estarting syscall 202: interrupted by signal 17 D0713 00:00:23.248890 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:23.249126 762332 task_exit.go:204] [ 653: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.257093 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:23.259064 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:23.276008 762332 syscalls.go:262] [ 659: 659] Allocating stack with size of 8388608 bytes D0713 00:00:23.278933 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:23.279822 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:23.283399 762332 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:23.283558 762332 usertrap_amd64.go:106] [ 659: 659] Map a usertrap vma at 63000 D0713 00:00:23.284484 762332 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc0014ed0b0 1 D0713 00:00:23.284924 762332 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:23.287269 762332 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:23.287362 762332 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc0014ed0b0 2 D0713 00:00:23.287516 762332 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:23.290371 762332 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:23.290455 762332 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc0014ed0b0 3 D0713 00:00:23.290595 762332 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:23.312125 762332 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:23.312223 762332 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc0014ed0b0 4 D0713 00:00:23.312389 762332 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:23.315534 762332 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:23.315600 762332 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc0014ed0b0 5 D0713 00:00:23.315713 762332 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:23.316156 762332 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b214:sysno 13 D0713 00:00:23.316206 762332 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc0014ed0b0 6 D0713 00:00:23.316321 762332 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:23.342408 762332 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:23.342536 762332 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc0014ed0b0 7 D0713 00:00:23.342684 762332 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:23.344126 762332 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:23.344204 762332 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc0014ed0b0 8 D0713 00:00:23.344336 762332 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:23.345964 762332 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46af76:sysno 35 D0713 00:00:23.346037 762332 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc0014ed0b0 9 D0713 00:00:23.346214 762332 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:23.347787 762332 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:23.347866 762332 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc0014ed0b0 10 D0713 00:00:23.348137 762332 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:23.361729 762332 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b020:sysno 39 D0713 00:00:23.361788 762332 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc0014ed0b0 11 D0713 00:00:23.361955 762332 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:23.362689 762332 usertrap_amd64.go:212] [ 659: 660] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:23.362781 762332 usertrap_amd64.go:122] [ 659: 660] Allocate a new trap: 0xc0014ed0b0 12 D0713 00:00:23.362915 762332 usertrap_amd64.go:225] [ 659: 660] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:23.363873 762332 task_signals.go:470] [ 659: 659] Notified of signal 23 D0713 00:00:23.364167 762332 task_signals.go:220] [ 659: 659] Signal 23: delivering to handler D0713 00:00:23.374064 762332 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46af29:sysno 293 D0713 00:00:23.374142 762332 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc0014ed0b0 13 D0713 00:00:23.374324 762332 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:23.374827 762332 task_signals.go:470] [ 659: 659] Notified of signal 23 D0713 00:00:23.375264 762332 task_signals.go:220] [ 659: 659] Signal 23: delivering to handler D0713 00:00:23.392870 762332 task_signals.go:470] [ 659: 659] Notified of signal 23 D0713 00:00:23.395673 762332 task_signals.go:220] [ 659: 659] Signal 23: delivering to handler I0713 00:00:23.398075 762332 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0713 00:00:23.398373 762332 usertrap_amd64.go:212] [ 659: 659] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:23.398475 762332 usertrap_amd64.go:122] [ 659: 659] Allocate a new trap: 0xc0014ed0b0 14 D0713 00:00:23.398652 762332 usertrap_amd64.go:225] [ 659: 659] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:23.399134 762332 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.399461 762332 task_signals.go:204] [ 659: 663] Signal 659, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.399656 762332 task_signals.go:204] [ 659: 661] Signal 659, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.399810 762332 task_signals.go:204] [ 659: 660] Signal 659, PID: 660, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.399812 762332 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.400084 762332 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.400260 762332 task_signals.go:204] [ 659: 662] Signal 659, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.400314 762332 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.400585 762332 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.401270 762332 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.402139 762332 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.402251 762332 task_exit.go:204] [ 659: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.402423 762332 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.402482 762332 task_exit.go:204] [ 659: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.402629 762332 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.402709 762332 task_exit.go:204] [ 659: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.424799 762332 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.424957 762332 task_exit.go:204] [ 659: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.425474 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:23.426190 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:23.426325 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:23.426466 762332 task_exit.go:204] [ 659: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.434360 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:23.435630 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:23.453492 762332 syscalls.go:262] [ 664: 664] Allocating stack with size of 8388608 bytes D0713 00:00:23.456811 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:23.457675 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:23.463319 762332 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:23.463480 762332 usertrap_amd64.go:106] [ 664: 664] Map a usertrap vma at 61000 D0713 00:00:23.464267 762332 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc00202d3b0 1 D0713 00:00:23.464590 762332 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:23.467231 762332 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:23.467306 762332 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc00202d3b0 2 D0713 00:00:23.467434 762332 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:23.470404 762332 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:23.470464 762332 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc00202d3b0 3 D0713 00:00:23.470579 762332 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:23.510189 762332 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:23.510311 762332 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc00202d3b0 4 D0713 00:00:23.510522 762332 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:23.515882 762332 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:23.515959 762332 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc00202d3b0 5 D0713 00:00:23.516175 762332 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:23.516598 762332 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b214:sysno 13 D0713 00:00:23.516646 762332 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc00202d3b0 6 D0713 00:00:23.516832 762332 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:23.540335 762332 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:23.540496 762332 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc00202d3b0 7 D0713 00:00:23.540693 762332 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:23.542733 762332 usertrap_amd64.go:212] [ 664: 665] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:23.542851 762332 usertrap_amd64.go:122] [ 664: 665] Allocate a new trap: 0xc00202d3b0 8 D0713 00:00:23.543231 762332 usertrap_amd64.go:225] [ 664: 665] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:23.546070 762332 usertrap_amd64.go:212] [ 664: 665] Found the pattern at ip 46af76:sysno 35 D0713 00:00:23.546229 762332 usertrap_amd64.go:122] [ 664: 665] Allocate a new trap: 0xc00202d3b0 9 D0713 00:00:23.547330 762332 usertrap_amd64.go:225] [ 664: 665] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:23.547930 762332 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:23.548062 762332 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc00202d3b0 10 D0713 00:00:23.548280 762332 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:23.560411 762332 usertrap_amd64.go:212] [ 664: 665] Found the pattern at ip 46b020:sysno 39 D0713 00:00:23.560506 762332 usertrap_amd64.go:122] [ 664: 665] Allocate a new trap: 0xc00202d3b0 11 D0713 00:00:23.560676 762332 usertrap_amd64.go:225] [ 664: 665] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:23.561262 762332 usertrap_amd64.go:212] [ 664: 665] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:23.561409 762332 usertrap_amd64.go:122] [ 664: 665] Allocate a new trap: 0xc00202d3b0 12 D0713 00:00:23.561628 762332 usertrap_amd64.go:225] [ 664: 665] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:23.562206 762332 task_signals.go:470] [ 664: 664] Notified of signal 23 D0713 00:00:23.564275 762332 task_signals.go:220] [ 664: 664] Signal 23: delivering to handler D0713 00:00:23.566006 762332 task_signals.go:470] [ 664: 664] Notified of signal 23 D0713 00:00:23.566424 762332 task_signals.go:220] [ 664: 664] Signal 23: delivering to handler D0713 00:00:23.567929 762332 task_signals.go:470] [ 664: 664] Notified of signal 23 D0713 00:00:23.568084 762332 task_signals.go:220] [ 664: 664] Signal 23: delivering to handler D0713 00:00:23.569187 762332 task_signals.go:470] [ 664: 664] Notified of signal 23 D0713 00:00:23.572005 762332 task_signals.go:220] [ 664: 664] Signal 23: delivering to handler D0713 00:00:23.573202 762332 task_signals.go:470] [ 664: 664] Notified of signal 23 D0713 00:00:23.573552 762332 task_signals.go:220] [ 664: 664] Signal 23: delivering to handler D0713 00:00:23.587466 762332 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46af29:sysno 293 D0713 00:00:23.587554 762332 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc00202d3b0 13 D0713 00:00:23.587713 762332 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:23.588691 762332 task_signals.go:470] [ 664: 664] Notified of signal 23 D0713 00:00:23.589014 762332 task_signals.go:220] [ 664: 664] Signal 23: delivering to handler D0713 00:00:23.607168 762332 task_signals.go:470] [ 664: 664] Notified of signal 23 D0713 00:00:23.607974 762332 task_signals.go:220] [ 664: 664] Signal 23: delivering to handler I0713 00:00:23.609632 762332 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0713 00:00:23.609889 762332 usertrap_amd64.go:212] [ 664: 664] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:23.609950 762332 usertrap_amd64.go:122] [ 664: 664] Allocate a new trap: 0xc00202d3b0 14 D0713 00:00:23.610109 762332 usertrap_amd64.go:225] [ 664: 664] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:23.610500 762332 task_exit.go:204] [ 664: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.610806 762332 task_signals.go:204] [ 664: 666] Signal 664, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.610959 762332 task_signals.go:204] [ 664: 665] Signal 664, PID: 665, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.611038 762332 task_signals.go:204] [ 664: 667] Signal 664, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.611117 762332 task_signals.go:204] [ 664: 668] Signal 664, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.611131 762332 task_exit.go:204] [ 664: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.611402 762332 task_exit.go:204] [ 664: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.611587 762332 task_exit.go:204] [ 664: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.611976 762332 task_exit.go:204] [ 664: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.612187 762332 task_exit.go:204] [ 664: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.612519 762332 task_exit.go:204] [ 664: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.612578 762332 task_exit.go:204] [ 664: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.612924 762332 task_exit.go:204] [ 664: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.613024 762332 task_exit.go:204] [ 664: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.613244 762332 task_exit.go:204] [ 664: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.613360 762332 task_exit.go:204] [ 664: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.635137 762332 task_exit.go:204] [ 664: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.635239 762332 task_exit.go:204] [ 664: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.635616 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:23.635969 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:23.636050 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:23.636414 762332 task_exit.go:204] [ 664: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.646053 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:23.646288 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:23.667431 762332 syscalls.go:262] [ 669: 669] Allocating stack with size of 8388608 bytes D0713 00:00:23.671223 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:23.672017 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:23.677665 762332 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:23.677896 762332 usertrap_amd64.go:106] [ 669: 669] Map a usertrap vma at 68000 D0713 00:00:23.679088 762332 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc00202d710 1 D0713 00:00:23.679486 762332 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:23.682056 762332 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:23.682152 762332 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc00202d710 2 D0713 00:00:23.682304 762332 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:23.685813 762332 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:23.685879 762332 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc00202d710 3 D0713 00:00:23.686090 762332 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:23.713549 762332 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:23.713667 762332 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc00202d710 4 D0713 00:00:23.713847 762332 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:23.716607 762332 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:23.716669 762332 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc00202d710 5 D0713 00:00:23.716805 762332 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:23.717300 762332 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b214:sysno 13 D0713 00:00:23.717351 762332 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc00202d710 6 D0713 00:00:23.717540 762332 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:23.742217 762332 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:23.742328 762332 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc00202d710 7 D0713 00:00:23.742556 762332 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:23.744517 762332 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:23.744616 762332 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc00202d710 8 D0713 00:00:23.744843 762332 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:23.746761 762332 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46af76:sysno 35 D0713 00:00:23.746840 762332 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc00202d710 9 D0713 00:00:23.747069 762332 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:23.749728 762332 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:23.749847 762332 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc00202d710 10 D0713 00:00:23.750146 762332 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:23.762399 762332 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46b020:sysno 39 D0713 00:00:23.762486 762332 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc00202d710 11 D0713 00:00:23.762682 762332 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:23.763154 762332 usertrap_amd64.go:212] [ 669: 670] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:23.763246 762332 usertrap_amd64.go:122] [ 669: 670] Allocate a new trap: 0xc00202d710 12 D0713 00:00:23.764053 762332 usertrap_amd64.go:225] [ 669: 670] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:23.765322 762332 task_signals.go:470] [ 669: 669] Notified of signal 23 D0713 00:00:23.765643 762332 task_signals.go:220] [ 669: 669] Signal 23: delivering to handler D0713 00:00:23.772087 762332 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46af29:sysno 293 D0713 00:00:23.772236 762332 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc00202d710 13 D0713 00:00:23.772519 762332 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:23.777546 762332 task_signals.go:470] [ 669: 669] Notified of signal 23 D0713 00:00:23.780598 762332 task_signals.go:220] [ 669: 669] Signal 23: delivering to handler D0713 00:00:23.794887 762332 task_signals.go:470] [ 669: 669] Notified of signal 23 D0713 00:00:23.795189 762332 task_signals.go:179] [ 669: 669] Restarting syscall 202: interrupted by signal 23 D0713 00:00:23.795280 762332 task_signals.go:220] [ 669: 669] Signal 23: delivering to handler I0713 00:00:23.796991 762332 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0713 00:00:23.797256 762332 usertrap_amd64.go:212] [ 669: 669] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:23.797306 762332 usertrap_amd64.go:122] [ 669: 669] Allocate a new trap: 0xc00202d710 14 D0713 00:00:23.797473 762332 usertrap_amd64.go:225] [ 669: 669] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:23.797875 762332 task_exit.go:204] [ 669: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.798428 762332 task_signals.go:204] [ 669: 672] Signal 669, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.798467 762332 task_signals.go:204] [ 669: 673] Signal 669, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.798700 762332 task_signals.go:204] [ 669: 671] Signal 669, PID: 671, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.798952 762332 task_exit.go:204] [ 669: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.799159 762332 task_signals.go:204] [ 669: 670] Signal 669, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.799377 762332 task_exit.go:204] [ 669: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.799735 762332 task_exit.go:204] [ 669: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.800246 762332 task_exit.go:204] [ 669: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.800448 762332 task_exit.go:204] [ 669: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.801081 762332 task_exit.go:204] [ 669: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.801197 762332 task_exit.go:204] [ 669: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.801504 762332 task_exit.go:204] [ 669: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.801594 762332 task_exit.go:204] [ 669: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.801861 762332 task_exit.go:204] [ 669: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.801945 762332 task_exit.go:204] [ 669: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.823342 762332 task_exit.go:204] [ 669: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.823437 762332 task_exit.go:204] [ 669: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.823621 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:23.825218 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:23.825317 762332 task_exit.go:204] [ 669: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.825335 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:23.833616 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:23.837535 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:23.857034 762332 syscalls.go:262] [ 674: 674] Allocating stack with size of 8388608 bytes D0713 00:00:23.860544 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:23.861241 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:23.864775 762332 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:23.865012 762332 usertrap_amd64.go:106] [ 674: 674] Map a usertrap vma at 60000 D0713 00:00:23.866021 762332 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000d99500 1 D0713 00:00:23.866518 762332 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:23.869082 762332 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:23.869189 762332 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000d99500 2 D0713 00:00:23.869376 762332 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:23.872503 762332 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:23.872600 762332 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000d99500 3 D0713 00:00:23.872763 762332 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:23.893939 762332 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:23.894089 762332 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000d99500 4 D0713 00:00:23.894314 762332 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:23.898113 762332 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:23.898216 762332 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000d99500 5 D0713 00:00:23.898376 762332 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:23.898897 762332 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b214:sysno 13 D0713 00:00:23.898987 762332 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000d99500 6 D0713 00:00:23.899119 762332 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:23.920047 762332 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:23.920167 762332 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000d99500 7 D0713 00:00:23.920347 762332 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:23.922341 762332 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:23.922438 762332 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc000d99500 8 D0713 00:00:23.922760 762332 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:23.926504 762332 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46af76:sysno 35 D0713 00:00:23.926603 762332 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc000d99500 9 D0713 00:00:23.927667 762332 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:23.928192 762332 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:23.928283 762332 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000d99500 10 D0713 00:00:23.928543 762332 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:23.940535 762332 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46b020:sysno 39 D0713 00:00:23.940667 762332 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc000d99500 11 D0713 00:00:23.940923 762332 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:23.942839 762332 usertrap_amd64.go:212] [ 674: 675] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:23.942916 762332 usertrap_amd64.go:122] [ 674: 675] Allocate a new trap: 0xc000d99500 12 D0713 00:00:23.943093 762332 usertrap_amd64.go:225] [ 674: 675] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:23.943619 762332 task_signals.go:470] [ 674: 674] Notified of signal 23 D0713 00:00:23.944113 762332 task_signals.go:220] [ 674: 674] Signal 23: delivering to handler D0713 00:00:23.951041 762332 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46af29:sysno 293 D0713 00:00:23.951115 762332 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000d99500 13 D0713 00:00:23.951289 762332 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:23.957560 762332 task_signals.go:470] [ 674: 674] Notified of signal 23 D0713 00:00:23.959844 762332 task_signals.go:220] [ 674: 674] Signal 23: delivering to handler D0713 00:00:23.973583 762332 usertrap_amd64.go:212] [ 674: 674] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:23.973664 762332 usertrap_amd64.go:122] [ 674: 674] Allocate a new trap: 0xc000d99500 14 D0713 00:00:23.973851 762332 usertrap_amd64.go:225] [ 674: 674] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:23.974309 762332 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.974777 762332 task_signals.go:204] [ 674: 676] Signal 674, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.974981 762332 task_signals.go:204] [ 674: 675] Signal 674, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.975179 762332 task_exit.go:204] [ 674: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.975372 762332 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.975543 762332 task_signals.go:204] [ 674: 678] Signal 674, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.975578 762332 task_signals.go:204] [ 674: 677] Signal 674, PID: 677, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:23.975726 762332 task_exit.go:204] [ 674: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.975922 762332 task_exit.go:204] [ 674: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.976309 762332 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:23.977329 762332 task_exit.go:204] [ 674: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.977461 762332 task_exit.go:204] [ 674: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.977832 762332 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.977899 762332 task_exit.go:204] [ 674: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:23.978101 762332 task_exit.go:204] [ 674: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:23.978206 762332 task_exit.go:204] [ 674: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.000232 762332 task_exit.go:204] [ 674: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.000323 762332 task_exit.go:204] [ 674: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.000567 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:24.001032 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:24.001125 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:24.001475 762332 task_exit.go:204] [ 674: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.009867 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.011296 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:24.032789 762332 syscalls.go:262] [ 679: 679] Allocating stack with size of 8388608 bytes D0713 00:00:24.036231 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.036776 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:24.040076 762332 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:24.040240 762332 usertrap_amd64.go:106] [ 679: 679] Map a usertrap vma at 60000 D0713 00:00:24.040976 762332 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00202d9e0 1 D0713 00:00:24.041226 762332 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:24.043250 762332 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:24.043320 762332 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00202d9e0 2 D0713 00:00:24.043444 762332 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:24.046370 762332 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:24.046455 762332 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00202d9e0 3 D0713 00:00:24.046664 762332 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:24.072462 762332 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:24.072547 762332 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00202d9e0 4 D0713 00:00:24.072695 762332 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:24.077315 762332 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:24.077385 762332 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00202d9e0 5 D0713 00:00:24.077506 762332 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:24.077910 762332 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b214:sysno 13 D0713 00:00:24.077954 762332 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00202d9e0 6 D0713 00:00:24.078091 762332 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:24.102241 762332 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:24.102348 762332 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00202d9e0 7 D0713 00:00:24.102481 762332 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:24.104283 762332 usertrap_amd64.go:212] [ 679: 680] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:24.104371 762332 usertrap_amd64.go:122] [ 679: 680] Allocate a new trap: 0xc00202d9e0 8 D0713 00:00:24.104549 762332 usertrap_amd64.go:225] [ 679: 680] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:24.107103 762332 usertrap_amd64.go:212] [ 679: 680] Found the pattern at ip 46af76:sysno 35 D0713 00:00:24.107192 762332 usertrap_amd64.go:122] [ 679: 680] Allocate a new trap: 0xc00202d9e0 9 D0713 00:00:24.107372 762332 usertrap_amd64.go:225] [ 679: 680] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:24.109392 762332 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:24.109478 762332 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00202d9e0 10 D0713 00:00:24.109722 762332 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:24.122809 762332 usertrap_amd64.go:212] [ 679: 680] Found the pattern at ip 46b020:sysno 39 D0713 00:00:24.122913 762332 usertrap_amd64.go:122] [ 679: 680] Allocate a new trap: 0xc00202d9e0 11 D0713 00:00:24.123080 762332 usertrap_amd64.go:225] [ 679: 680] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:24.125018 762332 usertrap_amd64.go:212] [ 679: 680] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:24.125093 762332 usertrap_amd64.go:122] [ 679: 680] Allocate a new trap: 0xc00202d9e0 12 D0713 00:00:24.125371 762332 usertrap_amd64.go:225] [ 679: 680] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:24.127093 762332 task_signals.go:470] [ 679: 679] Notified of signal 23 D0713 00:00:24.127716 762332 task_signals.go:220] [ 679: 679] Signal 23: delivering to handler D0713 00:00:24.133090 762332 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46af29:sysno 293 D0713 00:00:24.133150 762332 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00202d9e0 13 D0713 00:00:24.133290 762332 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:24.138246 762332 task_signals.go:470] [ 679: 679] Notified of signal 23 D0713 00:00:24.140609 762332 task_signals.go:220] [ 679: 679] Signal 23: delivering to handler D0713 00:00:24.155467 762332 usertrap_amd64.go:212] [ 679: 679] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:24.155595 762332 usertrap_amd64.go:122] [ 679: 679] Allocate a new trap: 0xc00202d9e0 14 D0713 00:00:24.155795 762332 usertrap_amd64.go:225] [ 679: 679] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:24.156353 762332 task_exit.go:204] [ 679: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.156869 762332 