb0 EFLAGS: 00000297 [1015819.364996] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1015819.364996] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1015819.364997] RBP: 000000c0007e9d40 R08: 0000000000000000 R09: 0000000000000000 [1015819.364997] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007e9bd8 [1015819.364998] R13: 000000c000138c00 R14: 000000c00047f380 R15: 00000000000e6ed6 [1015819.364999] FS: 00007fdd5ffff6c0 GS: 0000000000000000 [1015819.468589] RIP: 0033:0x7fffffffe062 [1015819.473900] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1015819.495514] RSP: 002b:000000c0007e9cb0 EFLAGS: 00000297 [1015819.502451] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1015819.511378] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1015819.520215] RBP: 000000c0007e9d40 R08: 0000000000000000 R09: 0000000000000000 [1015819.529066] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007e9bd8 [1015819.537909] R13: 000000c000138c00 R14: 000000c00047f380 R15: 00000000000e6ed6 [1015819.546735] FS: 00007fdd5ffff6c0 GS: 0000000000000000 [1015859.708058] potentially unexpected fatal signal 5. [1015859.713193] CPU: 46 PID: 973029 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015859.723729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015859.733275] RIP: 0033:0x7fffffffe062 [1015859.737222] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1015859.756440] RSP: 002b:000000c0001a7cb0 EFLAGS: 00000297 [1015859.761988] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1015859.770853] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1015859.779688] RBP: 000000c0001a7d40 R08: 0000000000000000 R09: 0000000000000000 [1015859.787230] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0001a7bd8 [1015859.794771] R13: 0000000002886f60 R14: 000000c0005aa340 R15: 00000000000e90df [1015859.803597] FS: 00000000049b23c0 GS: 0000000000000000 [1015875.041163] potentially unexpected fatal signal 5. [1015875.041273] potentially unexpected fatal signal 5. [1015875.046312] CPU: 47 PID: 971702 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015875.051500] CPU: 16 PID: 970742 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1015875.051502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015875.051506] RIP: 0033:0x7fffffffe062 [1015875.051508] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1015875.051511] RSP: 002b:000000c000739cb0 EFLAGS: 00000297 [1015875.062070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1015875.062075] RIP: 0033:0x7fffffffe062 [1015875.062077] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1015875.062078] RSP: 002b:000000c000739cb0 EFLAGS: 00000297 [1015875.062079] RAX: 00007fd4248f6000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1015875.062080] RDX: 0000000000000003 RSI: 0000000000020000 RDI: 00007fd4248f6000 [1015875.062080] RBP: 000000c000739d40 R08: 0000000000000009 R09: 000000000cca2000 [1015875.062081] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000739bd8 [1015875.062082] R13: 000000c000138c00 R14: 000000c0001a4340 R15: 00000000000ea005 [1015875.062082] FS: 00007f7edaa886c0 GS: 0000000000000000 [1015875.200099] RAX: 00000000000eec1b RBX: 0000000000000000 RCX: 00007fffffffe05a [1015875.208906] RDX: 0000000000000000 RSI: 000000c00073a000 RDI: 0000000000012f00 [1015875.217854] RBP: 000000c000739d40 R08: 000000c0006085b0 R09: 0000000000000000 [1015875.225311] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000739bd8 [1015875.234154] R13: 000000c000138c00 R14: 000000c0001a4340 R15: 00000000000ea005 [1015875.243001] FS: 00007f7edaa886c0 GS: 0000000000000000 [1016028.052385] potentially unexpected fatal signal 5. [1016028.057553] CPU: 39 PID: 39252 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1016028.067975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1016028.077529] RIP: 0033:0x7fffffffe062 [1016028.081464] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1016028.102110] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [1016028.109068] RAX: 0000000000009991 RBX: 0000000000000000 RCX: 00007fffffffe05a [1016028.117896] RDX: 0000000000000000 RSI: 000000c00018e000 RDI: 0000000000012f00 [1016028.126730] RBP: 000000c00018de38 R08: 000000c0004ca010 R09: 0000000000000000 [1016028.135771] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [1016028.144687] R13: 000000000000001c R14: 000000c000780340 R15: 00000000000084c0 [1016028.152155] FS: 000000c00050c490 GS: 0000000000000000 [1016042.143772] potentially unexpected fatal signal 5. [1016042.146691] potentially unexpected fatal signal 5. [1016042.148425] potentially unexpected fatal signal 5. [1016042.148430] CPU: 49 PID: 48004 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1016042.148432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1016042.148436] RIP: 0033:0x7fffffffe062 [1016042.148439] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1016042.148441] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1016042.148443] RAX: 000000000000bb90 RBX: 0000000000000000 RCX: 00007fffffffe05a [1016042.148444] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [1016042.148445] RBP: 000000c000193e38 R08: 000000c000bda2e0 R09: 0000000000000000 [1016042.148446] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1016042.148446] R13: 0000000000000034 R14: 000000c000479860 R15: 00000000000093a2 [1016042.148448] FS: 000000c000180090 GS: 0000000000000000 [1016042.148907] CPU: 67 PID: 48001 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1016042.154017] CPU: 70 PID: 48002 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1016042.154019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1016042.154022] RIP: 0033:0x7fffffffe062 [1016042.154025] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1016042.154026] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1016042.154027] RAX: 00007f6c4591d000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1016042.154028] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007f6c4591d000 [1016042.154029] RBP: 000000c000193e38 R08: 0000000000000009 R09: 00000000003f5000 [1016042.154029] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000193e20 [1016042.154030] R13: 0000000000000034 R14: 000000c000479860 R15: 00000000000093a2 [1016042.154030] FS: 000000c000180090 GS: 0000000000000000 [1016042.366685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1016042.376249] RIP: 0033:0x7fffffffe062 [1016042.381542] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1016042.402000] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1016042.408928] RAX: 0000556866946000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1016042.417876] RDX: 0000000000000003 RSI: 0000000000016000 RDI: 0000556866946000 [1016042.426747] RBP: 000000c000193e38 R08: 0000000000000009 R09: 00000000031cd000 [1016042.435588] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c000193e20 [1016042.444649] R13: 0000000000000034 R14: 000000c000479860 R15: 00000000000093a2 [1016042.453476] FS: 000000c000180090 GS: 0000000000000000 [1016127.363978] potentially unexpected fatal signal 5. [1016127.369110] CPU: 86 PID: 74505 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1016127.379520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1016127.389064] RIP: 0033:0x7fffffffe062 [1016127.393010] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1016127.413770] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1016127.419346] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1016127.428176] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1016127.437013] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1016127.445846] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1016127.453326] R13: 0000000000000036 R14: 000000c0004cda00 R15: 0000000000010b14 [1016127.462163] FS: 000000c000130890 GS: 0000000000000000