task_signals.go:204] [ 679: 683] Signal 679, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.157081 762332 task_signals.go:204] [ 679: 681] Signal 679, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.157120 762332 task_signals.go:204] [ 679: 682] Signal 679, PID: 682, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.157269 762332 task_exit.go:204] [ 679: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.157395 762332 task_signals.go:204] [ 679: 680] Signal 679, PID: 680, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.157462 762332 task_exit.go:204] [ 679: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.157763 762332 task_exit.go:204] [ 679: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.157980 762332 task_exit.go:204] [ 679: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.158542 762332 task_exit.go:204] [ 679: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.159545 762332 task_exit.go:204] [ 679: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.159611 762332 task_exit.go:204] [ 679: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.159913 762332 task_exit.go:204] [ 679: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.159975 762332 task_exit.go:204] [ 679: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.160135 762332 task_exit.go:204] [ 679: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.160180 762332 task_exit.go:204] [ 679: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.180935 762332 task_exit.go:204] [ 679: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.181078 762332 task_exit.go:204] [ 679: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.181322 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:24.181741 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:24.181851 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:24.182069 762332 task_exit.go:204] [ 679: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.189964 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.192585 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:24.213883 762332 syscalls.go:262] [ 684: 684] Allocating stack with size of 8388608 bytes D0713 00:00:24.217814 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.218336 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:24.223550 762332 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:24.223743 762332 usertrap_amd64.go:106] [ 684: 684] Map a usertrap vma at 62000 D0713 00:00:24.224794 762332 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc000d997d0 1 D0713 00:00:24.225285 762332 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:24.227489 762332 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:24.227547 762332 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc000d997d0 2 D0713 00:00:24.227730 762332 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:24.230537 762332 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:24.230659 762332 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc000d997d0 3 D0713 00:00:24.230899 762332 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:24.255191 762332 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:24.255337 762332 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc000d997d0 4 D0713 00:00:24.255584 762332 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:24.258969 762332 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:24.259073 762332 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc000d997d0 5 D0713 00:00:24.259237 762332 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:24.259867 762332 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b214:sysno 13 D0713 00:00:24.259946 762332 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc000d997d0 6 D0713 00:00:24.260124 762332 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:24.285083 762332 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:24.285165 762332 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc000d997d0 7 D0713 00:00:24.285341 762332 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:24.286964 762332 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:24.287037 762332 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc000d997d0 8 D0713 00:00:24.287249 762332 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:24.289960 762332 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46af76:sysno 35 D0713 00:00:24.290032 762332 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc000d997d0 9 D0713 00:00:24.290196 762332 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:24.291439 762332 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:24.291596 762332 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc000d997d0 10 D0713 00:00:24.291880 762332 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:24.311627 762332 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46b020:sysno 39 D0713 00:00:24.311838 762332 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc000d997d0 11 D0713 00:00:24.312421 762332 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:24.312896 762332 usertrap_amd64.go:212] [ 684: 685] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:24.313029 762332 usertrap_amd64.go:122] [ 684: 685] Allocate a new trap: 0xc000d997d0 12 D0713 00:00:24.313206 762332 usertrap_amd64.go:225] [ 684: 685] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:24.313654 762332 task_signals.go:470] [ 684: 684] Notified of signal 23 D0713 00:00:24.313903 762332 task_signals.go:220] [ 684: 684] Signal 23: delivering to handler D0713 00:00:24.327597 762332 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46af29:sysno 293 D0713 00:00:24.327690 762332 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc000d997d0 13 D0713 00:00:24.327933 762332 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:24.327982 762332 task_signals.go:470] [ 684: 684] Notified of signal 23 D0713 00:00:24.328275 762332 task_signals.go:220] [ 684: 684] Signal 23: delivering to handler D0713 00:00:24.330542 762332 task_signals.go:470] [ 684: 684] Notified of signal 23 D0713 00:00:24.330913 762332 task_signals.go:179] [ 684: 684] Restarting syscall 202: interrupted by signal 23 D0713 00:00:24.330999 762332 task_signals.go:220] [ 684: 684] Signal 23: delivering to handler D0713 00:00:24.347361 762332 task_signals.go:470] [ 684: 684] Notified of signal 23 D0713 00:00:24.350709 762332 task_signals.go:220] [ 684: 684] Signal 23: delivering to handler D0713 00:00:24.359310 762332 usertrap_amd64.go:212] [ 684: 684] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:24.359423 762332 usertrap_amd64.go:122] [ 684: 684] Allocate a new trap: 0xc000d997d0 14 D0713 00:00:24.359660 762332 usertrap_amd64.go:225] [ 684: 684] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:24.360565 762332 task_exit.go:204] [ 684: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.361109 762332 task_signals.go:204] [ 684: 687] Signal 684, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.361254 762332 task_signals.go:204] [ 684: 685] Signal 684, PID: 685, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.361163 762332 task_signals.go:204] [ 684: 689] Signal 684, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.361614 762332 task_signals.go:204] [ 684: 688] Signal 684, PID: 688, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.361826 762332 task_exit.go:204] [ 684: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.362030 762332 task_exit.go:204] [ 684: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.362454 762332 task_exit.go:204] [ 684: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.362520 762332 task_exit.go:204] [ 684: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.362746 762332 task_exit.go:204] [ 684: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.363175 762332 task_exit.go:204] [ 684: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.363240 762332 task_exit.go:204] [ 684: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.363466 762332 task_exit.go:204] [ 684: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.363878 762332 task_exit.go:204] [ 684: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.363957 762332 task_exit.go:204] [ 684: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.364162 762332 task_exit.go:204] [ 684: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.364543 762332 task_exit.go:204] [ 684: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.364606 762332 task_exit.go:204] [ 684: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.364814 762332 task_signals.go:204] [ 684: 686] Signal 684, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.365047 762332 task_exit.go:204] [ 684: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.390098 762332 task_exit.go:204] [ 684: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.390246 762332 task_exit.go:204] [ 684: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.390663 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:24.391291 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:24.391447 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:24.391935 762332 task_exit.go:204] [ 684: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.400632 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.402403 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:24.421728 762332 syscalls.go:262] [ 690: 690] Allocating stack with size of 8388608 bytes D0713 00:00:24.425491 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.426168 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:24.430521 762332 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:24.430695 762332 usertrap_amd64.go:106] [ 690: 690] Map a usertrap vma at 67000 D0713 00:00:24.432792 762332 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000d58f60 1 D0713 00:00:24.433216 762332 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:24.437569 762332 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:24.437645 762332 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000d58f60 2 D0713 00:00:24.437855 762332 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:24.442715 762332 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:24.442783 762332 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000d58f60 3 D0713 00:00:24.442882 762332 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:24.465100 762332 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:24.465207 762332 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000d58f60 4 D0713 00:00:24.465370 762332 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:24.468965 762332 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:24.469084 762332 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000d58f60 5 D0713 00:00:24.469254 762332 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:24.469695 762332 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b214:sysno 13 D0713 00:00:24.469778 762332 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000d58f60 6 D0713 00:00:24.469943 762332 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:24.492047 762332 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:24.492126 762332 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000d58f60 7 D0713 00:00:24.492248 762332 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:24.494063 762332 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:24.494188 762332 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000d58f60 8 D0713 00:00:24.494486 762332 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:24.496565 762332 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46af76:sysno 35 D0713 00:00:24.496653 762332 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000d58f60 9 D0713 00:00:24.496891 762332 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:24.498551 762332 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:24.498628 762332 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000d58f60 10 D0713 00:00:24.498823 762332 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:24.499833 762332 usertrap_amd64.go:212] [ 690: 693] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:24.499912 762332 usertrap_amd64.go:122] [ 690: 693] Allocate a new trap: 0xc000d58f60 11 D0713 00:00:24.500122 762332 usertrap_amd64.go:225] [ 690: 693] Apply the binary patch addr 46b6e0 trap addr 67370 ([184 24 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:24.512426 762332 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b020:sysno 39 D0713 00:00:24.512552 762332 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000d58f60 12 D0713 00:00:24.512823 762332 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:24.513352 762332 usertrap_amd64.go:212] [ 690: 691] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:24.513406 762332 usertrap_amd64.go:122] [ 690: 691] Allocate a new trap: 0xc000d58f60 13 D0713 00:00:24.514151 762332 usertrap_amd64.go:225] [ 690: 691] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:24.515315 762332 task_signals.go:470] [ 690: 690] Notified of signal 23 D0713 00:00:24.515924 762332 task_signals.go:220] [ 690: 690] Signal 23: delivering to handler D0713 00:00:24.524725 762332 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46af29:sysno 293 D0713 00:00:24.524809 762332 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000d58f60 14 D0713 00:00:24.525069 762332 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46af29 trap addr 67460 ([184 37 1 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:24.526340 762332 task_signals.go:470] [ 690: 690] Notified of signal 23 D0713 00:00:24.527201 762332 task_signals.go:220] [ 690: 690] Signal 23: delivering to handler D0713 00:00:24.540642 762332 task_signals.go:470] [ 690: 690] Notified of signal 23 D0713 00:00:24.542587 762332 task_signals.go:220] [ 690: 690] Signal 23: delivering to handler D0713 00:00:24.550007 762332 usertrap_amd64.go:212] [ 690: 690] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:24.550098 762332 usertrap_amd64.go:122] [ 690: 690] Allocate a new trap: 0xc000d58f60 15 D0713 00:00:24.550302 762332 usertrap_amd64.go:225] [ 690: 690] Apply the binary patch addr 46ae44 trap addr 674b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 116 6 0]) D0713 00:00:24.550941 762332 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.551353 762332 task_signals.go:204] [ 690: 694] Signal 690, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.551439 762332 task_signals.go:204] [ 690: 691] Signal 690, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.551619 762332 task_signals.go:204] [ 690: 695] Signal 690, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.551827 762332 task_signals.go:204] [ 690: 692] Signal 690, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.551894 762332 task_exit.go:204] [ 690: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.552058 762332 task_signals.go:204] [ 690: 693] Signal 690, PID: 693, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.552455 762332 task_exit.go:204] [ 690: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.552543 762332 task_exit.go:204] [ 690: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.552757 762332 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.552999 762332 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.553152 762332 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.553345 762332 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.553509 762332 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.554422 762332 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.554511 762332 task_exit.go:204] [ 690: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.555063 762332 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.555163 762332 task_exit.go:204] [ 690: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.555415 762332 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.555529 762332 task_exit.go:204] [ 690: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.579015 762332 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.579159 762332 task_exit.go:204] [ 690: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.579413 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:24.579734 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:24.579820 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:24.580030 762332 task_exit.go:204] [ 690: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.587870 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.590236 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:24.613015 762332 syscalls.go:262] [ 696: 696] Allocating stack with size of 8388608 bytes D0713 00:00:24.616871 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.617690 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:24.621444 762332 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:24.621675 762332 usertrap_amd64.go:106] [ 696: 696] Map a usertrap vma at 60000 D0713 00:00:24.622753 762332 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000bad800 1 D0713 00:00:24.623179 762332 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:24.625561 762332 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:24.625654 762332 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000bad800 2 D0713 00:00:24.625819 762332 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:24.628499 762332 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:24.628576 762332 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000bad800 3 D0713 00:00:24.628690 762332 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:24.653348 762332 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:24.653516 762332 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000bad800 4 D0713 00:00:24.653771 762332 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:24.657742 762332 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:24.657840 762332 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000bad800 5 D0713 00:00:24.658043 762332 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:24.658552 762332 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b214:sysno 13 D0713 00:00:24.658634 762332 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000bad800 6 D0713 00:00:24.658797 762332 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:24.681111 762332 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:24.681220 762332 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000bad800 7 D0713 00:00:24.681385 762332 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:24.683404 762332 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:24.683497 762332 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc000bad800 8 D0713 00:00:24.683720 762332 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:24.687075 762332 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:24.687159 762332 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000bad800 9 D0713 00:00:24.688303 762332 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:24.688882 762332 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46af76:sysno 35 D0713 00:00:24.688999 762332 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc000bad800 10 D0713 00:00:24.689269 762332 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:24.701198 762332 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46b020:sysno 39 D0713 00:00:24.701276 762332 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc000bad800 11 D0713 00:00:24.701467 762332 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:24.702317 762332 usertrap_amd64.go:212] [ 696: 697] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:24.702473 762332 usertrap_amd64.go:122] [ 696: 697] Allocate a new trap: 0xc000bad800 12 D0713 00:00:24.703747 762332 usertrap_amd64.go:225] [ 696: 697] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:24.704918 762332 task_signals.go:470] [ 696: 696] Notified of signal 23 D0713 00:00:24.705235 762332 task_signals.go:220] [ 696: 696] Signal 23: delivering to handler D0713 00:00:24.711936 762332 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46af29:sysno 293 D0713 00:00:24.712060 762332 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000bad800 13 D0713 00:00:24.712254 762332 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:24.717226 762332 task_signals.go:470] [ 696: 696] Notified of signal 23 D0713 00:00:24.719529 762332 task_signals.go:220] [ 696: 696] Signal 23: delivering to handler D0713 00:00:24.732895 762332 usertrap_amd64.go:212] [ 696: 696] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:24.733009 762332 usertrap_amd64.go:122] [ 696: 696] Allocate a new trap: 0xc000bad800 14 D0713 00:00:24.733194 762332 usertrap_amd64.go:225] [ 696: 696] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:24.733670 762332 task_exit.go:204] [ 696: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.734129 762332 task_signals.go:204] [ 696: 697] Signal 696, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.734159 762332 task_signals.go:204] [ 696: 699] Signal 696, PID: 699, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.734346 762332 task_signals.go:204] [ 696: 700] Signal 696, PID: 700, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.734529 762332 task_exit.go:204] [ 696: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.734777 762332 task_exit.go:204] [ 696: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.734947 762332 task_signals.go:204] [ 696: 698] Signal 696, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.735081 762332 task_exit.go:204] [ 696: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.735480 762332 task_exit.go:204] [ 696: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.735532 762332 task_exit.go:204] [ 696: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.736239 762332 task_exit.go:204] [ 696: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.736595 762332 task_exit.go:204] [ 696: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.736665 762332 task_exit.go:204] [ 696: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.736871 762332 task_exit.go:204] [ 696: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.736985 762332 task_exit.go:204] [ 696: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.737043 762332 task_exit.go:204] [ 696: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.756158 762332 task_exit.go:204] [ 696: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.756232 762332 task_exit.go:204] [ 696: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.756416 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:24.756839 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:24.757008 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:24.757056 762332 task_exit.go:204] [ 696: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.764194 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.767712 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:24.784261 762332 syscalls.go:262] [ 701: 701] Allocating stack with size of 8388608 bytes D0713 00:00:24.787677 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.788281 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:24.806402 762332 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:24.806589 762332 usertrap_amd64.go:106] [ 701: 701] Map a usertrap vma at 64000 D0713 00:00:24.807662 762332 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000d59710 1 D0713 00:00:24.808031 762332 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:24.811300 762332 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:24.811449 762332 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000d59710 2 D0713 00:00:24.811666 762332 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:24.814813 762332 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:24.814882 762332 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000d59710 3 D0713 00:00:24.815053 762332 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:24.838857 762332 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:24.838979 762332 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000d59710 4 D0713 00:00:24.839191 762332 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:24.842791 762332 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:24.842873 762332 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000d59710 5 D0713 00:00:24.843058 762332 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:24.843509 762332 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b214:sysno 13 D0713 00:00:24.843567 762332 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000d59710 6 D0713 00:00:24.843704 762332 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:24.863691 762332 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:24.863760 762332 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000d59710 7 D0713 00:00:24.863869 762332 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:24.865176 762332 usertrap_amd64.go:212] [ 701: 702] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:24.865256 762332 usertrap_amd64.go:122] [ 701: 702] Allocate a new trap: 0xc000d59710 8 D0713 00:00:24.865473 762332 usertrap_amd64.go:225] [ 701: 702] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:24.868000 762332 usertrap_amd64.go:212] [ 701: 703] Found the pattern at ip 46af76:sysno 35 D0713 00:00:24.868076 762332 usertrap_amd64.go:122] [ 701: 703] Allocate a new trap: 0xc000d59710 9 D0713 00:00:24.868256 762332 usertrap_amd64.go:225] [ 701: 703] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:24.872640 762332 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:24.872762 762332 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000d59710 10 D0713 00:00:24.873085 762332 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:24.881757 762332 usertrap_amd64.go:212] [ 701: 702] Found the pattern at ip 46b020:sysno 39 D0713 00:00:24.881846 762332 usertrap_amd64.go:122] [ 701: 702] Allocate a new trap: 0xc000d59710 11 D0713 00:00:24.882153 762332 usertrap_amd64.go:225] [ 701: 702] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:24.882750 762332 usertrap_amd64.go:212] [ 701: 702] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:24.882834 762332 usertrap_amd64.go:122] [ 701: 702] Allocate a new trap: 0xc000d59710 12 D0713 00:00:24.883542 762332 usertrap_amd64.go:225] [ 701: 702] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:24.884222 762332 task_signals.go:470] [ 701: 701] Notified of signal 23 D0713 00:00:24.884564 762332 task_signals.go:220] [ 701: 701] Signal 23: delivering to handler D0713 00:00:24.895679 762332 task_signals.go:470] [ 701: 701] Notified of signal 23 D0713 00:00:24.896268 762332 task_signals.go:220] [ 701: 701] Signal 23: delivering to handler D0713 00:00:24.897569 762332 task_signals.go:481] [ 701: 701] No task notified of signal 23 D0713 00:00:24.897815 762332 task_signals.go:220] [ 701: 701] Signal 23: delivering to handler D0713 00:00:24.899369 762332 task_signals.go:470] [ 701: 701] Notified of signal 23 D0713 00:00:24.901237 762332 task_signals.go:220] [ 701: 701] Signal 23: delivering to handler D0713 00:00:24.910370 762332 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46af29:sysno 293 D0713 00:00:24.910452 762332 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000d59710 13 D0713 00:00:24.910695 762332 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:24.917319 762332 task_signals.go:470] [ 701: 701] Notified of signal 23 D0713 00:00:24.919501 762332 task_signals.go:220] [ 701: 701] Signal 23: delivering to handler D0713 00:00:24.934481 762332 usertrap_amd64.go:212] [ 701: 701] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:24.934569 762332 usertrap_amd64.go:122] [ 701: 701] Allocate a new trap: 0xc000d59710 14 D0713 00:00:24.934744 762332 usertrap_amd64.go:225] [ 701: 701] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:24.935220 762332 task_exit.go:204] [ 701: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.935711 762332 task_signals.go:204] [ 701: 703] Signal 701, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.935957 762332 task_signals.go:204] [ 701: 704] Signal 701, PID: 704, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.936032 762332 task_signals.go:204] [ 701: 705] Signal 701, PID: 705, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.935715 762332 task_signals.go:204] [ 701: 702] Signal 701, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:24.936109 762332 task_exit.go:204] [ 701: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.936321 762332 task_exit.go:204] [ 701: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.936671 762332 task_exit.go:204] [ 701: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.937163 762332 task_exit.go:204] [ 701: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.938007 762332 task_exit.go:204] [ 701: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:24.938457 762332 task_exit.go:204] [ 701: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.938546 762332 task_exit.go:204] [ 701: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.938976 762332 task_exit.go:204] [ 701: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.939073 762332 task_exit.go:204] [ 701: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.939430 762332 task_exit.go:204] [ 701: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.939546 762332 task_exit.go:204] [ 701: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.962335 762332 task_exit.go:204] [ 701: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:24.962445 762332 task_exit.go:204] [ 701: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.962692 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:24.963031 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:24.963135 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:24.963298 762332 task_exit.go:204] [ 701: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:24.970054 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.972925 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:24.990105 762332 syscalls.go:262] [ 706: 706] Allocating stack with size of 8388608 bytes D0713 00:00:24.993261 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:24.993949 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:24.997785 762332 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:24.997984 762332 usertrap_amd64.go:106] [ 706: 706] Map a usertrap vma at 66000 D0713 00:00:24.998834 762332 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc0014edcb0 1 D0713 00:00:24.999124 762332 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:25.000995 762332 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:25.001051 762332 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc0014edcb0 2 D0713 00:00:25.001181 762332 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:25.004077 762332 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:25.004141 762332 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc0014edcb0 3 D0713 00:00:25.004253 762332 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:25.026370 762332 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:25.026436 762332 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc0014edcb0 4 D0713 00:00:25.026575 762332 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:25.029180 762332 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:25.029244 762332 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc0014edcb0 5 D0713 00:00:25.029389 762332 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:25.029742 762332 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b214:sysno 13 D0713 00:00:25.029791 762332 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc0014edcb0 6 D0713 00:00:25.029918 762332 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:25.052087 762332 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:25.052176 762332 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc0014edcb0 7 D0713 00:00:25.052358 762332 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:25.054103 762332 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:25.054189 762332 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc0014edcb0 8 D0713 00:00:25.054418 762332 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:25.056087 762332 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46af76:sysno 35 D0713 00:00:25.056161 762332 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc0014edcb0 9 D0713 00:00:25.056410 762332 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:25.058236 762332 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:25.058316 762332 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc0014edcb0 10 D0713 00:00:25.058537 762332 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:25.072505 762332 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b020:sysno 39 D0713 00:00:25.072597 762332 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc0014edcb0 11 D0713 00:00:25.072786 762332 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:25.073708 762332 usertrap_amd64.go:212] [ 706: 707] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:25.073792 762332 usertrap_amd64.go:122] [ 706: 707] Allocate a new trap: 0xc0014edcb0 12 D0713 00:00:25.074030 762332 usertrap_amd64.go:225] [ 706: 707] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:25.074588 762332 task_signals.go:470] [ 706: 706] Notified of signal 23 D0713 00:00:25.074836 762332 task_signals.go:220] [ 706: 706] Signal 23: delivering to handler D0713 00:00:25.080365 762332 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46af29:sysno 293 D0713 00:00:25.080445 762332 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc0014edcb0 13 D0713 00:00:25.080565 762332 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:25.089788 762332 task_signals.go:470] [ 706: 706] Notified of signal 23 D0713 00:00:25.089957 762332 task_signals.go:220] [ 706: 706] Signal 23: delivering to handler D0713 00:00:25.103695 762332 usertrap_amd64.go:212] [ 706: 706] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:25.103825 762332 usertrap_amd64.go:122] [ 706: 706] Allocate a new trap: 0xc0014edcb0 14 D0713 00:00:25.103995 762332 usertrap_amd64.go:225] [ 706: 706] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:25.104713 762332 task_exit.go:204] [ 706: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.105030 762332 task_signals.go:204] [ 706: 707] Signal 706, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.105470 762332 task_signals.go:204] [ 706: 708] Signal 706, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.105889 762332 task_signals.go:204] [ 706: 711] Signal 706, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.106115 762332 task_signals.go:204] [ 706: 710] Signal 706, PID: 710, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.106334 762332 task_signals.go:204] [ 706: 709] Signal 706, PID: 709, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.106460 762332 task_exit.go:204] [ 706: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.106649 762332 task_exit.go:204] [ 706: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.106916 762332 task_exit.go:204] [ 706: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.107204 762332 task_exit.go:204] [ 706: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.107374 762332 task_exit.go:204] [ 706: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.107521 762332 task_exit.go:204] [ 706: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.108642 762332 task_exit.go:204] [ 706: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.108735 762332 task_exit.go:204] [ 706: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.109236 762332 task_exit.go:204] [ 706: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.109313 762332 task_exit.go:204] [ 706: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.109721 762332 task_exit.go:204] [ 706: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.109787 762332 task_exit.go:204] [ 706: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.109932 762332 task_exit.go:204] [ 706: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.109977 762332 task_exit.go:204] [ 706: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.132978 762332 task_exit.go:204] [ 706: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.133094 762332 task_exit.go:204] [ 706: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.133372 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:25.133805 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:25.133889 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:25.134030 762332 task_exit.go:204] [ 706: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.142546 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.143513 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:25.165121 762332 syscalls.go:262] [ 712: 712] Allocating stack with size of 8388608 bytes D0713 00:00:25.169445 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.170375 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:25.175893 762332 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:25.176087 762332 usertrap_amd64.go:106] [ 712: 712] Map a usertrap vma at 63000 D0713 00:00:25.177019 762332 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000badef0 1 D0713 00:00:25.177315 762332 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:25.179283 762332 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:25.179339 762332 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000badef0 2 D0713 00:00:25.179448 762332 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:25.182752 762332 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:25.182838 762332 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000badef0 3 D0713 00:00:25.183036 762332 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:25.206075 762332 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:25.206160 762332 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000badef0 4 D0713 00:00:25.206343 762332 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:25.209834 762332 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:25.209907 762332 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000badef0 5 D0713 00:00:25.210067 762332 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:25.210538 762332 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b214:sysno 13 D0713 00:00:25.210616 762332 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000badef0 6 D0713 00:00:25.210792 762332 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:25.232182 762332 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:25.232260 762332 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000badef0 7 D0713 00:00:25.232409 762332 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:25.234545 762332 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:25.234684 762332 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc000badef0 8 D0713 00:00:25.235076 762332 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:25.237813 762332 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46af76:sysno 35 D0713 00:00:25.237879 762332 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc000badef0 9 D0713 00:00:25.238050 762332 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:25.239521 762332 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:25.239624 762332 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000badef0 10 D0713 00:00:25.240551 762332 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:25.252869 762332 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46b020:sysno 39 D0713 00:00:25.252973 762332 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc000badef0 11 D0713 00:00:25.253100 762332 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:25.253997 762332 usertrap_amd64.go:212] [ 712: 713] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:25.254077 762332 usertrap_amd64.go:122] [ 712: 713] Allocate a new trap: 0xc000badef0 12 D0713 00:00:25.254905 762332 usertrap_amd64.go:225] [ 712: 713] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:25.255432 762332 task_signals.go:470] [ 712: 712] Notified of signal 23 D0713 00:00:25.255668 762332 task_signals.go:220] [ 712: 712] Signal 23: delivering to handler D0713 00:00:25.263177 762332 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46af29:sysno 293 D0713 00:00:25.263263 762332 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000badef0 13 D0713 00:00:25.263390 762332 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:25.268673 762332 task_signals.go:470] [ 712: 712] Notified of signal 23 D0713 00:00:25.270910 762332 task_signals.go:220] [ 712: 712] Signal 23: delivering to handler I0713 00:00:25.288642 762332 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0713 00:00:25.289081 762332 usertrap_amd64.go:212] [ 712: 712] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:25.289168 762332 usertrap_amd64.go:122] [ 712: 712] Allocate a new trap: 0xc000badef0 14 D0713 00:00:25.289402 762332 usertrap_amd64.go:225] [ 712: 712] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:25.290204 762332 task_exit.go:204] [ 712: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.290657 762332 task_signals.go:204] [ 712: 713] Signal 712, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.290708 762332 task_signals.go:204] [ 712: 716] Signal 712, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.291198 762332 task_exit.go:204] [ 712: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.291431 762332 task_signals.go:204] [ 712: 714] Signal 712, PID: 714, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.291454 762332 task_signals.go:204] [ 712: 715] Signal 712, PID: 715, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.291610 762332 task_exit.go:204] [ 712: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.291989 762332 task_exit.go:204] [ 712: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.292499 762332 task_exit.go:204] [ 712: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.293023 762332 task_exit.go:204] [ 712: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.293324 762332 task_exit.go:204] [ 712: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.293399 762332 task_exit.go:204] [ 712: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.293676 762332 task_exit.go:204] [ 712: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.293735 762332 task_exit.go:204] [ 712: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.294289 762332 task_exit.go:204] [ 712: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.294343 762332 task_exit.go:204] [ 712: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.315244 762332 task_exit.go:204] [ 712: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.315370 762332 task_exit.go:204] [ 712: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.315815 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:25.316281 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:25.316437 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:25.316896 762332 task_exit.go:204] [ 712: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.323281 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.325823 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:25.340619 762332 syscalls.go:262] [ 717: 717] Allocating stack with size of 8388608 bytes D0713 00:00:25.343543 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.344029 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:25.347651 762332 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:25.347773 762332 usertrap_amd64.go:106] [ 717: 717] Map a usertrap vma at 69000 D0713 00:00:25.348452 762332 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc001de2180 1 D0713 00:00:25.348758 762332 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:25.350913 762332 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:25.350986 762332 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc001de2180 2 D0713 00:00:25.351137 762332 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:25.353986 762332 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:25.354053 762332 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc001de2180 3 D0713 00:00:25.354155 762332 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:25.375684 762332 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:25.375798 762332 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc001de2180 4 D0713 00:00:25.375976 762332 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:25.379206 762332 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:25.379268 762332 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc001de2180 5 D0713 00:00:25.379421 762332 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:25.379873 762332 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b214:sysno 13 D0713 00:00:25.379933 762332 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc001de2180 6 D0713 00:00:25.380040 762332 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:25.401409 762332 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:25.401522 762332 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc001de2180 7 D0713 00:00:25.401709 762332 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:25.403878 762332 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:25.404023 762332 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc001de2180 8 D0713 00:00:25.404237 762332 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:25.406142 762332 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46af76:sysno 35 D0713 00:00:25.406204 762332 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc001de2180 9 D0713 00:00:25.406346 762332 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:25.408032 762332 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:25.408114 762332 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc001de2180 10 D0713 00:00:25.408354 762332 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:25.420245 762332 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b020:sysno 39 D0713 00:00:25.420337 762332 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc001de2180 11 D0713 00:00:25.420601 762332 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:25.422483 762332 usertrap_amd64.go:212] [ 717: 718] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:25.422541 762332 usertrap_amd64.go:122] [ 717: 718] Allocate a new trap: 0xc001de2180 12 D0713 00:00:25.422680 762332 usertrap_amd64.go:225] [ 717: 718] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:25.423312 762332 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 00:00:25.423626 762332 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 00:00:25.430251 762332 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46af29:sysno 293 D0713 00:00:25.430315 762332 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc001de2180 13 D0713 00:00:25.430443 762332 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:25.439607 762332 task_signals.go:470] [ 717: 717] Notified of signal 23 D0713 00:00:25.439847 762332 task_signals.go:220] [ 717: 717] Signal 23: delivering to handler D0713 00:00:25.450238 762332 usertrap_amd64.go:212] [ 717: 717] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:25.450358 762332 usertrap_amd64.go:122] [ 717: 717] Allocate a new trap: 0xc001de2180 14 D0713 00:00:25.450540 762332 usertrap_amd64.go:225] [ 717: 717] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:25.451106 762332 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.451467 762332 task_signals.go:204] [ 717: 718] Signal 717, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.451628 762332 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.451906 762332 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.452064 762332 task_signals.go:204] [ 717: 721] Signal 717, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.452251 762332 task_signals.go:204] [ 717: 720] Signal 717, PID: 720, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.452535 762332 task_signals.go:204] [ 717: 719] Signal 717, PID: 719, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.452796 762332 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.452852 762332 task_exit.go:204] [ 717: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.453109 762332 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.453512 762332 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.453596 762332 task_exit.go:204] [ 717: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.453749 762332 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.453892 762332 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.454539 762332 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.454632 762332 task_exit.go:204] [ 717: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.477610 762332 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.477704 762332 task_exit.go:204] [ 717: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.477970 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:25.478339 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:25.478418 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:25.478686 762332 task_exit.go:204] [ 717: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.487043 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.488638 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:25.509396 762332 syscalls.go:262] [ 722: 722] Allocating stack with size of 8388608 bytes D0713 00:00:25.513121 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.513830 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:25.518108 762332 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:25.518287 762332 usertrap_amd64.go:106] [ 722: 722] Map a usertrap vma at 63000 D0713 00:00:25.519238 762332 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001de2690 1 D0713 00:00:25.519588 762332 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:25.521813 762332 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:25.521980 762332 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001de2690 2 D0713 00:00:25.522161 762332 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:25.525406 762332 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:25.525464 762332 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001de2690 3 D0713 00:00:25.525617 762332 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:25.547413 762332 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:25.547497 762332 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001de2690 4 D0713 00:00:25.547625 762332 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:25.551732 762332 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:25.551855 762332 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001de2690 5 D0713 00:00:25.552151 762332 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:25.552793 762332 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b214:sysno 13 D0713 00:00:25.552883 762332 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001de2690 6 D0713 00:00:25.553110 762332 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:25.574451 762332 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:25.574538 762332 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001de2690 7 D0713 00:00:25.574672 762332 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:25.576588 762332 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:25.576668 762332 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc001de2690 8 D0713 00:00:25.576870 762332 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:25.579582 762332 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46af76:sysno 35 D0713 00:00:25.579661 762332 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc001de2690 9 D0713 00:00:25.579839 762332 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:25.581497 762332 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:25.581575 762332 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001de2690 10 D0713 00:00:25.581823 762332 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:25.582631 762332 usertrap_amd64.go:212] [ 722: 725] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:25.582718 762332 usertrap_amd64.go:122] [ 722: 725] Allocate a new trap: 0xc001de2690 11 D0713 00:00:25.582901 762332 usertrap_amd64.go:225] [ 722: 725] Apply the binary patch addr 46b6e0 trap addr 63370 ([184 24 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:25.596351 762332 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b020:sysno 39 D0713 00:00:25.596434 762332 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc001de2690 12 D0713 00:00:25.596670 762332 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:25.597885 762332 usertrap_amd64.go:212] [ 722: 723] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:25.597962 762332 usertrap_amd64.go:122] [ 722: 723] Allocate a new trap: 0xc001de2690 13 D0713 00:00:25.598188 762332 usertrap_amd64.go:225] [ 722: 723] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:25.598844 762332 task_signals.go:470] [ 722: 722] Notified of signal 23 D0713 00:00:25.601758 762332 task_signals.go:220] [ 722: 722] Signal 23: delivering to handler D0713 00:00:25.604322 762332 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46af29:sysno 293 D0713 00:00:25.604379 762332 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001de2690 14 D0713 00:00:25.604567 762332 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46af29 trap addr 63460 ([184 37 1 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:25.610671 762332 task_signals.go:470] [ 722: 722] Notified of signal 23 D0713 00:00:25.612045 762332 task_signals.go:220] [ 722: 722] Signal 23: delivering to handler D0713 00:00:25.628115 762332 usertrap_amd64.go:212] [ 722: 722] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:25.628207 762332 usertrap_amd64.go:122] [ 722: 722] Allocate a new trap: 0xc001de2690 15 D0713 00:00:25.628360 762332 usertrap_amd64.go:225] [ 722: 722] Apply the binary patch addr 46ae44 trap addr 634b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 52 6 0]) D0713 00:00:25.628825 762332 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.629194 762332 task_signals.go:204] [ 722: 724] Signal 722, PID: 724, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.629191 762332 task_signals.go:204] [ 722: 725] Signal 722, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.629321 762332 task_signals.go:204] [ 722: 727] Signal 722, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.629470 762332 task_signals.go:204] [ 722: 723] Signal 722, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.629706 762332 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.629907 762332 task_signals.go:204] [ 722: 726] Signal 722, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.630068 762332 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.630582 762332 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.630656 762332 task_exit.go:204] [ 722: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.630839 762332 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.631007 762332 task_exit.go:204] [ 722: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.631173 762332 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.631459 762332 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.631849 762332 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.631931 762332 task_exit.go:204] [ 722: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.632519 762332 task_exit.go:204] [ 722: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.632622 762332 task_exit.go:204] [ 722: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.632902 762332 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.633016 762332 task_exit.go:204] [ 722: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.657859 762332 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.657983 762332 task_exit.go:204] [ 722: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.658259 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:25.658677 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:25.658776 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:25.659022 762332 task_exit.go:204] [ 722: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.668000 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.669236 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:25.736652 762332 syscalls.go:262] [ 728: 728] Allocating stack with size of 8388608 bytes D0713 00:00:25.740890 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.741765 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:25.750115 762332 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:25.750358 762332 usertrap_amd64.go:106] [ 728: 728] Map a usertrap vma at 68000 D0713 00:00:25.751613 762332 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0020abe60 1 D0713 00:00:25.752063 762332 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:25.754886 762332 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:25.754951 762332 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0020abe60 2 D0713 00:00:25.755117 762332 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:25.758496 762332 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:25.758559 762332 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0020abe60 3 D0713 00:00:25.758720 762332 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:25.786523 762332 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:25.786629 762332 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0020abe60 4 D0713 00:00:25.786790 762332 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:25.789979 762332 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:25.790085 762332 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0020abe60 5 D0713 00:00:25.790279 762332 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:25.790806 762332 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46b214:sysno 13 D0713 00:00:25.790859 762332 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0020abe60 6 D0713 00:00:25.791022 762332 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:25.813522 762332 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:25.813654 762332 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0020abe60 7 D0713 00:00:25.813819 762332 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:25.815934 762332 usertrap_amd64.go:212] [ 728: 729] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:25.816044 762332 usertrap_amd64.go:122] [ 728: 729] Allocate a new trap: 0xc0020abe60 8 D0713 00:00:25.816385 762332 usertrap_amd64.go:225] [ 728: 729] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:25.818995 762332 usertrap_amd64.go:212] [ 728: 729] Found the pattern at ip 46af76:sysno 35 D0713 00:00:25.819096 762332 usertrap_amd64.go:122] [ 728: 729] Allocate a new trap: 0xc0020abe60 9 D0713 00:00:25.820143 762332 usertrap_amd64.go:225] [ 728: 729] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:25.820634 762332 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:25.820728 762332 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0020abe60 10 D0713 00:00:25.821536 762332 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:25.834096 762332 usertrap_amd64.go:212] [ 728: 729] Found the pattern at ip 46b020:sysno 39 D0713 00:00:25.834230 762332 usertrap_amd64.go:122] [ 728: 729] Allocate a new trap: 0xc0020abe60 11 D0713 00:00:25.834429 762332 usertrap_amd64.go:225] [ 728: 729] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:25.836226 762332 usertrap_amd64.go:212] [ 728: 729] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:25.836333 762332 usertrap_amd64.go:122] [ 728: 729] Allocate a new trap: 0xc0020abe60 12 D0713 00:00:25.836488 762332 usertrap_amd64.go:225] [ 728: 729] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:25.837012 762332 task_signals.go:470] [ 728: 728] Notified of signal 23 D0713 00:00:25.837286 762332 task_signals.go:220] [ 728: 728] Signal 23: delivering to handler D0713 00:00:25.847013 762332 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46af29:sysno 293 D0713 00:00:25.847152 762332 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0020abe60 13 D0713 00:00:25.847357 762332 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:25.849863 762332 task_signals.go:470] [ 728: 728] Notified of signal 23 D0713 00:00:25.850271 762332 task_signals.go:220] [ 728: 728] Signal 23: delivering to handler D0713 00:00:25.868169 762332 task_signals.go:470] [ 728: 728] Notified of signal 23 D0713 00:00:25.868477 762332 task_signals.go:220] [ 728: 728] Signal 23: delivering to handler D0713 00:00:25.874238 762332 usertrap_amd64.go:212] [ 728: 728] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:25.874337 762332 usertrap_amd64.go:122] [ 728: 728] Allocate a new trap: 0xc0020abe60 14 D0713 00:00:25.874520 762332 usertrap_amd64.go:225] [ 728: 728] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:25.875262 762332 task_exit.go:204] [ 728: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.875709 762332 task_signals.go:204] [ 728: 732] Signal 728, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.875786 762332 task_signals.go:204] [ 728: 730] Signal 728, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.875786 762332 task_signals.go:204] [ 728: 729] Signal 728, PID: 729, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.876039 762332 task_signals.go:204] [ 728: 731] Signal 728, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:25.876159 762332 task_exit.go:204] [ 728: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.876483 762332 task_exit.go:204] [ 728: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.876844 762332 task_exit.go:204] [ 728: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.877165 762332 task_exit.go:204] [ 728: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.877754 762332 task_exit.go:204] [ 728: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:25.878146 762332 task_exit.go:204] [ 728: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.878232 762332 task_exit.go:204] [ 728: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.878811 762332 task_exit.go:204] [ 728: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.878877 762332 task_exit.go:204] [ 728: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.879091 762332 task_exit.go:204] [ 728: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.879168 762332 task_exit.go:204] [ 728: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.900760 762332 task_exit.go:204] [ 728: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:25.900872 762332 task_exit.go:204] [ 728: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.901158 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:25.901483 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:25.901548 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:25.901789 762332 task_exit.go:204] [ 728: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:25.909975 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.912428 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:25.928879 762332 syscalls.go:262] [ 733: 733] Allocating stack with size of 8388608 bytes D0713 00:00:25.931544 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:25.932049 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:25.935048 762332 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:25.935168 762332 usertrap_amd64.go:106] [ 733: 733] Map a usertrap vma at 69000 D0713 00:00:25.935918 762332 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc00047f1d0 1 D0713 00:00:25.936187 762332 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:25.938004 762332 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:25.938057 762332 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc00047f1d0 2 D0713 00:00:25.938157 762332 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:25.940447 762332 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:25.940497 762332 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc00047f1d0 3 D0713 00:00:25.940646 762332 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:25.961956 762332 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:25.962050 762332 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc00047f1d0 4 D0713 00:00:25.962235 762332 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:25.965095 762332 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:25.965178 762332 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc00047f1d0 5 D0713 00:00:25.965385 762332 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:25.965825 762332 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b214:sysno 13 D0713 00:00:25.965891 762332 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc00047f1d0 6 D0713 00:00:25.966032 762332 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:25.984653 762332 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:25.984714 762332 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc00047f1d0 7 D0713 00:00:25.984842 762332 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:25.986603 762332 usertrap_amd64.go:212] [ 733: 734] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:25.986715 762332 usertrap_amd64.go:122] [ 733: 734] Allocate a new trap: 0xc00047f1d0 8 D0713 00:00:25.986977 762332 usertrap_amd64.go:225] [ 733: 734] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:25.989326 762332 usertrap_amd64.go:212] [ 733: 734] Found the pattern at ip 46af76:sysno 35 D0713 00:00:25.989403 762332 usertrap_amd64.go:122] [ 733: 734] Allocate a new trap: 0xc00047f1d0 9 D0713 00:00:25.990269 762332 usertrap_amd64.go:225] [ 733: 734] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:25.990794 762332 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:25.990891 762332 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc00047f1d0 10 D0713 00:00:25.991123 762332 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:26.003244 762332 usertrap_amd64.go:212] [ 733: 734] Found the pattern at ip 46b020:sysno 39 D0713 00:00:26.003343 762332 usertrap_amd64.go:122] [ 733: 734] Allocate a new trap: 0xc00047f1d0 11 D0713 00:00:26.003566 762332 usertrap_amd64.go:225] [ 733: 734] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:26.006152 762332 usertrap_amd64.go:212] [ 733: 734] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:26.006251 762332 usertrap_amd64.go:122] [ 733: 734] Allocate a new trap: 0xc00047f1d0 12 D0713 00:00:26.006580 762332 usertrap_amd64.go:225] [ 733: 734] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:26.007346 762332 task_signals.go:470] [ 733: 733] Notified of signal 23 D0713 00:00:26.007619 762332 task_signals.go:220] [ 733: 733] Signal 23: delivering to handler D0713 00:00:26.014623 762332 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46af29:sysno 293 D0713 00:00:26.014713 762332 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc00047f1d0 13 D0713 00:00:26.014877 762332 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:26.021013 762332 task_signals.go:470] [ 733: 733] Notified of signal 23 D0713 00:00:26.023442 762332 task_signals.go:220] [ 733: 733] Signal 23: delivering to handler D0713 00:00:26.037286 762332 usertrap_amd64.go:212] [ 733: 733] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:26.037366 762332 usertrap_amd64.go:122] [ 733: 733] Allocate a new trap: 0xc00047f1d0 14 D0713 00:00:26.037537 762332 usertrap_amd64.go:225] [ 733: 733] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:26.037990 762332 task_exit.go:204] [ 733: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.038437 762332 task_signals.go:204] [ 733: 735] Signal 733, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.038557 762332 task_signals.go:204] [ 733: 737] Signal 733, PID: 737, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.038586 762332 task_signals.go:204] [ 733: 734] Signal 733, PID: 734, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.038665 762332 task_signals.go:204] [ 733: 736] Signal 733, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.038845 762332 task_exit.go:204] [ 733: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.039206 762332 task_exit.go:204] [ 733: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.039663 762332 task_exit.go:204] [ 733: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.039819 762332 task_exit.go:204] [ 733: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.039949 762332 task_exit.go:204] [ 733: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.040746 762332 task_exit.go:204] [ 733: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.040811 762332 task_exit.go:204] [ 733: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.041058 762332 task_exit.go:204] [ 733: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.041129 762332 task_exit.go:204] [ 733: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.041309 762332 task_exit.go:204] [ 733: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.041365 762332 task_exit.go:204] [ 733: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.063540 762332 task_exit.go:204] [ 733: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.063663 762332 task_exit.go:204] [ 733: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.063958 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:26.064356 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:26.064445 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:26.064805 762332 task_exit.go:204] [ 733: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.073473 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.082331 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 executing program D0713 00:00:26.143425 762332 syscalls.go:262] [ 738: 738] Allocating stack with size of 8388608 bytes D0713 00:00:26.147864 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.148815 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:26.152894 762332 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:26.153135 762332 usertrap_amd64.go:106] [ 738: 738] Map a usertrap vma at 61000 D0713 00:00:26.154178 762332 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc001de31d0 1 D0713 00:00:26.154471 762332 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:26.156596 762332 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:26.156663 762332 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc001de31d0 2 D0713 00:00:26.156856 762332 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:26.159731 762332 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:26.159783 762332 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc001de31d0 3 D0713 00:00:26.159911 762332 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:26.181317 762332 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:26.181406 762332 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc001de31d0 4 D0713 00:00:26.181524 762332 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:26.184756 762332 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:26.184918 762332 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc001de31d0 5 D0713 00:00:26.185189 762332 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:26.185744 762332 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46b214:sysno 13 D0713 00:00:26.185794 762332 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc001de31d0 6 D0713 00:00:26.185965 762332 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:26.215863 762332 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:26.215958 762332 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc001de31d0 7 D0713 00:00:26.216084 762332 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:26.218116 762332 usertrap_amd64.go:212] [ 738: 739] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:26.218208 762332 usertrap_amd64.go:122] [ 738: 739] Allocate a new trap: 0xc001de31d0 8 D0713 00:00:26.218514 762332 usertrap_amd64.go:225] [ 738: 739] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:26.221722 762332 usertrap_amd64.go:212] [ 738: 739] Found the pattern at ip 46af76:sysno 35 D0713 00:00:26.221841 762332 usertrap_amd64.go:122] [ 738: 739] Allocate a new trap: 0xc001de31d0 9 D0713 00:00:26.222089 762332 usertrap_amd64.go:225] [ 738: 739] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:26.223403 762332 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:26.223483 762332 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc001de31d0 10 D0713 00:00:26.223844 762332 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:26.237500 762332 usertrap_amd64.go:212] [ 738: 739] Found the pattern at ip 46b020:sysno 39 D0713 00:00:26.237587 762332 usertrap_amd64.go:122] [ 738: 739] Allocate a new trap: 0xc001de31d0 11 D0713 00:00:26.237836 762332 usertrap_amd64.go:225] [ 738: 739] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:26.238562 762332 usertrap_amd64.go:212] [ 738: 739] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:26.238618 762332 usertrap_amd64.go:122] [ 738: 739] Allocate a new trap: 0xc001de31d0 12 D0713 00:00:26.238926 762332 usertrap_amd64.go:225] [ 738: 739] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:26.241665 762332 task_signals.go:470] [ 738: 738] Notified of signal 23 D0713 00:00:26.242386 762332 task_signals.go:220] [ 738: 738] Signal 23: delivering to handler D0713 00:00:26.252130 762332 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46af29:sysno 293 D0713 00:00:26.252265 762332 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc001de31d0 13 D0713 00:00:26.252469 762332 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:26.253606 762332 task_signals.go:470] [ 738: 738] Notified of signal 23 D0713 00:00:26.253924 762332 task_signals.go:220] [ 738: 738] Signal 23: delivering to handler D0713 00:00:26.269506 762332 task_signals.go:470] [ 738: 738] Notified of signal 23 D0713 00:00:26.270366 762332 task_signals.go:220] [ 738: 738] Signal 23: delivering to handler D0713 00:00:26.279189 762332 usertrap_amd64.go:212] [ 738: 738] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:26.279291 762332 usertrap_amd64.go:122] [ 738: 738] Allocate a new trap: 0xc001de31d0 14 D0713 00:00:26.279418 762332 usertrap_amd64.go:225] [ 738: 738] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:26.279861 762332 task_exit.go:204] [ 738: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.280218 762332 task_signals.go:204] [ 738: 743] Signal 738, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.280332 762332 task_signals.go:204] [ 738: 739] Signal 738, PID: 739, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.280613 762332 task_exit.go:204] [ 738: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.280769 762332 task_signals.go:204] [ 738: 740] Signal 738, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.281123 762332 task_exit.go:204] [ 738: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.281103 762332 task_signals.go:204] [ 738: 741] Signal 738, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.281309 762332 task_signals.go:204] [ 738: 742] Signal 738, PID: 742, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.281453 762332 task_exit.go:204] [ 738: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.281771 762332 task_exit.go:204] [ 738: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.282563 762332 task_exit.go:204] [ 738: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.282919 762332 task_exit.go:204] [ 738: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.283102 762332 task_exit.go:204] [ 738: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.283200 762332 task_exit.go:204] [ 738: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.283529 762332 task_exit.go:204] [ 738: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.283601 762332 task_exit.go:204] [ 738: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.284073 762332 task_exit.go:204] [ 738: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.284143 762332 task_exit.go:204] [ 738: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.284464 762332 task_exit.go:204] [ 738: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.284517 762332 task_exit.go:204] [ 738: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.304640 762332 task_exit.go:204] [ 738: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.304747 762332 task_exit.go:204] [ 738: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.305266 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:26.307741 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:26.307926 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:26.312750 762332 task_exit.go:204] [ 738: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.321641 762332 task_signals.go:470] [ 6: 12] Notified of signal 23 D0713 00:00:26.324590 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.346880 762332 syscalls.go:262] [ 744: 744] Allocating stack with size of 8388608 bytes D0713 00:00:26.350412 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.351246 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:26.355318 762332 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:26.355508 762332 usertrap_amd64.go:106] [ 744: 744] Map a usertrap vma at 67000 D0713 00:00:26.356508 762332 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0023887b0 1 D0713 00:00:26.356918 762332 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:26.359271 762332 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:26.359338 762332 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0023887b0 2 D0713 00:00:26.359534 762332 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:26.362597 762332 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:26.362758 762332 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0023887b0 3 D0713 00:00:26.363051 762332 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:26.386523 762332 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:26.386602 762332 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0023887b0 4 D0713 00:00:26.386798 762332 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:26.390471 762332 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:26.390564 762332 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0023887b0 5 D0713 00:00:26.390714 762332 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:26.391130 762332 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b214:sysno 13 D0713 00:00:26.391177 762332 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0023887b0 6 D0713 00:00:26.391308 762332 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:26.412647 762332 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:26.412732 762332 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0023887b0 7 D0713 00:00:26.412874 762332 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:26.414975 762332 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:26.415063 762332 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0023887b0 8 D0713 00:00:26.419123 762332 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:26.421461 762332 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46af76:sysno 35 D0713 00:00:26.421605 762332 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0023887b0 9 D0713 00:00:26.423000 762332 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:26.423713 762332 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:26.423808 762332 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0023887b0 10 D0713 00:00:26.424132 762332 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:26.425286 762332 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b020:sysno 39 D0713 00:00:26.425371 762332 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0023887b0 11 D0713 00:00:26.425982 762332 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:26.426779 762332 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:26.426861 762332 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0023887b0 12 D0713 00:00:26.427121 762332 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:26.427840 762332 task_signals.go:470] [ 744: 747] Notified of signal 23 D0713 00:00:26.428835 762332 task_signals.go:179] [ 744: 747] Restarting syscall 202: interrupted by signal 23 D0713 00:00:26.428901 762332 task_signals.go:220] [ 744: 747] Signal 23: delivering to handler D0713 00:00:26.439336 762332 task_signals.go:470] [ 744: 744] Notified of signal 23 D0713 00:00:26.439942 762332 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler D0713 00:00:26.441785 762332 task_signals.go:470] [ 744: 744] Notified of signal 23 D0713 00:00:26.442885 762332 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler D0713 00:00:26.444824 762332 task_signals.go:470] [ 744: 744] Notified of signal 23 D0713 00:00:26.445241 762332 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler D0713 00:00:26.455403 762332 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46af29:sysno 293 D0713 00:00:26.455553 762332 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0023887b0 13 D0713 00:00:26.455857 762332 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:26.456924 762332 task_signals.go:470] [ 744: 744] Notified of signal 23 D0713 00:00:26.457213 762332 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler I0713 00:00:26.481035 762332 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0713 00:00:26.481377 762332 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:26.481430 762332 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0023887b0 14 D0713 00:00:26.481717 762332 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:26.481851 762332 task_signals.go:470] [ 744: 744] Notified of signal 23 D0713 00:00:26.482159 762332 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler D0713 00:00:26.483614 762332 task_signals.go:481] [ 744: 744] No task notified of signal 23 D0713 00:00:26.483994 762332 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler D0713 00:00:26.485729 762332 task_signals.go:470] [ 744: 744] Notified of signal 23 D0713 00:00:26.486310 762332 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.486593 762332 task_signals.go:204] [ 744: 746] Signal 744, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.486805 762332 task_signals.go:204] [ 744: 745] Signal 744, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.486800 762332 task_signals.go:204] [ 744: 748] Signal 744, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.486953 762332 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.487148 762332 task_signals.go:204] [ 744: 747] Signal 744, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.487582 762332 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.487660 762332 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.487927 762332 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.488284 762332 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.488339 762332 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.488621 762332 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.488777 762332 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.489175 762332 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.489864 762332 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.489948 762332 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.515736 762332 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.515830 762332 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.516053 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:26.516462 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:26.516533 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:26.516780 762332 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.527008 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:26.528390 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.553645 762332 syscalls.go:262] [ 749: 749] Allocating stack with size of 8388608 bytes D0713 00:00:26.556927 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.558005 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:26.560552 762332 task_signals.go:470] [ 6: 12] Notified of signal 23 D0713 00:00:26.560820 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:26.562441 762332 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:26.562792 762332 usertrap_amd64.go:106] [ 749: 749] Map a usertrap vma at 69000 D0713 00:00:26.564008 762332 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc002388120 1 D0713 00:00:26.564521 762332 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:26.567090 762332 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:26.567146 762332 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc002388120 2 D0713 00:00:26.567250 762332 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:26.569957 762332 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:26.570011 762332 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc002388120 3 D0713 00:00:26.570135 762332 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:26.597994 762332 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:26.598115 762332 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc002388120 4 D0713 00:00:26.598295 762332 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:26.602387 762332 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:26.602509 762332 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc002388120 5 D0713 00:00:26.602662 762332 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:26.603133 762332 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b214:sysno 13 D0713 00:00:26.603220 762332 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc002388120 6 D0713 00:00:26.603380 762332 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:26.624129 762332 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:26.624220 762332 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc002388120 7 D0713 00:00:26.624351 762332 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:26.626621 762332 usertrap_amd64.go:212] [ 749: 750] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:26.626749 762332 usertrap_amd64.go:122] [ 749: 750] Allocate a new trap: 0xc002388120 8 D0713 00:00:26.627104 762332 usertrap_amd64.go:225] [ 749: 750] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:26.630810 762332 usertrap_amd64.go:212] [ 749: 750] Found the pattern at ip 46af76:sysno 35 D0713 00:00:26.630948 762332 usertrap_amd64.go:122] [ 749: 750] Allocate a new trap: 0xc002388120 9 D0713 00:00:26.631270 762332 usertrap_amd64.go:225] [ 749: 750] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:26.631759 762332 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:26.631869 762332 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc002388120 10 D0713 00:00:26.632107 762332 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:26.647281 762332 usertrap_amd64.go:212] [ 749: 750] Found the pattern at ip 46b020:sysno 39 D0713 00:00:26.647649 762332 usertrap_amd64.go:122] [ 749: 750] Allocate a new trap: 0xc002388120 11 D0713 00:00:26.647937 762332 usertrap_amd64.go:225] [ 749: 750] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:26.648421 762332 usertrap_amd64.go:212] [ 749: 750] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:26.648500 762332 usertrap_amd64.go:122] [ 749: 750] Allocate a new trap: 0xc002388120 12 D0713 00:00:26.649707 762332 usertrap_amd64.go:225] [ 749: 750] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:26.650484 762332 task_signals.go:470] [ 749: 749] Notified of signal 23 D0713 00:00:26.650820 762332 task_signals.go:220] [ 749: 749] Signal 23: delivering to handler D0713 00:00:26.662149 762332 task_signals.go:470] [ 749: 749] Notified of signal 23 D0713 00:00:26.662422 762332 task_signals.go:220] [ 749: 749] Signal 23: delivering to handler D0713 00:00:26.669372 762332 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46af29:sysno 293 D0713 00:00:26.669484 762332 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc002388120 13 D0713 00:00:26.669665 762332 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:26.679246 762332 task_signals.go:470] [ 749: 749] Notified of signal 23 D0713 00:00:26.679638 762332 task_signals.go:220] [ 749: 749] Signal 23: delivering to handler D0713 00:00:26.699067 762332 usertrap_amd64.go:212] [ 749: 749] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:26.699204 762332 usertrap_amd64.go:122] [ 749: 749] Allocate a new trap: 0xc002388120 14 D0713 00:00:26.699434 762332 usertrap_amd64.go:225] [ 749: 749] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:26.700159 762332 task_exit.go:204] [ 749: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.700779 762332 task_signals.go:204] [ 749: 750] Signal 749, PID: 750, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.700932 762332 task_signals.go:204] [ 749: 754] Signal 749, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.701099 762332 task_signals.go:204] [ 749: 751] Signal 749, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.701164 762332 task_signals.go:204] [ 749: 753] Signal 749, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.701062 762332 task_signals.go:204] [ 749: 752] Signal 749, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.701304 762332 task_exit.go:204] [ 749: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.701871 762332 task_exit.go:204] [ 749: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.702000 762332 task_exit.go:204] [ 749: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.702306 762332 task_exit.go:204] [ 749: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.702494 762332 task_exit.go:204] [ 749: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.702960 762332 task_exit.go:204] [ 749: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.703033 762332 task_exit.go:204] [ 749: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.703298 762332 task_exit.go:204] [ 749: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.703714 762332 task_exit.go:204] [ 749: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.703795 762332 task_exit.go:204] [ 749: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.704038 762332 task_exit.go:204] [ 749: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.704460 762332 task_exit.go:204] [ 749: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.704528 762332 task_exit.go:204] [ 749: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.704763 762332 task_exit.go:204] [ 749: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.729385 762332 task_exit.go:204] [ 749: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.729497 762332 task_exit.go:204] [ 749: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.729780 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:26.730182 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:26.730314 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:26.730637 762332 task_exit.go:204] [ 749: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.738745 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.740275 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:26.760341 762332 syscalls.go:262] [ 755: 755] Allocating stack with size of 8388608 bytes D0713 00:00:26.763479 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.764189 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:26.767670 762332 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:26.767886 762332 usertrap_amd64.go:106] [ 755: 755] Map a usertrap vma at 62000 D0713 00:00:26.768986 762332 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008e22d0 1 D0713 00:00:26.769306 762332 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:26.772013 762332 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:26.772144 762332 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008e22d0 2 D0713 00:00:26.772395 762332 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:26.775522 762332 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:26.775603 762332 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008e22d0 3 D0713 00:00:26.775712 762332 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:26.803328 762332 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:26.803433 762332 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008e22d0 4 D0713 00:00:26.803591 762332 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:26.807067 762332 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:26.807167 762332 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008e22d0 5 D0713 00:00:26.807338 762332 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:26.807756 762332 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b214:sysno 13 D0713 00:00:26.807819 762332 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008e22d0 6 D0713 00:00:26.807987 762332 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:26.827245 762332 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:26.827329 762332 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008e22d0 7 D0713 00:00:26.827456 762332 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:26.829122 762332 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:26.829266 762332 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc0008e22d0 8 D0713 00:00:26.829439 762332 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:26.831609 762332 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46af76:sysno 35 D0713 00:00:26.831692 762332 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc0008e22d0 9 D0713 00:00:26.831966 762332 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:26.833034 762332 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:26.833098 762332 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008e22d0 10 D0713 00:00:26.834447 762332 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:26.846089 762332 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b020:sysno 39 D0713 00:00:26.846195 762332 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc0008e22d0 11 D0713 00:00:26.846393 762332 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:26.846945 762332 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:26.847026 762332 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc0008e22d0 12 D0713 00:00:26.847149 762332 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:26.847632 762332 task_signals.go:470] [ 755: 755] Notified of signal 23 D0713 00:00:26.849443 762332 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler D0713 00:00:26.860170 762332 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46af29:sysno 293 D0713 00:00:26.860269 762332 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008e22d0 13 D0713 00:00:26.860406 762332 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:26.860777 762332 task_signals.go:470] [ 755: 755] Notified of signal 23 D0713 00:00:26.861381 762332 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler D0713 00:00:26.879701 762332 task_signals.go:470] [ 755: 755] Notified of signal 23 D0713 00:00:26.881263 762332 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler I0713 00:00:26.883597 762332 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0713 00:00:26.883933 762332 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:26.884010 762332 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008e22d0 14 D0713 00:00:26.884191 762332 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:26.884671 762332 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.885152 762332 task_signals.go:204] [ 755: 757] Signal 755, PID: 757, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.885157 762332 task_signals.go:204] [ 755: 756] Signal 755, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.885411 762332 task_signals.go:204] [ 755: 758] Signal 755, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.885440 762332 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.885449 762332 task_signals.go:204] [ 755: 759] Signal 755, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:26.885787 762332 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.886025 762332 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.886424 762332 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.887020 762332 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.887096 762332 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.887303 762332 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:26.887763 762332 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.887825 762332 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.888346 762332 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.888420 762332 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.911127 762332 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:26.911233 762332 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.911489 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:26.911879 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:26.911965 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:26.912136 762332 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:26.918940 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.922751 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:26.938469 762332 syscalls.go:262] [ 760: 760] Allocating stack with size of 8388608 bytes D0713 00:00:26.941340 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:26.941866 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:26.944850 762332 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:26.945063 762332 usertrap_amd64.go:106] [ 760: 760] Map a usertrap vma at 6a000 D0713 00:00:26.945737 762332 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000992780 1 D0713 00:00:26.945979 762332 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:26.947674 762332 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:26.947769 762332 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000992780 2 D0713 00:00:26.947886 762332 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:26.950126 762332 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:26.950177 762332 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000992780 3 D0713 00:00:26.950306 762332 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:26.967408 762332 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:26.967479 762332 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000992780 4 D0713 00:00:26.967616 762332 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:26.970399 762332 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:26.970486 762332 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000992780 5 D0713 00:00:26.970665 762332 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:26.971141 762332 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b214:sysno 13 D0713 00:00:26.971217 762332 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000992780 6 D0713 00:00:26.971370 762332 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:26.987525 762332 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:26.987602 762332 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000992780 7 D0713 00:00:26.987731 762332 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:26.989415 762332 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:26.989530 762332 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc000992780 8 D0713 00:00:26.989737 762332 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:26.992034 762332 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46af76:sysno 35 D0713 00:00:26.992160 762332 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc000992780 9 D0713 00:00:26.992381 762332 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:26.993549 762332 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:26.993668 762332 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000992780 10 D0713 00:00:26.993937 762332 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:27.007790 762332 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b020:sysno 39 D0713 00:00:27.007889 762332 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc000992780 11 D0713 00:00:27.008082 762332 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:27.009430 762332 usertrap_amd64.go:212] [ 760: 761] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:27.009498 762332 usertrap_amd64.go:122] [ 760: 761] Allocate a new trap: 0xc000992780 12 D0713 00:00:27.010531 762332 usertrap_amd64.go:225] [ 760: 761] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:27.012012 762332 task_signals.go:470] [ 760: 760] Notified of signal 23 D0713 00:00:27.012981 762332 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler D0713 00:00:27.014460 762332 task_signals.go:470] [ 760: 760] Notified of signal 23 D0713 00:00:27.014695 762332 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler D0713 00:00:27.021337 762332 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46af29:sysno 293 D0713 00:00:27.021405 762332 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000992780 13 D0713 00:00:27.021546 762332 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:27.028843 762332 task_signals.go:470] [ 760: 760] Notified of signal 23 D0713 00:00:27.031084 762332 task_signals.go:220] [ 760: 760] Signal 23: delivering to handler D0713 00:00:27.046617 762332 usertrap_amd64.go:212] [ 760: 760] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:27.046734 762332 usertrap_amd64.go:122] [ 760: 760] Allocate a new trap: 0xc000992780 14 D0713 00:00:27.046943 762332 usertrap_amd64.go:225] [ 760: 760] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:27.047493 762332 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.047818 762332 task_signals.go:204] [ 760: 763] Signal 760, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.047968 762332 task_signals.go:204] [ 760: 761] Signal 760, PID: 761, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.048070 762332 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.048034 762332 task_signals.go:204] [ 760: 765] Signal 760, PID: 765, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.048390 762332 task_signals.go:204] [ 760: 764] Signal 760, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.048420 762332 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.048617 762332 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.048600 762332 task_signals.go:204] [ 760: 762] Signal 760, PID: 762, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.048772 762332 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.049449 762332 task_exit.go:204] [ 760: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.049995 762332 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.050362 762332 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.050425 762332 task_exit.go:204] [ 760: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.050678 762332 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.050731 762332 task_exit.go:204] [ 760: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.050878 762332 task_exit.go:204] [ 760: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.050934 762332 task_exit.go:204] [ 760: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.051121 762332 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.051170 762332 task_exit.go:204] [ 760: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.071553 762332 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.071644 762332 task_exit.go:204] [ 760: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.071848 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:27.072127 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:27.072183 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:27.072699 762332 task_exit.go:204] [ 760: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.079517 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.082400 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:27.096324 762332 syscalls.go:262] [ 766: 766] Allocating stack with size of 8388608 bytes D0713 00:00:27.099140 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.099680 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:27.103182 762332 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:27.103357 762332 usertrap_amd64.go:106] [ 766: 766] Map a usertrap vma at 68000 D0713 00:00:27.104319 762332 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000992a20 1 D0713 00:00:27.104627 762332 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:27.106829 762332 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:27.106900 762332 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000992a20 2 D0713 00:00:27.107070 762332 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:27.109816 762332 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:27.109878 762332 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000992a20 3 D0713 00:00:27.109981 762332 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:27.130153 762332 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:27.130256 762332 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000992a20 4 D0713 00:00:27.130439 762332 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:27.133543 762332 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:27.133612 762332 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000992a20 5 D0713 00:00:27.133831 762332 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:27.134347 762332 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b214:sysno 13 D0713 00:00:27.134414 762332 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000992a20 6 D0713 00:00:27.134600 762332 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:27.152354 762332 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:27.152420 762332 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000992a20 7 D0713 00:00:27.152553 762332 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:27.154125 762332 usertrap_amd64.go:212] [ 766: 767] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:27.154215 762332 usertrap_amd64.go:122] [ 766: 767] Allocate a new trap: 0xc000992a20 8 D0713 00:00:27.154372 762332 usertrap_amd64.go:225] [ 766: 767] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:27.157368 762332 usertrap_amd64.go:212] [ 766: 767] Found the pattern at ip 46af76:sysno 35 D0713 00:00:27.157444 762332 usertrap_amd64.go:122] [ 766: 767] Allocate a new trap: 0xc000992a20 9 D0713 00:00:27.157624 762332 usertrap_amd64.go:225] [ 766: 767] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:27.158085 762332 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:27.158211 762332 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000992a20 10 D0713 00:00:27.158486 762332 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:27.172421 762332 usertrap_amd64.go:212] [ 766: 767] Found the pattern at ip 46b020:sysno 39 D0713 00:00:27.172517 762332 usertrap_amd64.go:122] [ 766: 767] Allocate a new trap: 0xc000992a20 11 D0713 00:00:27.173088 762332 usertrap_amd64.go:225] [ 766: 767] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:27.173457 762332 usertrap_amd64.go:212] [ 766: 767] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:27.173505 762332 usertrap_amd64.go:122] [ 766: 767] Allocate a new trap: 0xc000992a20 12 D0713 00:00:27.173669 762332 usertrap_amd64.go:225] [ 766: 767] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:27.174631 762332 task_signals.go:470] [ 766: 766] Notified of signal 23 D0713 00:00:27.174832 762332 task_signals.go:179] [ 766: 766] Restarting syscall 202: interrupted by signal 23 D0713 00:00:27.174901 762332 task_signals.go:220] [ 766: 766] Signal 23: delivering to handler D0713 00:00:27.181208 762332 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46af29:sysno 293 D0713 00:00:27.181275 762332 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000992a20 13 D0713 00:00:27.181432 762332 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:27.187094 762332 task_signals.go:470] [ 766: 766] Notified of signal 23 D0713 00:00:27.189324 762332 task_signals.go:220] [ 766: 766] Signal 23: delivering to handler I0713 00:00:27.203158 762332 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0713 00:00:27.203462 762332 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:27.203547 762332 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc000992a20 14 D0713 00:00:27.203755 762332 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:27.203957 762332 task_signals.go:470] [ 766: 766] Notified of signal 23 D0713 00:00:27.204327 762332 task_exit.go:204] [ 766: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.204779 762332 task_signals.go:204] [ 766: 767] Signal 766, PID: 767, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.204816 762332 task_signals.go:204] [ 766: 771] Signal 766, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.204842 762332 task_signals.go:204] [ 766: 770] Signal 766, PID: 770, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.205124 762332 task_signals.go:204] [ 766: 769] Signal 766, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.205196 762332 task_signals.go:204] [ 766: 768] Signal 766, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.205223 762332 task_exit.go:204] [ 766: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.205550 762332 task_exit.go:204] [ 766: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.205911 762332 task_exit.go:204] [ 766: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.206479 762332 task_exit.go:204] [ 766: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.206680 762332 task_exit.go:204] [ 766: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.206946 762332 task_exit.go:204] [ 766: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.207048 762332 task_exit.go:204] [ 766: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.207094 762332 task_exit.go:204] [ 766: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.207369 762332 task_exit.go:204] [ 766: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.207426 762332 task_exit.go:204] [ 766: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.208206 762332 task_exit.go:204] [ 766: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.208270 762332 task_exit.go:204] [ 766: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.208477 762332 task_exit.go:204] [ 766: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.208595 762332 task_exit.go:204] [ 766: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.234416 762332 task_exit.go:204] [ 766: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.234555 762332 task_exit.go:204] [ 766: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.234853 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:27.235256 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:27.235426 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:27.235555 762332 task_exit.go:204] [ 766: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.243739 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.244768 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:27.265966 762332 syscalls.go:262] [ 772: 772] Allocating stack with size of 8388608 bytes D0713 00:00:27.269033 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.269887 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:27.272394 762332 task_signals.go:470] [ 6: 12] Notified of signal 23 D0713 00:00:27.273140 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:27.273298 762332 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:27.273497 762332 usertrap_amd64.go:106] [ 772: 772] Map a usertrap vma at 65000 D0713 00:00:27.274653 762332 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc001582a20 1 D0713 00:00:27.275195 762332 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:27.277661 762332 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:27.277737 762332 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc001582a20 2 D0713 00:00:27.277933 762332 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:27.280703 762332 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:27.280765 762332 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc001582a20 3 D0713 00:00:27.280877 762332 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:27.302516 762332 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:27.302641 762332 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc001582a20 4 D0713 00:00:27.302779 762332 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:27.305997 762332 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:27.306088 762332 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc001582a20 5 D0713 00:00:27.306214 762332 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:27.306593 762332 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b214:sysno 13 D0713 00:00:27.306660 762332 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc001582a20 6 D0713 00:00:27.306792 762332 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:27.328783 762332 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:27.328880 762332 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc001582a20 7 D0713 00:00:27.329090 762332 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:27.330950 762332 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:27.331035 762332 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc001582a20 8 D0713 00:00:27.331220 762332 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:27.333259 762332 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46af76:sysno 35 D0713 00:00:27.333330 762332 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc001582a20 9 D0713 00:00:27.333596 762332 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:27.335171 762332 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:27.335253 762332 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc001582a20 10 D0713 00:00:27.335471 762332 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:27.347717 762332 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b020:sysno 39 D0713 00:00:27.347836 762332 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc001582a20 11 D0713 00:00:27.348744 762332 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:27.349887 762332 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:27.349970 762332 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc001582a20 12 D0713 00:00:27.350147 762332 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:27.351359 762332 task_signals.go:470] [ 772: 772] Notified of signal 23 D0713 00:00:27.352594 762332 task_signals.go:220] [ 772: 772] Signal 23: delivering to handler D0713 00:00:27.358001 762332 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46af29:sysno 293 D0713 00:00:27.358095 762332 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc001582a20 13 D0713 00:00:27.358285 762332 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:27.362971 762332 task_signals.go:470] [ 772: 772] Notified of signal 23 D0713 00:00:27.363191 762332 task_signals.go:220] [ 772: 772] Signal 23: delivering to handler D0713 00:00:27.377382 762332 task_signals.go:470] [ 772: 772] Notified of signal 23 D0713 00:00:27.379475 762332 task_signals.go:220] [ 772: 772] Signal 23: delivering to handler I0713 00:00:27.381309 762332 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0713 00:00:27.381552 762332 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:27.381611 762332 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc001582a20 14 D0713 00:00:27.381752 762332 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:27.382135 762332 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.382518 762332 task_signals.go:204] [ 772: 775] Signal 772, PID: 775, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.382591 762332 task_signals.go:204] [ 772: 773] Signal 772, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.382663 762332 task_signals.go:204] [ 772: 774] Signal 772, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.382732 762332 task_signals.go:204] [ 772: 776] Signal 772, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.382772 762332 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.383023 762332 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.383325 762332 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.383487 762332 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.384053 762332 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.384448 762332 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.384521 762332 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.385075 762332 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.385140 762332 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.385363 762332 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.385435 762332 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.410331 762332 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.410458 762332 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.410816 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:27.411397 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:27.411536 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:27.411769 762332 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.421879 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.422198 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:27.440592 762332 syscalls.go:262] [ 777: 777] Allocating stack with size of 8388608 bytes D0713 00:00:27.443387 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.443973 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:27.446453 762332 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:27.446662 762332 usertrap_amd64.go:106] [ 777: 777] Map a usertrap vma at 63000 D0713 00:00:27.447622 762332 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0023892c0 1 D0713 00:00:27.447948 762332 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:27.450074 762332 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:27.450144 762332 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0023892c0 2 D0713 00:00:27.450351 762332 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:27.453154 762332 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:27.453210 762332 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0023892c0 3 D0713 00:00:27.453408 762332 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:27.477192 762332 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:27.477306 762332 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0023892c0 4 D0713 00:00:27.477541 762332 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:27.480822 762332 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:27.480910 762332 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0023892c0 5 D0713 00:00:27.481130 762332 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:27.481542 762332 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b214:sysno 13 D0713 00:00:27.481577 762332 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0023892c0 6 D0713 00:00:27.481700 762332 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:27.502201 762332 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:27.502291 762332 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0023892c0 7 D0713 00:00:27.502426 762332 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:27.503886 762332 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:27.503941 762332 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc0023892c0 8 D0713 00:00:27.504113 762332 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:27.505887 762332 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46af76:sysno 35 D0713 00:00:27.505987 762332 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc0023892c0 9 D0713 00:00:27.506132 762332 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:27.507125 762332 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:27.507195 762332 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0023892c0 10 D0713 00:00:27.507965 762332 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:27.519525 762332 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b020:sysno 39 D0713 00:00:27.519598 762332 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc0023892c0 11 D0713 00:00:27.519728 762332 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:27.520327 762332 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:27.520431 762332 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc0023892c0 12 D0713 00:00:27.520644 762332 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:27.521176 762332 task_signals.go:470] [ 777: 777] Notified of signal 23 D0713 00:00:27.521607 762332 task_signals.go:220] [ 777: 777] Signal 23: delivering to handler D0713 00:00:27.526746 762332 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46af29:sysno 293 D0713 00:00:27.526814 762332 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0023892c0 13 D0713 00:00:27.526988 762332 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:27.533180 762332 task_signals.go:470] [ 777: 777] Notified of signal 23 D0713 00:00:27.534298 762332 task_signals.go:220] [ 777: 777] Signal 23: delivering to handler D0713 00:00:27.546268 762332 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:27.546332 762332 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0023892c0 14 D0713 00:00:27.546460 762332 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:27.546938 762332 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.547265 762332 task_signals.go:204] [ 777: 779] Signal 777, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.547263 762332 task_signals.go:204] [ 777: 780] Signal 777, PID: 780, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.547549 762332 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.547697 762332 task_signals.go:204] [ 777: 778] Signal 777, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.547737 762332 task_signals.go:204] [ 777: 781] Signal 777, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.547861 762332 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.548193 762332 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.548266 762332 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.548461 762332 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.548789 762332 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.548913 762332 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.549419 762332 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.549501 762332 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.549726 762332 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.549794 762332 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.567390 762332 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.567461 762332 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.567669 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:27.567898 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:27.567954 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:27.568183 762332 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.574540 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.578138 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:27.592883 762332 syscalls.go:262] [ 782: 782] Allocating stack with size of 8388608 bytes D0713 00:00:27.596069 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.596825 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:27.599623 762332 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:27.599785 762332 usertrap_amd64.go:106] [ 782: 782] Map a usertrap vma at 6a000 D0713 00:00:27.600829 762332 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008e2a80 1 D0713 00:00:27.601314 762332 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:27.603207 762332 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:27.603261 762332 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008e2a80 2 D0713 00:00:27.603365 762332 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:27.605879 762332 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:27.605944 762332 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008e2a80 3 D0713 00:00:27.606059 762332 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:27.626124 762332 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:27.626219 762332 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008e2a80 4 D0713 00:00:27.626395 762332 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:27.629711 762332 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:27.629793 762332 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008e2a80 5 D0713 00:00:27.629963 762332 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:27.630420 762332 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b214:sysno 13 D0713 00:00:27.630475 762332 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008e2a80 6 D0713 00:00:27.630664 762332 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:27.654389 762332 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:27.654501 762332 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008e2a80 7 D0713 00:00:27.654672 762332 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:27.656537 762332 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:27.656650 762332 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc0008e2a80 8 D0713 00:00:27.656977 762332 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:27.659342 762332 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46af76:sysno 35 D0713 00:00:27.659472 762332 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc0008e2a80 9 D0713 00:00:27.659676 762332 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:27.661691 762332 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:27.661807 762332 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008e2a80 10 D0713 00:00:27.662066 762332 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:27.664901 762332 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46b020:sysno 39 D0713 00:00:27.665025 762332 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc0008e2a80 11 D0713 00:00:27.665891 762332 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:27.667164 762332 usertrap_amd64.go:212] [ 782: 783] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:27.667257 762332 usertrap_amd64.go:122] [ 782: 783] Allocate a new trap: 0xc0008e2a80 12 D0713 00:00:27.667503 762332 usertrap_amd64.go:225] [ 782: 783] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:27.668228 762332 task_signals.go:470] [ 782: 782] Notified of signal 23 D0713 00:00:27.668479 762332 task_signals.go:220] [ 782: 782] Signal 23: delivering to handler D0713 00:00:27.680191 762332 task_signals.go:470] [ 782: 782] Notified of signal 23 D0713 00:00:27.680564 762332 task_signals.go:220] [ 782: 782] Signal 23: delivering to handler D0713 00:00:27.688525 762332 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46af29:sysno 293 D0713 00:00:27.688605 762332 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008e2a80 13 D0713 00:00:27.688761 762332 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:27.693845 762332 task_signals.go:470] [ 782: 782] Notified of signal 23 D0713 00:00:27.695806 762332 task_signals.go:220] [ 782: 782] Signal 23: delivering to handler D0713 00:00:27.709045 762332 usertrap_amd64.go:212] [ 782: 782] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:27.709130 762332 usertrap_amd64.go:122] [ 782: 782] Allocate a new trap: 0xc0008e2a80 14 D0713 00:00:27.709275 762332 usertrap_amd64.go:225] [ 782: 782] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:27.709726 762332 task_exit.go:204] [ 782: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.710086 762332 task_signals.go:204] [ 782: 783] Signal 782, PID: 783, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.710277 762332 task_signals.go:204] [ 782: 784] Signal 782, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.710327 762332 task_signals.go:204] [ 782: 786] Signal 782, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.710374 762332 task_signals.go:204] [ 782: 785] Signal 782, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.710392 762332 task_exit.go:204] [ 782: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.710666 762332 task_exit.go:204] [ 782: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.711028 762332 task_exit.go:204] [ 782: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.711404 762332 task_exit.go:204] [ 782: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.712346 762332 task_exit.go:204] [ 782: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.712497 762332 task_exit.go:204] [ 782: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.712594 762332 task_exit.go:204] [ 782: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.712782 762332 task_exit.go:204] [ 782: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.712852 762332 task_exit.go:204] [ 782: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.713077 762332 task_exit.go:204] [ 782: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.713154 762332 task_exit.go:204] [ 782: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.737998 762332 task_exit.go:204] [ 782: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.738090 762332 task_exit.go:204] [ 782: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.738355 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:27.738747 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:27.738837 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:27.738988 762332 task_exit.go:204] [ 782: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.746881 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.748909 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:27.768038 762332 syscalls.go:262] [ 787: 787] Allocating stack with size of 8388608 bytes D0713 00:00:27.770813 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.771418 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:27.775367 762332 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:27.775539 762332 usertrap_amd64.go:106] [ 787: 787] Map a usertrap vma at 62000 D0713 00:00:27.776585 762332 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc002389860 1 D0713 00:00:27.777019 762332 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:27.779129 762332 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:27.779200 762332 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc002389860 2 D0713 00:00:27.779324 762332 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:27.782248 762332 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:27.782319 762332 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc002389860 3 D0713 00:00:27.782491 762332 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:27.807208 762332 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:27.807311 762332 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc002389860 4 D0713 00:00:27.807496 762332 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:27.810795 762332 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:27.810890 762332 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc002389860 5 D0713 00:00:27.811058 762332 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:27.811535 762332 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b214:sysno 13 D0713 00:00:27.811608 762332 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc002389860 6 D0713 00:00:27.811772 762332 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:27.830714 762332 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:27.830810 762332 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc002389860 7 D0713 00:00:27.830940 762332 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:27.832561 762332 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:27.832662 762332 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc002389860 8 D0713 00:00:27.832845 762332 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:27.835426 762332 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46af76:sysno 35 D0713 00:00:27.835540 762332 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc002389860 9 D0713 00:00:27.836473 762332 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:27.836930 762332 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:27.837073 762332 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc002389860 10 D0713 00:00:27.837299 762332 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:27.840169 762332 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46b020:sysno 39 D0713 00:00:27.840266 762332 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc002389860 11 D0713 00:00:27.840596 762332 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:27.841816 762332 usertrap_amd64.go:212] [ 787: 788] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:27.841894 762332 usertrap_amd64.go:122] [ 787: 788] Allocate a new trap: 0xc002389860 12 D0713 00:00:27.842046 762332 usertrap_amd64.go:225] [ 787: 788] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:27.842595 762332 task_signals.go:470] [ 787: 787] Notified of signal 23 D0713 00:00:27.843224 762332 task_signals.go:220] [ 787: 787] Signal 23: delivering to handler D0713 00:00:27.853619 762332 task_signals.go:470] [ 787: 787] Notified of signal 23 D0713 00:00:27.854017 762332 task_signals.go:220] [ 787: 787] Signal 23: delivering to handler D0713 00:00:27.855467 762332 task_signals.go:470] [ 787: 787] Notified of signal 23 D0713 00:00:27.856511 762332 task_signals.go:220] [ 787: 787] Signal 23: delivering to handler D0713 00:00:27.857792 762332 task_signals.go:470] [ 787: 787] Notified of signal 23 D0713 00:00:27.858130 762332 task_signals.go:220] [ 787: 787] Signal 23: delivering to handler D0713 00:00:27.867336 762332 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46af29:sysno 293 D0713 00:00:27.867442 762332 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc002389860 13 D0713 00:00:27.867618 762332 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:27.874499 762332 task_signals.go:470] [ 787: 787] Notified of signal 23 D0713 00:00:27.877167 762332 task_signals.go:220] [ 787: 787] Signal 23: delivering to handler D0713 00:00:27.894335 762332 usertrap_amd64.go:212] [ 787: 787] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:27.894443 762332 usertrap_amd64.go:122] [ 787: 787] Allocate a new trap: 0xc002389860 14 D0713 00:00:27.894707 762332 usertrap_amd64.go:225] [ 787: 787] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:27.895250 762332 task_exit.go:204] [ 787: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.895850 762332 task_signals.go:204] [ 787: 790] Signal 787, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.895870 762332 task_signals.go:204] [ 787: 791] Signal 787, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.896070 762332 task_signals.go:204] [ 787: 789] Signal 787, PID: 789, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.896220 762332 task_signals.go:204] [ 787: 788] Signal 787, PID: 788, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:27.896299 762332 task_exit.go:204] [ 787: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.897018 762332 task_exit.go:204] [ 787: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.897263 762332 task_exit.go:204] [ 787: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.897775 762332 task_exit.go:204] [ 787: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:27.898156 762332 task_exit.go:204] [ 787: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.898752 762332 task_exit.go:204] [ 787: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.898830 762332 task_exit.go:204] [ 787: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.899120 762332 task_exit.go:204] [ 787: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.899276 762332 task_exit.go:204] [ 787: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.899792 762332 task_exit.go:204] [ 787: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.899916 762332 task_exit.go:204] [ 787: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.924750 762332 task_exit.go:204] [ 787: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:27.924838 762332 task_exit.go:204] [ 787: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.925169 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:27.925540 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:27.925612 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:27.926412 762332 task_exit.go:204] [ 787: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:27.934237 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.936679 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:27.955010 762332 syscalls.go:262] [ 792: 792] Allocating stack with size of 8388608 bytes D0713 00:00:27.958229 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:27.958997 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:27.962475 762332 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:27.962682 762332 usertrap_amd64.go:106] [ 792: 792] Map a usertrap vma at 64000 D0713 00:00:27.963765 762332 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000992d20 1 D0713 00:00:27.964153 762332 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:27.966486 762332 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:27.966558 762332 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000992d20 2 D0713 00:00:27.966714 762332 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:27.969549 762332 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:27.969613 762332 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000992d20 3 D0713 00:00:27.969738 762332 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:27.989906 762332 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:27.989969 762332 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000992d20 4 D0713 00:00:27.990106 762332 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:27.993295 762332 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:27.993373 762332 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000992d20 5 D0713 00:00:27.993517 762332 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:27.993938 762332 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b214:sysno 13 D0713 00:00:27.993985 762332 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000992d20 6 D0713 00:00:27.994096 762332 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:28.011545 762332 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:28.011632 762332 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000992d20 7 D0713 00:00:28.011775 762332 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:28.013731 762332 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:28.013865 762332 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc000992d20 8 D0713 00:00:28.014082 762332 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:28.015920 762332 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46af76:sysno 35 D0713 00:00:28.016028 762332 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc000992d20 9 D0713 00:00:28.017102 762332 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:28.017596 762332 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:28.017686 762332 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000992d20 10 D0713 00:00:28.017999 762332 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:28.032641 762332 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46b020:sysno 39 D0713 00:00:28.032740 762332 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc000992d20 11 D0713 00:00:28.032917 762332 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:28.034123 762332 usertrap_amd64.go:212] [ 792: 793] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:28.034194 762332 usertrap_amd64.go:122] [ 792: 793] Allocate a new trap: 0xc000992d20 12 D0713 00:00:28.034392 762332 usertrap_amd64.go:225] [ 792: 793] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:28.035370 762332 task_signals.go:470] [ 792: 792] Notified of signal 23 D0713 00:00:28.035536 762332 task_signals.go:220] [ 792: 792] Signal 23: delivering to handler D0713 00:00:28.042797 762332 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46af29:sysno 293 D0713 00:00:28.042899 762332 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000992d20 13 D0713 00:00:28.043085 762332 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:28.051431 762332 task_signals.go:470] [ 792: 792] Notified of signal 23 D0713 00:00:28.052197 762332 task_signals.go:220] [ 792: 792] Signal 23: delivering to handler D0713 00:00:28.066115 762332 usertrap_amd64.go:212] [ 792: 792] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:28.066207 762332 usertrap_amd64.go:122] [ 792: 792] Allocate a new trap: 0xc000992d20 14 D0713 00:00:28.066318 762332 usertrap_amd64.go:225] [ 792: 792] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:28.066661 762332 task_exit.go:204] [ 792: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.066988 762332 task_signals.go:204] [ 792: 797] Signal 792, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.067138 762332 task_signals.go:204] [ 792: 793] Signal 792, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.067218 762332 task_signals.go:204] [ 792: 794] Signal 792, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.067306 762332 task_exit.go:204] [ 792: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.067279 762332 task_signals.go:204] [ 792: 795] Signal 792, PID: 795, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.067568 762332 task_exit.go:204] [ 792: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.067746 762332 task_signals.go:204] [ 792: 796] Signal 792, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.068019 762332 task_exit.go:204] [ 792: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.068273 762332 task_exit.go:204] [ 792: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.068464 762332 task_exit.go:204] [ 792: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.068824 762332 task_exit.go:204] [ 792: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.069598 762332 task_exit.go:204] [ 792: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.069685 762332 task_exit.go:204] [ 792: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.070080 762332 task_exit.go:204] [ 792: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.070164 762332 task_exit.go:204] [ 792: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.070611 762332 task_exit.go:204] [ 792: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.070667 762332 task_exit.go:204] [ 792: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.070804 762332 task_exit.go:204] [ 792: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.070863 762332 task_exit.go:204] [ 792: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.091868 762332 task_exit.go:204] [ 792: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.091977 762332 task_exit.go:204] [ 792: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.092244 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:28.092542 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:28.092623 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:28.092867 762332 task_exit.go:204] [ 792: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.098889 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.102965 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:28.117484 762332 syscalls.go:262] [ 798: 798] Allocating stack with size of 8388608 bytes D0713 00:00:28.120650 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.121189 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:28.123973 762332 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:28.124153 762332 usertrap_amd64.go:106] [ 798: 798] Map a usertrap vma at 69000 D0713 00:00:28.124884 762332 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc002389d10 1 D0713 00:00:28.125194 762332 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:28.127057 762332 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:28.127147 762332 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc002389d10 2 D0713 00:00:28.127278 762332 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:28.130050 762332 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:28.130122 762332 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc002389d10 3 D0713 00:00:28.130243 762332 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:28.153793 762332 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:28.153908 762332 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc002389d10 4 D0713 00:00:28.154077 762332 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:28.157195 762332 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:28.157256 762332 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc002389d10 5 D0713 00:00:28.157427 762332 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:28.157798 762332 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b214:sysno 13 D0713 00:00:28.157843 762332 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc002389d10 6 D0713 00:00:28.157978 762332 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:28.178623 762332 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:28.178700 762332 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc002389d10 7 D0713 00:00:28.178823 762332 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:28.180505 762332 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:28.180622 762332 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc002389d10 8 D0713 00:00:28.180839 762332 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:28.182855 762332 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46af76:sysno 35 D0713 00:00:28.182968 762332 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc002389d10 9 D0713 00:00:28.183144 762332 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:28.184304 762332 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:28.184435 762332 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc002389d10 10 D0713 00:00:28.184612 762332 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:28.196020 762332 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46b020:sysno 39 D0713 00:00:28.196137 762332 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc002389d10 11 D0713 00:00:28.197137 762332 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:28.198446 762332 usertrap_amd64.go:212] [ 798: 799] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:28.198542 762332 usertrap_amd64.go:122] [ 798: 799] Allocate a new trap: 0xc002389d10 12 D0713 00:00:28.198885 762332 usertrap_amd64.go:225] [ 798: 799] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:28.199696 762332 task_signals.go:470] [ 798: 798] Notified of signal 23 D0713 00:00:28.200150 762332 task_signals.go:220] [ 798: 798] Signal 23: delivering to handler D0713 00:00:28.206035 762332 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46af29:sysno 293 D0713 00:00:28.206112 762332 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc002389d10 13 D0713 00:00:28.206314 762332 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:28.211498 762332 task_signals.go:470] [ 798: 798] Notified of signal 23 D0713 00:00:28.214150 762332 task_signals.go:220] [ 798: 798] Signal 23: delivering to handler D0713 00:00:28.222468 762332 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:28.222551 762332 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc002389d10 14 D0713 00:00:28.222768 762332 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46b6e0 trap addr 69460 ([184 24 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:28.230014 762332 usertrap_amd64.go:212] [ 798: 798] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:28.230075 762332 usertrap_amd64.go:122] [ 798: 798] Allocate a new trap: 0xc002389d10 15 D0713 00:00:28.230199 762332 usertrap_amd64.go:225] [ 798: 798] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 00:00:28.230636 762332 task_exit.go:204] [ 798: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.230985 762332 task_signals.go:204] [ 798: 802] Signal 798, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.231126 762332 task_signals.go:204] [ 798: 799] Signal 798, PID: 799, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.231205 762332 task_signals.go:204] [ 798: 801] Signal 798, PID: 801, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.231371 762332 task_signals.go:204] [ 798: 800] Signal 798, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.231396 762332 task_exit.go:204] [ 798: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.231549 762332 task_exit.go:204] [ 798: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.231896 762332 task_exit.go:204] [ 798: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.232104 762332 task_exit.go:204] [ 798: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.232342 762332 task_exit.go:204] [ 798: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.233660 762332 task_exit.go:204] [ 798: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.233751 762332 task_exit.go:204] [ 798: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.233921 762332 task_exit.go:204] [ 798: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.233984 762332 task_exit.go:204] [ 798: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.234155 762332 task_exit.go:204] [ 798: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.234246 762332 task_exit.go:204] [ 798: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.259727 762332 task_exit.go:204] [ 798: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.259880 762332 task_exit.go:204] [ 798: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.260298 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:28.260902 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:28.261097 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:28.261670 762332 task_exit.go:204] [ 798: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.270571 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.272390 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:28.289885 762332 syscalls.go:262] [ 803: 803] Allocating stack with size of 8388608 bytes D0713 00:00:28.292765 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.293353 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:28.295435 762332 task_signals.go:470] [ 6: 12] Notified of signal 23 D0713 00:00:28.295709 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:28.296753 762332 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:28.296920 762332 usertrap_amd64.go:106] [ 803: 803] Map a usertrap vma at 65000 D0713 00:00:28.297803 762332 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000993320 1 D0713 00:00:28.298298 762332 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:28.300355 762332 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:28.300416 762332 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000993320 2 D0713 00:00:28.300532 762332 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:28.303000 762332 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:28.303055 762332 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000993320 3 D0713 00:00:28.303167 762332 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:28.322491 762332 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:28.322567 762332 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000993320 4 D0713 00:00:28.322680 762332 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:28.325386 762332 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:28.325481 762332 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000993320 5 D0713 00:00:28.325614 762332 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:28.326012 762332 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46b214:sysno 13 D0713 00:00:28.326066 762332 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000993320 6 D0713 00:00:28.326204 762332 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:28.346980 762332 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:28.347082 762332 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000993320 7 D0713 00:00:28.347250 762332 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:28.349555 762332 usertrap_amd64.go:212] [ 803: 804] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:28.349709 762332 usertrap_amd64.go:122] [ 803: 804] Allocate a new trap: 0xc000993320 8 D0713 00:00:28.349957 762332 usertrap_amd64.go:225] [ 803: 804] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:28.352272 762332 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:28.352344 762332 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000993320 9 D0713 00:00:28.353237 762332 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:28.353698 762332 usertrap_amd64.go:212] [ 803: 804] Found the pattern at ip 46af76:sysno 35 D0713 00:00:28.353755 762332 usertrap_amd64.go:122] [ 803: 804] Allocate a new trap: 0xc000993320 10 D0713 00:00:28.353926 762332 usertrap_amd64.go:225] [ 803: 804] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:28.365231 762332 usertrap_amd64.go:212] [ 803: 804] Found the pattern at ip 46b020:sysno 39 D0713 00:00:28.365364 762332 usertrap_amd64.go:122] [ 803: 804] Allocate a new trap: 0xc000993320 11 D0713 00:00:28.365581 762332 usertrap_amd64.go:225] [ 803: 804] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:28.367771 762332 usertrap_amd64.go:212] [ 803: 804] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:28.367912 762332 usertrap_amd64.go:122] [ 803: 804] Allocate a new trap: 0xc000993320 12 D0713 00:00:28.368121 762332 usertrap_amd64.go:225] [ 803: 804] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:28.368768 762332 task_signals.go:470] [ 803: 803] Notified of signal 23 D0713 00:00:28.369068 762332 task_signals.go:220] [ 803: 803] Signal 23: delivering to handler D0713 00:00:28.375952 762332 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46af29:sysno 293 D0713 00:00:28.376015 762332 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000993320 13 D0713 00:00:28.376181 762332 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:28.382971 762332 task_signals.go:470] [ 803: 803] Notified of signal 23 D0713 00:00:28.385484 762332 task_signals.go:220] [ 803: 803] Signal 23: delivering to handler D0713 00:00:28.401088 762332 usertrap_amd64.go:212] [ 803: 803] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:28.401245 762332 usertrap_amd64.go:122] [ 803: 803] Allocate a new trap: 0xc000993320 14 D0713 00:00:28.401439 762332 usertrap_amd64.go:225] [ 803: 803] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:28.401939 762332 task_exit.go:204] [ 803: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.402357 762332 task_signals.go:204] [ 803: 806] Signal 803, PID: 806, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.402493 762332 task_signals.go:204] [ 803: 807] Signal 803, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.402703 762332 task_signals.go:204] [ 803: 804] Signal 803, PID: 804, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.402557 762332 task_signals.go:204] [ 803: 805] Signal 803, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.403039 762332 task_exit.go:204] [ 803: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.403404 762332 task_exit.go:204] [ 803: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.403687 762332 task_exit.go:204] [ 803: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.404100 762332 task_exit.go:204] [ 803: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.405900 762332 task_exit.go:204] [ 803: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.406000 762332 task_exit.go:204] [ 803: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.406352 762332 task_exit.go:204] [ 803: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.406427 762332 task_exit.go:204] [ 803: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.406637 762332 task_exit.go:204] [ 803: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.406689 762332 task_exit.go:204] [ 803: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.406896 762332 task_exit.go:204] [ 803: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.429743 762332 task_exit.go:204] [ 803: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.429823 762332 task_exit.go:204] [ 803: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.430098 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:28.430703 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:28.430900 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:28.430927 762332 task_exit.go:204] [ 803: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.438770 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.440918 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:28.466007 762332 syscalls.go:262] [ 808: 808] Allocating stack with size of 8388608 bytes D0713 00:00:28.469913 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.470674 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:28.473916 762332 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:28.474122 762332 usertrap_amd64.go:106] [ 808: 808] Map a usertrap vma at 61000 D0713 00:00:28.475189 762332 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001de3e30 1 D0713 00:00:28.475617 762332 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:28.477728 762332 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:28.477833 762332 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001de3e30 2 D0713 00:00:28.477961 762332 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:28.481128 762332 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:28.481222 762332 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001de3e30 3 D0713 00:00:28.481393 762332 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:28.500199 762332 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:28.500280 762332 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001de3e30 4 D0713 00:00:28.500438 762332 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:28.503466 762332 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:28.503531 762332 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001de3e30 5 D0713 00:00:28.503659 762332 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:28.504051 762332 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b214:sysno 13 D0713 00:00:28.504160 762332 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001de3e30 6 D0713 00:00:28.504324 762332 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:28.522631 762332 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:28.522732 762332 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001de3e30 7 D0713 00:00:28.522893 762332 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:28.524402 762332 usertrap_amd64.go:212] [ 808: 809] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:28.524472 762332 usertrap_amd64.go:122] [ 808: 809] Allocate a new trap: 0xc001de3e30 8 D0713 00:00:28.524669 762332 usertrap_amd64.go:225] [ 808: 809] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:28.526623 762332 usertrap_amd64.go:212] [ 808: 809] Found the pattern at ip 46af76:sysno 35 D0713 00:00:28.526708 762332 usertrap_amd64.go:122] [ 808: 809] Allocate a new trap: 0xc001de3e30 9 D0713 00:00:28.526889 762332 usertrap_amd64.go:225] [ 808: 809] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:28.528387 762332 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:28.528510 762332 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001de3e30 10 D0713 00:00:28.528776 762332 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:28.543296 762332 usertrap_amd64.go:212] [ 808: 809] Found the pattern at ip 46b020:sysno 39 D0713 00:00:28.543386 762332 usertrap_amd64.go:122] [ 808: 809] Allocate a new trap: 0xc001de3e30 11 D0713 00:00:28.543595 762332 usertrap_amd64.go:225] [ 808: 809] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:28.544044 762332 usertrap_amd64.go:212] [ 808: 809] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:28.544113 762332 usertrap_amd64.go:122] [ 808: 809] Allocate a new trap: 0xc001de3e30 12 D0713 00:00:28.544250 762332 usertrap_amd64.go:225] [ 808: 809] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:28.544729 762332 task_signals.go:470] [ 808: 808] Notified of signal 23 D0713 00:00:28.545005 762332 task_signals.go:220] [ 808: 808] Signal 23: delivering to handler D0713 00:00:28.556695 762332 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46af29:sysno 293 D0713 00:00:28.556812 762332 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001de3e30 13 D0713 00:00:28.557072 762332 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:28.558394 762332 task_signals.go:470] [ 808: 808] Notified of signal 23 D0713 00:00:28.558849 762332 task_signals.go:179] [ 808: 808] Restarting syscall 202: interrupted by signal 23 D0713 00:00:28.558942 762332 task_signals.go:220] [ 808: 808] Signal 23: delivering to handler D0713 00:00:28.573396 762332 task_signals.go:470] [ 808: 808] Notified of signal 23 D0713 00:00:28.575070 762332 task_signals.go:220] [ 808: 808] Signal 23: delivering to handler D0713 00:00:28.583481 762332 usertrap_amd64.go:212] [ 808: 808] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:28.583630 762332 usertrap_amd64.go:122] [ 808: 808] Allocate a new trap: 0xc001de3e30 14 D0713 00:00:28.583815 762332 usertrap_amd64.go:225] [ 808: 808] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:28.584395 762332 task_exit.go:204] [ 808: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.584820 762332 task_signals.go:204] [ 808: 810] Signal 808, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.585062 762332 task_signals.go:204] [ 808: 813] Signal 808, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.585141 762332 task_signals.go:204] [ 808: 809] Signal 808, PID: 809, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.585293 762332 task_exit.go:204] [ 808: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.585318 762332 task_signals.go:204] [ 808: 811] Signal 808, PID: 811, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.585472 762332 task_signals.go:204] [ 808: 812] Signal 808, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.585569 762332 task_exit.go:204] [ 808: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.585845 762332 task_exit.go:204] [ 808: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.586057 762332 task_exit.go:204] [ 808: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.586372 762332 task_exit.go:204] [ 808: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.586843 762332 task_exit.go:204] [ 808: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.587839 762332 task_exit.go:204] [ 808: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.587948 762332 task_exit.go:204] [ 808: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.588263 762332 task_exit.go:204] [ 808: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.588346 762332 task_exit.go:204] [ 808: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.588570 762332 task_exit.go:204] [ 808: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.588620 762332 task_exit.go:204] [ 808: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.588840 762332 task_exit.go:204] [ 808: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.588898 762332 task_exit.go:204] [ 808: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.611734 762332 task_exit.go:204] [ 808: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.611852 762332 task_exit.go:204] [ 808: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.612142 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:28.612623 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:28.612744 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:28.612984 762332 task_exit.go:204] [ 808: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.620378 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.623078 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:28.642338 762332 syscalls.go:262] [ 814: 814] Allocating stack with size of 8388608 bytes D0713 00:00:28.645409 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.646067 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:28.649525 762332 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:28.649731 762332 usertrap_amd64.go:106] [ 814: 814] Map a usertrap vma at 67000 D0713 00:00:28.650858 762332 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000465350 1 D0713 00:00:28.651130 762332 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:28.653093 762332 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:28.653158 762332 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000465350 2 D0713 00:00:28.653285 762332 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:28.656406 762332 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:28.656462 762332 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000465350 3 D0713 00:00:28.656575 762332 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:28.675380 762332 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:28.675454 762332 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000465350 4 D0713 00:00:28.675651 762332 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:28.678342 762332 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:28.678403 762332 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000465350 5 D0713 00:00:28.678545 762332 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:28.678947 762332 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b214:sysno 13 D0713 00:00:28.678990 762332 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000465350 6 D0713 00:00:28.679102 762332 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:28.699261 762332 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:28.699361 762332 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000465350 7 D0713 00:00:28.699553 762332 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:28.701615 762332 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:28.701782 762332 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000465350 8 D0713 00:00:28.702110 762332 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:28.704277 762332 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46af76:sysno 35 D0713 00:00:28.704348 762332 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000465350 9 D0713 00:00:28.704523 762332 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:28.706268 762332 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:28.706351 762332 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000465350 10 D0713 00:00:28.706599 762332 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:28.719657 762332 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b020:sysno 39 D0713 00:00:28.719733 762332 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000465350 11 D0713 00:00:28.720626 762332 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:28.722103 762332 usertrap_amd64.go:212] [ 814: 815] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:28.722192 762332 usertrap_amd64.go:122] [ 814: 815] Allocate a new trap: 0xc000465350 12 D0713 00:00:28.723142 762332 usertrap_amd64.go:225] [ 814: 815] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:28.723705 762332 task_signals.go:470] [ 814: 814] Notified of signal 23 D0713 00:00:28.724460 762332 task_signals.go:220] [ 814: 814] Signal 23: delivering to handler D0713 00:00:28.725967 762332 task_signals.go:470] [ 814: 814] Notified of signal 23 D0713 00:00:28.726267 762332 task_signals.go:220] [ 814: 814] Signal 23: delivering to handler D0713 00:00:28.734517 762332 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46af29:sysno 293 D0713 00:00:28.734613 762332 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000465350 13 D0713 00:00:28.734873 762332 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:28.740334 762332 task_signals.go:470] [ 814: 814] Notified of signal 23 D0713 00:00:28.740692 762332 task_signals.go:220] [ 814: 814] Signal 23: delivering to handler D0713 00:00:28.754867 762332 task_signals.go:470] [ 814: 814] Notified of signal 23 D0713 00:00:28.755056 762332 task_signals.go:220] [ 814: 814] Signal 23: delivering to handler D0713 00:00:28.763170 762332 usertrap_amd64.go:212] [ 814: 814] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:28.763273 762332 usertrap_amd64.go:122] [ 814: 814] Allocate a new trap: 0xc000465350 14 D0713 00:00:28.763456 762332 usertrap_amd64.go:225] [ 814: 814] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:28.763991 762332 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.764468 762332 task_signals.go:204] [ 814: 815] Signal 814, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.764696 762332 task_signals.go:204] [ 814: 818] Signal 814, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.764748 762332 task_signals.go:204] [ 814: 819] Signal 814, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.764766 762332 task_signals.go:204] [ 814: 817] Signal 814, PID: 817, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.765013 762332 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.765222 762332 task_signals.go:204] [ 814: 816] Signal 814, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.765585 762332 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.765646 762332 task_exit.go:204] [ 814: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.765837 762332 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.766137 762332 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.766449 762332 task_exit.go:204] [ 814: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.766743 762332 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.767056 762332 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.767731 762332 task_exit.go:204] [ 814: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.767821 762332 task_exit.go:204] [ 814: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.768145 762332 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.768205 762332 task_exit.go:204] [ 814: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.768487 762332 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.768535 762332 task_exit.go:204] [ 814: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.798349 762332 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.798466 762332 task_exit.go:204] [ 814: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.798758 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:28.799209 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:28.799313 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:28.799587 762332 task_exit.go:204] [ 814: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.807816 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.809190 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:28.829736 762332 syscalls.go:262] [ 820: 820] Allocating stack with size of 8388608 bytes D0713 00:00:28.833176 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.833807 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:28.837907 762332 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:28.838070 762332 usertrap_amd64.go:106] [ 820: 820] Map a usertrap vma at 68000 D0713 00:00:28.838905 762332 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000465a40 1 D0713 00:00:28.839163 762332 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:28.841302 762332 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:28.841369 762332 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000465a40 2 D0713 00:00:28.841571 762332 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:28.844410 762332 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:28.844475 762332 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000465a40 3 D0713 00:00:28.844652 762332 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:28.863970 762332 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:28.864039 762332 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000465a40 4 D0713 00:00:28.864189 762332 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:28.866943 762332 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:28.867011 762332 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000465a40 5 D0713 00:00:28.867170 762332 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:28.867613 762332 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b214:sysno 13 D0713 00:00:28.867688 762332 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000465a40 6 D0713 00:00:28.867804 762332 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:28.885540 762332 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:28.885673 762332 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000465a40 7 D0713 00:00:28.885928 762332 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:28.888152 762332 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:28.888280 762332 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc000465a40 8 D0713 00:00:28.888527 762332 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:28.890715 762332 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46af76:sysno 35 D0713 00:00:28.890803 762332 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc000465a40 9 D0713 00:00:28.891781 762332 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:28.892377 762332 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:28.892463 762332 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000465a40 10 D0713 00:00:28.892682 762332 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:28.893436 762332 usertrap_amd64.go:212] [ 820: 823] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:28.893528 762332 usertrap_amd64.go:122] [ 820: 823] Allocate a new trap: 0xc000465a40 11 D0713 00:00:28.893744 762332 usertrap_amd64.go:225] [ 820: 823] Apply the binary patch addr 46b6e0 trap addr 68370 ([184 24 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:28.905610 762332 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b020:sysno 39 D0713 00:00:28.905739 762332 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc000465a40 12 D0713 00:00:28.906003 762332 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:28.908068 762332 usertrap_amd64.go:212] [ 820: 821] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:28.908174 762332 usertrap_amd64.go:122] [ 820: 821] Allocate a new trap: 0xc000465a40 13 D0713 00:00:28.908417 762332 usertrap_amd64.go:225] [ 820: 821] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:28.909127 762332 task_signals.go:470] [ 820: 820] Notified of signal 23 D0713 00:00:28.909796 762332 task_signals.go:220] [ 820: 820] Signal 23: delivering to handler D0713 00:00:28.911003 762332 task_signals.go:481] [ 820: 820] No task notified of signal 23 D0713 00:00:28.911231 762332 task_signals.go:220] [ 820: 820] Signal 23: delivering to handler D0713 00:00:28.912502 762332 task_signals.go:470] [ 820: 820] Notified of signal 23 D0713 00:00:28.912686 762332 task_signals.go:220] [ 820: 820] Signal 23: delivering to handler D0713 00:00:28.918763 762332 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46af29:sysno 293 D0713 00:00:28.918823 762332 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000465a40 14 D0713 00:00:28.918998 762332 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46af29 trap addr 68460 ([184 37 1 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:28.927494 762332 task_signals.go:470] [ 820: 820] Notified of signal 23 D0713 00:00:28.927888 762332 task_signals.go:220] [ 820: 820] Signal 23: delivering to handler D0713 00:00:28.944451 762332 usertrap_amd64.go:212] [ 820: 820] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:28.944544 762332 usertrap_amd64.go:122] [ 820: 820] Allocate a new trap: 0xc000465a40 15 D0713 00:00:28.944794 762332 task_signals.go:470] [ 820: 820] Notified of signal 23 D0713 00:00:28.944808 762332 usertrap_amd64.go:225] [ 820: 820] Apply the binary patch addr 46ae44 trap addr 684b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 132 6 0]) D0713 00:00:28.945266 762332 task_signals.go:220] [ 820: 820] Signal 23: delivering to handler D0713 00:00:28.946665 762332 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.947051 762332 task_signals.go:204] [ 820: 821] Signal 820, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.947269 762332 task_signals.go:204] [ 820: 824] Signal 820, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.947311 762332 task_signals.go:204] [ 820: 822] Signal 820, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.947319 762332 task_signals.go:204] [ 820: 825] Signal 820, PID: 825, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.947432 762332 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.947792 762332 task_signals.go:204] [ 820: 823] Signal 820, PID: 823, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:28.947926 762332 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.948386 762332 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.948724 762332 task_exit.go:204] [ 820: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.949389 762332 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:28.949812 762332 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.950025 762332 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.950083 762332 task_exit.go:204] [ 820: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.950327 762332 task_exit.go:204] [ 820: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.950420 762332 task_exit.go:204] [ 820: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.950959 762332 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.951053 762332 task_exit.go:204] [ 820: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.951209 762332 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.951268 762332 task_exit.go:204] [ 820: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.973151 762332 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:28.973246 762332 task_exit.go:204] [ 820: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.973476 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:28.973713 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:28.973799 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:28.974024 762332 task_exit.go:204] [ 820: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:28.980553 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:28.983814 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:28.998270 762332 syscalls.go:262] [ 826: 826] Allocating stack with size of 8388608 bytes D0713 00:00:29.001839 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.002472 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:29.006354 762332 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:29.006517 762332 usertrap_amd64.go:106] [ 826: 826] Map a usertrap vma at 68000 D0713 00:00:29.007364 762332 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc0008e3e30 1 D0713 00:00:29.007673 762332 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:29.009467 762332 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:29.009521 762332 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc0008e3e30 2 D0713 00:00:29.009661 762332 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:29.012144 762332 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:29.012210 762332 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc0008e3e30 3 D0713 00:00:29.012354 762332 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:29.033454 762332 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:29.033540 762332 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc0008e3e30 4 D0713 00:00:29.033680 762332 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:29.036735 762332 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:29.036836 762332 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc0008e3e30 5 D0713 00:00:29.037141 762332 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:29.037685 762332 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b214:sysno 13 D0713 00:00:29.037750 762332 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc0008e3e30 6 D0713 00:00:29.038003 762332 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:29.056713 762332 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:29.056815 762332 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc0008e3e30 7 D0713 00:00:29.057016 762332 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:29.059569 762332 usertrap_amd64.go:212] [ 826: 827] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:29.059721 762332 usertrap_amd64.go:122] [ 826: 827] Allocate a new trap: 0xc0008e3e30 8 D0713 00:00:29.063671 762332 usertrap_amd64.go:225] [ 826: 827] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:29.066329 762332 usertrap_amd64.go:212] [ 826: 827] Found the pattern at ip 46af76:sysno 35 D0713 00:00:29.066468 762332 usertrap_amd64.go:122] [ 826: 827] Allocate a new trap: 0xc0008e3e30 9 D0713 00:00:29.066783 762332 usertrap_amd64.go:225] [ 826: 827] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:29.068700 762332 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:29.068812 762332 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc0008e3e30 10 D0713 00:00:29.069117 762332 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:29.081667 762332 usertrap_amd64.go:212] [ 826: 827] Found the pattern at ip 46b020:sysno 39 D0713 00:00:29.081777 762332 usertrap_amd64.go:122] [ 826: 827] Allocate a new trap: 0xc0008e3e30 11 D0713 00:00:29.081930 762332 usertrap_amd64.go:225] [ 826: 827] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:29.083112 762332 usertrap_amd64.go:212] [ 826: 827] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:29.083236 762332 usertrap_amd64.go:122] [ 826: 827] Allocate a new trap: 0xc0008e3e30 12 D0713 00:00:29.083914 762332 usertrap_amd64.go:225] [ 826: 827] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:29.084535 762332 task_signals.go:470] [ 826: 826] Notified of signal 23 D0713 00:00:29.084823 762332 task_signals.go:220] [ 826: 826] Signal 23: delivering to handler D0713 00:00:29.091750 762332 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46af29:sysno 293 D0713 00:00:29.091820 762332 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc0008e3e30 13 D0713 00:00:29.091993 762332 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:29.096801 762332 task_signals.go:470] [ 826: 826] Notified of signal 23 D0713 00:00:29.100032 762332 task_signals.go:220] [ 826: 826] Signal 23: delivering to handler D0713 00:00:29.101466 762332 task_signals.go:470] [ 826: 826] Notified of signal 23 D0713 00:00:29.101884 762332 task_signals.go:179] [ 826: 826] Restarting syscall 202: interrupted by signal 23 D0713 00:00:29.101950 762332 task_signals.go:220] [ 826: 826] Signal 23: delivering to handler D0713 00:00:29.115075 762332 task_signals.go:470] [ 826: 826] Notified of signal 23 D0713 00:00:29.115721 762332 task_signals.go:220] [ 826: 826] Signal 23: delivering to handler D0713 00:00:29.117880 762332 usertrap_amd64.go:212] [ 826: 826] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:29.117951 762332 usertrap_amd64.go:122] [ 826: 826] Allocate a new trap: 0xc0008e3e30 14 D0713 00:00:29.118111 762332 usertrap_amd64.go:225] [ 826: 826] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:29.118603 762332 task_exit.go:204] [ 826: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.119004 762332 task_signals.go:204] [ 826: 828] Signal 826, PID: 828, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.119155 762332 task_signals.go:204] [ 826: 827] Signal 826, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.119211 762332 task_signals.go:204] [ 826: 829] Signal 826, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.119329 762332 task_exit.go:204] [ 826: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.119549 762332 task_signals.go:204] [ 826: 830] Signal 826, PID: 830, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.119751 762332 task_exit.go:204] [ 826: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.120181 762332 task_exit.go:204] [ 826: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.120399 762332 task_exit.go:204] [ 826: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.120573 762332 task_exit.go:204] [ 826: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.120856 762332 task_exit.go:204] [ 826: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.120958 762332 task_exit.go:204] [ 826: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.121530 762332 task_exit.go:204] [ 826: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.121620 762332 task_exit.go:204] [ 826: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.121827 762332 task_exit.go:204] [ 826: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.121888 762332 task_exit.go:204] [ 826: 827] Transitioning from exit state TaskExitZombie to TaskExitDead executing program D0713 00:00:29.143966 762332 task_exit.go:204] [ 826: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.144122 762332 task_exit.go:204] [ 826: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.144496 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:29.145032 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:29.145166 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:29.146247 762332 task_exit.go:204] [ 826: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.152415 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.154485 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:29.172754 762332 syscalls.go:262] [ 831: 831] Allocating stack with size of 8388608 bytes D0713 00:00:29.175493 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.175947 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:29.179151 762332 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:29.179277 762332 usertrap_amd64.go:106] [ 831: 831] Map a usertrap vma at 69000 D0713 00:00:29.179934 762332 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc000d985d0 1 D0713 00:00:29.180217 762332 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:29.182498 762332 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:29.182549 762332 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc000d985d0 2 D0713 00:00:29.182669 762332 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:29.185933 762332 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:29.185991 762332 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc000d985d0 3 D0713 00:00:29.186120 762332 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:29.207544 762332 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:29.207645 762332 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc000d985d0 4 D0713 00:00:29.207836 762332 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:29.210915 762332 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:29.211009 762332 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc000d985d0 5 D0713 00:00:29.211218 762332 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:29.211684 762332 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b214:sysno 13 D0713 00:00:29.211757 762332 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc000d985d0 6 D0713 00:00:29.211908 762332 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:29.230600 762332 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:29.230678 762332 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc000d985d0 7 D0713 00:00:29.230818 762332 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:29.232625 762332 usertrap_amd64.go:212] [ 831: 832] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:29.232727 762332 usertrap_amd64.go:122] [ 831: 832] Allocate a new trap: 0xc000d985d0 8 D0713 00:00:29.233044 762332 usertrap_amd64.go:225] [ 831: 832] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:29.235534 762332 usertrap_amd64.go:212] [ 831: 832] Found the pattern at ip 46af76:sysno 35 D0713 00:00:29.235658 762332 usertrap_amd64.go:122] [ 831: 832] Allocate a new trap: 0xc000d985d0 9 D0713 00:00:29.235849 762332 usertrap_amd64.go:225] [ 831: 832] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:29.237434 762332 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:29.237510 762332 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc000d985d0 10 D0713 00:00:29.237810 762332 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:29.251068 762332 usertrap_amd64.go:212] [ 831: 832] Found the pattern at ip 46b020:sysno 39 D0713 00:00:29.251147 762332 usertrap_amd64.go:122] [ 831: 832] Allocate a new trap: 0xc000d985d0 11 D0713 00:00:29.252465 762332 usertrap_amd64.go:225] [ 831: 832] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:29.253629 762332 usertrap_amd64.go:212] [ 831: 832] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:29.253693 762332 usertrap_amd64.go:122] [ 831: 832] Allocate a new trap: 0xc000d985d0 12 D0713 00:00:29.253845 762332 usertrap_amd64.go:225] [ 831: 832] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:29.254458 762332 task_signals.go:470] [ 831: 831] Notified of signal 23 D0713 00:00:29.256260 762332 task_signals.go:220] [ 831: 831] Signal 23: delivering to handler D0713 00:00:29.257668 762332 task_signals.go:470] [ 831: 831] Notified of signal 23 D0713 00:00:29.257932 762332 task_signals.go:220] [ 831: 831] Signal 23: delivering to handler D0713 00:00:29.264892 762332 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46af29:sysno 293 D0713 00:00:29.265033 762332 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc000d985d0 13 D0713 00:00:29.265241 762332 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:29.271241 762332 task_signals.go:470] [ 831: 831] Notified of signal 23 D0713 00:00:29.272566 762332 task_signals.go:220] [ 831: 831] Signal 23: delivering to handler D0713 00:00:29.288487 762332 usertrap_amd64.go:212] [ 831: 831] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:29.288575 762332 usertrap_amd64.go:122] [ 831: 831] Allocate a new trap: 0xc000d985d0 14 D0713 00:00:29.288711 762332 usertrap_amd64.go:225] [ 831: 831] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:29.289126 762332 task_exit.go:204] [ 831: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.289495 762332 task_signals.go:204] [ 831: 832] Signal 831, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.289576 762332 task_signals.go:204] [ 831: 833] Signal 831, PID: 833, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.289823 762332 task_signals.go:204] [ 831: 836] Signal 831, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.289834 762332 task_signals.go:204] [ 831: 834] Signal 831, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.290009 762332 task_exit.go:204] [ 831: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.290270 762332 task_signals.go:204] [ 831: 835] Signal 831, PID: 835, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.290485 762332 task_exit.go:204] [ 831: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.291002 762332 task_exit.go:204] [ 831: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.291239 762332 task_exit.go:204] [ 831: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.291418 762332 task_exit.go:204] [ 831: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.291611 762332 task_exit.go:204] [ 831: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.292233 762332 task_exit.go:204] [ 831: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.292327 762332 task_exit.go:204] [ 831: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.292743 762332 task_exit.go:204] [ 831: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.292842 762332 task_exit.go:204] [ 831: 833] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.293075 762332 task_exit.go:204] [ 831: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.293137 762332 task_exit.go:204] [ 831: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.293322 762332 task_exit.go:204] [ 831: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.293370 762332 task_exit.go:204] [ 831: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.316559 762332 task_exit.go:204] [ 831: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.316667 762332 task_exit.go:204] [ 831: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.316990 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:29.317496 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:29.317659 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:29.317745 762332 task_exit.go:204] [ 831: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.328907 762332 task_signals.go:470] [ 6: 12] Notified of signal 23 D0713 00:00:29.329265 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:29.335091 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.340476 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:29.352298 762332 syscalls.go:262] [ 837: 837] Allocating stack with size of 8388608 bytes D0713 00:00:29.355725 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.356271 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:29.359069 762332 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:29.359222 762332 usertrap_amd64.go:106] [ 837: 837] Map a usertrap vma at 62000 D0713 00:00:29.359949 762332 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc000f2e6f0 1 D0713 00:00:29.360310 762332 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:29.362190 762332 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:29.362244 762332 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc000f2e6f0 2 D0713 00:00:29.362356 762332 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:29.365076 762332 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:29.365140 762332 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc000f2e6f0 3 D0713 00:00:29.365306 762332 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:29.386416 762332 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:29.386516 762332 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc000f2e6f0 4 D0713 00:00:29.386657 762332 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:29.389606 762332 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:29.389690 762332 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc000f2e6f0 5 D0713 00:00:29.389831 762332 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:29.390200 762332 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46b214:sysno 13 D0713 00:00:29.390240 762332 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc000f2e6f0 6 D0713 00:00:29.390358 762332 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:29.410865 762332 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:29.410961 762332 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc000f2e6f0 7 D0713 00:00:29.411157 762332 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:29.413200 762332 usertrap_amd64.go:212] [ 837: 838] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:29.413304 762332 usertrap_amd64.go:122] [ 837: 838] Allocate a new trap: 0xc000f2e6f0 8 D0713 00:00:29.413528 762332 usertrap_amd64.go:225] [ 837: 838] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:29.416145 762332 usertrap_amd64.go:212] [ 837: 838] Found the pattern at ip 46af76:sysno 35 D0713 00:00:29.416226 762332 usertrap_amd64.go:122] [ 837: 838] Allocate a new trap: 0xc000f2e6f0 9 D0713 00:00:29.416378 762332 usertrap_amd64.go:225] [ 837: 838] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:29.417615 762332 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:29.417708 762332 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc000f2e6f0 10 D0713 00:00:29.417879 762332 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:29.431730 762332 usertrap_amd64.go:212] [ 837: 838] Found the pattern at ip 46b020:sysno 39 D0713 00:00:29.431801 762332 usertrap_amd64.go:122] [ 837: 838] Allocate a new trap: 0xc000f2e6f0 11 D0713 00:00:29.431964 762332 usertrap_amd64.go:225] [ 837: 838] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:29.432552 762332 usertrap_amd64.go:212] [ 837: 838] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:29.432638 762332 usertrap_amd64.go:122] [ 837: 838] Allocate a new trap: 0xc000f2e6f0 12 D0713 00:00:29.434392 762332 usertrap_amd64.go:225] [ 837: 838] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:29.435477 762332 task_signals.go:470] [ 837: 837] Notified of signal 23 D0713 00:00:29.436443 762332 task_signals.go:220] [ 837: 837] Signal 23: delivering to handler D0713 00:00:29.443588 762332 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46af29:sysno 293 D0713 00:00:29.443691 762332 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc000f2e6f0 13 D0713 00:00:29.443875 762332 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:29.449292 762332 task_signals.go:470] [ 837: 837] Notified of signal 23 D0713 00:00:29.451474 762332 task_signals.go:220] [ 837: 837] Signal 23: delivering to handler I0713 00:00:29.467266 762332 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0713 00:00:29.467538 762332 usertrap_amd64.go:212] [ 837: 837] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:29.467623 762332 usertrap_amd64.go:122] [ 837: 837] Allocate a new trap: 0xc000f2e6f0 14 D0713 00:00:29.467765 762332 usertrap_amd64.go:225] [ 837: 837] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:29.468246 762332 task_exit.go:204] [ 837: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.468661 762332 task_signals.go:204] [ 837: 841] Signal 837, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.468930 762332 task_signals.go:204] [ 837: 842] Signal 837, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.469182 762332 task_signals.go:204] [ 837: 838] Signal 837, PID: 838, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.469215 762332 task_signals.go:204] [ 837: 840] Signal 837, PID: 840, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.469201 762332 task_signals.go:204] [ 837: 839] Signal 837, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.469348 762332 task_exit.go:204] [ 837: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.469786 762332 task_exit.go:204] [ 837: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.470157 762332 task_exit.go:204] [ 837: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.470614 762332 task_exit.go:204] [ 837: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.470694 762332 task_exit.go:204] [ 837: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.470995 762332 task_exit.go:204] [ 837: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.471152 762332 task_exit.go:204] [ 837: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.471311 762332 task_exit.go:204] [ 837: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.471426 762332 task_exit.go:204] [ 837: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.471524 762332 task_exit.go:204] [ 837: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.472655 762332 task_exit.go:204] [ 837: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.472722 762332 task_exit.go:204] [ 837: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.473026 762332 task_exit.go:204] [ 837: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.473083 762332 task_exit.go:204] [ 837: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.497534 762332 task_exit.go:204] [ 837: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.497683 762332 task_exit.go:204] [ 837: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.498004 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:29.498454 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:29.498559 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:29.498769 762332 task_exit.go:204] [ 837: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.505933 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.508451 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:29.526402 762332 syscalls.go:262] [ 843: 843] Allocating stack with size of 8388608 bytes D0713 00:00:29.530098 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.530793 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:29.534186 762332 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:29.534373 762332 usertrap_amd64.go:106] [ 843: 843] Map a usertrap vma at 60000 D0713 00:00:29.537036 762332 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc000d98d80 1 D0713 00:00:29.537446 762332 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:29.540108 762332 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:29.540191 762332 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc000d98d80 2 D0713 00:00:29.540396 762332 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:29.543632 762332 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:29.543688 762332 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc000d98d80 3 D0713 00:00:29.543816 762332 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:29.562863 762332 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:29.562957 762332 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc000d98d80 4 D0713 00:00:29.563179 762332 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:29.566917 762332 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:29.567011 762332 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc000d98d80 5 D0713 00:00:29.567213 762332 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:29.567774 762332 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b214:sysno 13 D0713 00:00:29.567835 762332 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc000d98d80 6 D0713 00:00:29.568032 762332 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:29.597478 762332 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:29.597560 762332 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc000d98d80 7 D0713 00:00:29.597755 762332 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:29.599801 762332 usertrap_amd64.go:212] [ 843: 844] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:29.599895 762332 usertrap_amd64.go:122] [ 843: 844] Allocate a new trap: 0xc000d98d80 8 D0713 00:00:29.600105 762332 usertrap_amd64.go:225] [ 843: 844] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:29.602150 762332 usertrap_amd64.go:212] [ 843: 844] Found the pattern at ip 46af76:sysno 35 D0713 00:00:29.602268 762332 usertrap_amd64.go:122] [ 843: 844] Allocate a new trap: 0xc000d98d80 9 D0713 00:00:29.602465 762332 usertrap_amd64.go:225] [ 843: 844] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:29.602901 762332 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:29.602985 762332 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc000d98d80 10 D0713 00:00:29.603874 762332 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:29.604332 762332 usertrap_amd64.go:212] [ 843: 844] Found the pattern at ip 46b020:sysno 39 D0713 00:00:29.604398 762332 usertrap_amd64.go:122] [ 843: 844] Allocate a new trap: 0xc000d98d80 11 D0713 00:00:29.604679 762332 usertrap_amd64.go:225] [ 843: 844] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:29.605309 762332 usertrap_amd64.go:212] [ 843: 844] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:29.605393 762332 usertrap_amd64.go:122] [ 843: 844] Allocate a new trap: 0xc000d98d80 12 D0713 00:00:29.605577 762332 usertrap_amd64.go:225] [ 843: 844] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:29.606106 762332 task_signals.go:470] [ 843: 846] Notified of signal 23 D0713 00:00:29.606509 762332 task_signals.go:179] [ 843: 846] Restarting syscall 202: interrupted by signal 23 D0713 00:00:29.606586 762332 task_signals.go:220] [ 843: 846] Signal 23: delivering to handler D0713 00:00:29.617919 762332 task_signals.go:470] [ 843: 843] Notified of signal 23 D0713 00:00:29.618288 762332 task_signals.go:179] [ 843: 843] Restarting syscall 202: interrupted by signal 23 D0713 00:00:29.618381 762332 task_signals.go:220] [ 843: 843] Signal 23: delivering to handler D0713 00:00:29.625822 762332 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46af29:sysno 293 D0713 00:00:29.625897 762332 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc000d98d80 13 D0713 00:00:29.626055 762332 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:29.632544 762332 task_signals.go:470] [ 843: 843] Notified of signal 23 D0713 00:00:29.634324 762332 task_signals.go:220] [ 843: 843] Signal 23: delivering to handler D0713 00:00:29.642970 762332 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:29.643064 762332 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc000d98d80 14 D0713 00:00:29.644040 762332 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b6e0 trap addr 60460 ([184 24 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:29.648107 762332 task_signals.go:470] [ 843: 843] Notified of signal 23 D0713 00:00:29.648351 762332 task_signals.go:220] [ 843: 843] Signal 23: delivering to handler I0713 00:00:29.654141 762332 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0713 00:00:29.654405 762332 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:29.654473 762332 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc000d98d80 15 D0713 00:00:29.654652 762332 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46ae44 trap addr 604b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 4 6 0]) D0713 00:00:29.655155 762332 task_exit.go:204] [ 843: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.655488 762332 task_signals.go:204] [ 843: 845] Signal 843, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.655495 762332 task_signals.go:204] [ 843: 844] Signal 843, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.655583 762332 task_signals.go:204] [ 843: 847] Signal 843, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.655763 762332 task_signals.go:204] [ 843: 846] Signal 843, PID: 846, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.655832 762332 task_exit.go:204] [ 843: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.656114 762332 task_exit.go:204] [ 843: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.656595 762332 task_exit.go:204] [ 843: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.656669 762332 task_exit.go:204] [ 843: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.656997 762332 task_exit.go:204] [ 843: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.657144 762332 task_exit.go:204] [ 843: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.657429 762332 task_exit.go:204] [ 843: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.658325 762332 task_exit.go:204] [ 843: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.658466 762332 task_exit.go:204] [ 843: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.658782 762332 task_exit.go:204] [ 843: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.658850 762332 task_exit.go:204] [ 843: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.681755 762332 task_exit.go:204] [ 843: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.681854 762332 task_exit.go:204] [ 843: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.682090 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:29.682467 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:29.682569 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:29.682831 762332 task_exit.go:204] [ 843: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.691465 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.693740 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:29.712343 762332 syscalls.go:262] [ 848: 848] Allocating stack with size of 8388608 bytes D0713 00:00:29.715170 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.715950 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:29.719456 762332 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:29.719632 762332 usertrap_amd64.go:106] [ 848: 848] Map a usertrap vma at 61000 D0713 00:00:29.720479 762332 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc0020aa2a0 1 D0713 00:00:29.720748 762332 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:29.722920 762332 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:29.722998 762332 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc0020aa2a0 2 D0713 00:00:29.723110 762332 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:29.725845 762332 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:29.725893 762332 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc0020aa2a0 3 D0713 00:00:29.726106 762332 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:29.747548 762332 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:29.747685 762332 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc0020aa2a0 4 D0713 00:00:29.747868 762332 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:29.750896 762332 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:29.750959 762332 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc0020aa2a0 5 D0713 00:00:29.751086 762332 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:29.751421 762332 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46b214:sysno 13 D0713 00:00:29.751461 762332 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc0020aa2a0 6 D0713 00:00:29.751579 762332 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:29.769274 762332 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:29.769350 762332 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc0020aa2a0 7 D0713 00:00:29.769504 762332 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:29.771243 762332 usertrap_amd64.go:212] [ 848: 849] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:29.771325 762332 usertrap_amd64.go:122] [ 848: 849] Allocate a new trap: 0xc0020aa2a0 8 D0713 00:00:29.771444 762332 usertrap_amd64.go:225] [ 848: 849] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:29.772834 762332 usertrap_amd64.go:212] [ 848: 849] Found the pattern at ip 46af76:sysno 35 D0713 00:00:29.772885 762332 usertrap_amd64.go:122] [ 848: 849] Allocate a new trap: 0xc0020aa2a0 9 D0713 00:00:29.773069 762332 usertrap_amd64.go:225] [ 848: 849] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:29.774698 762332 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:29.774781 762332 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc0020aa2a0 10 D0713 00:00:29.775852 762332 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:29.788060 762332 usertrap_amd64.go:212] [ 848: 849] Found the pattern at ip 46b020:sysno 39 D0713 00:00:29.788146 762332 usertrap_amd64.go:122] [ 848: 849] Allocate a new trap: 0xc0020aa2a0 11 D0713 00:00:29.788399 762332 usertrap_amd64.go:225] [ 848: 849] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:29.789075 762332 usertrap_amd64.go:212] [ 848: 849] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:29.789141 762332 usertrap_amd64.go:122] [ 848: 849] Allocate a new trap: 0xc0020aa2a0 12 D0713 00:00:29.789346 762332 usertrap_amd64.go:225] [ 848: 849] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:29.789877 762332 task_signals.go:470] [ 848: 848] Notified of signal 23 D0713 00:00:29.790199 762332 task_signals.go:220] [ 848: 848] Signal 23: delivering to handler D0713 00:00:29.802013 762332 task_signals.go:470] [ 848: 848] Notified of signal 23 D0713 00:00:29.802141 762332 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46af29:sysno 293 D0713 00:00:29.802215 762332 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc0020aa2a0 13 D0713 00:00:29.802402 762332 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:29.802681 762332 task_signals.go:220] [ 848: 848] Signal 23: delivering to handler D0713 00:00:29.804861 762332 task_signals.go:470] [ 848: 848] Notified of signal 23 D0713 00:00:29.805186 762332 task_signals.go:220] [ 848: 848] Signal 23: delivering to handler D0713 00:00:29.821938 762332 task_signals.go:470] [ 848: 848] Notified of signal 23 D0713 00:00:29.824182 762332 task_signals.go:220] [ 848: 848] Signal 23: delivering to handler I0713 00:00:29.826251 762332 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0713 00:00:29.826559 762332 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:29.826623 762332 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc0020aa2a0 14 D0713 00:00:29.826786 762332 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:29.827187 762332 task_exit.go:204] [ 848: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.827776 762332 task_signals.go:204] [ 848: 850] Signal 848, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.827987 762332 task_signals.go:204] [ 848: 851] Signal 848, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.828013 762332 task_signals.go:204] [ 848: 849] Signal 848, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.828145 762332 task_signals.go:204] [ 848: 852] Signal 848, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:29.828175 762332 task_exit.go:204] [ 848: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.828380 762332 task_exit.go:204] [ 848: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.828636 762332 task_exit.go:204] [ 848: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.828826 762332 task_exit.go:204] [ 848: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.829154 762332 task_exit.go:204] [ 848: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:29.830419 762332 task_exit.go:204] [ 848: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.830513 762332 task_exit.go:204] [ 848: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.830768 762332 task_exit.go:204] [ 848: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.830849 762332 task_exit.go:204] [ 848: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.831183 762332 task_exit.go:204] [ 848: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.831277 762332 task_exit.go:204] [ 848: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.853186 762332 task_exit.go:204] [ 848: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:29.853315 762332 task_exit.go:204] [ 848: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.853549 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:29.853865 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:29.853935 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:29.854021 762332 task_exit.go:204] [ 848: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:29.860898 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.864169 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:29.881045 762332 syscalls.go:262] [ 853: 853] Allocating stack with size of 8388608 bytes D0713 00:00:29.884079 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:29.884709 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:29.888847 762332 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:29.889160 762332 usertrap_amd64.go:106] [ 853: 853] Map a usertrap vma at 69000 D0713 00:00:29.890284 762332 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc000bad560 1 D0713 00:00:29.890774 762332 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:29.893092 762332 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:29.893208 762332 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc000bad560 2 D0713 00:00:29.893369 762332 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:29.896905 762332 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:29.897065 762332 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc000bad560 3 D0713 00:00:29.897243 762332 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:29.918728 762332 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:29.918808 762332 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc000bad560 4 D0713 00:00:29.918986 762332 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:29.922054 762332 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:29.922115 762332 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc000bad560 5 D0713 00:00:29.922267 762332 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:29.922647 762332 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46b214:sysno 13 D0713 00:00:29.922691 762332 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc000bad560 6 D0713 00:00:29.922864 762332 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:29.941211 762332 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:29.941274 762332 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc000bad560 7 D0713 00:00:29.941395 762332 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:29.942734 762332 usertrap_amd64.go:212] [ 853: 854] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:29.942794 762332 usertrap_amd64.go:122] [ 853: 854] Allocate a new trap: 0xc000bad560 8 D0713 00:00:29.942924 762332 usertrap_amd64.go:225] [ 853: 854] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:29.946088 762332 usertrap_amd64.go:212] [ 853: 854] Found the pattern at ip 46af76:sysno 35 D0713 00:00:29.946203 762332 usertrap_amd64.go:122] [ 853: 854] Allocate a new trap: 0xc000bad560 9 D0713 00:00:29.947072 762332 usertrap_amd64.go:225] [ 853: 854] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:29.947840 762332 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:29.948083 762332 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc000bad560 10 D0713 00:00:29.951660 762332 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:29.954455 762332 usertrap_amd64.go:212] [ 853: 854] Found the pattern at ip 46b020:sysno 39 D0713 00:00:29.954575 762332 usertrap_amd64.go:122] [ 853: 854] Allocate a new trap: 0xc000bad560 11 D0713 00:00:29.955695 762332 usertrap_amd64.go:225] [ 853: 854] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:29.956427 762332 usertrap_amd64.go:212] [ 853: 854] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:29.956515 762332 usertrap_amd64.go:122] [ 853: 854] Allocate a new trap: 0xc000bad560 12 D0713 00:00:29.957270 762332 usertrap_amd64.go:225] [ 853: 854] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:29.957910 762332 task_signals.go:470] [ 853: 853] Notified of signal 23 D0713 00:00:29.958121 762332 task_signals.go:220] [ 853: 853] Signal 23: delivering to handler D0713 00:00:29.969561 762332 task_signals.go:470] [ 853: 853] Notified of signal 23 D0713 00:00:29.969830 762332 task_signals.go:179] [ 853: 853] Restarting syscall 202: interrupted by signal 23 D0713 00:00:29.969912 762332 task_signals.go:220] [ 853: 853] Signal 23: delivering to handler D0713 00:00:29.978652 762332 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46af29:sysno 293 D0713 00:00:29.978718 762332 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc000bad560 13 D0713 00:00:29.978881 762332 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:29.983360 762332 task_signals.go:470] [ 853: 853] Notified of signal 23 D0713 00:00:29.983586 762332 task_signals.go:179] [ 853: 853] Restarting syscall 202: interrupted by signal 23 D0713 00:00:29.983686 762332 task_signals.go:220] [ 853: 853] Signal 23: delivering to handler D0713 00:00:29.997892 762332 task_signals.go:470] [ 853: 853] Notified of signal 23 D0713 00:00:29.998138 762332 task_signals.go:220] [ 853: 853] Signal 23: delivering to handler D0713 00:00:30.004676 762332 usertrap_amd64.go:212] [ 853: 853] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:30.004747 762332 usertrap_amd64.go:122] [ 853: 853] Allocate a new trap: 0xc000bad560 14 D0713 00:00:30.004898 762332 usertrap_amd64.go:225] [ 853: 853] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:30.005366 762332 task_exit.go:204] [ 853: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.005903 762332 task_signals.go:204] [ 853: 857] Signal 853, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.005969 762332 task_signals.go:204] [ 853: 855] Signal 853, PID: 855, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.006056 762332 task_exit.go:204] [ 853: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.006026 762332 task_signals.go:204] [ 853: 854] Signal 853, PID: 854, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.006293 762332 task_signals.go:204] [ 853: 856] Signal 853, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.006387 762332 task_exit.go:204] [ 853: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.006595 762332 task_exit.go:204] [ 853: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.006828 762332 task_exit.go:204] [ 853: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.007158 762332 task_exit.go:204] [ 853: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.008442 762332 task_exit.go:204] [ 853: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.008528 762332 task_exit.go:204] [ 853: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.008911 762332 task_exit.go:204] [ 853: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.009018 762332 task_exit.go:204] [ 853: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.009404 762332 task_exit.go:204] [ 853: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.009505 762332 task_exit.go:204] [ 853: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.031956 762332 task_exit.go:204] [ 853: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.032083 762332 task_exit.go:204] [ 853: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.032562 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:30.033240 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:30.033423 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:30.034022 762332 task_exit.go:204] [ 853: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.042345 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.043151 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:30.063835 762332 syscalls.go:262] [ 858: 858] Allocating stack with size of 8388608 bytes D0713 00:00:30.067036 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.067651 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:30.072814 762332 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:30.073116 762332 usertrap_amd64.go:106] [ 858: 858] Map a usertrap vma at 65000 D0713 00:00:30.074050 762332 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc000d58900 1 D0713 00:00:30.074329 762332 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:30.076570 762332 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:30.076624 762332 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc000d58900 2 D0713 00:00:30.076743 762332 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:30.080531 762332 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:30.080599 762332 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc000d58900 3 D0713 00:00:30.080732 762332 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:30.102272 762332 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:30.102393 762332 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc000d58900 4 D0713 00:00:30.102589 762332 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:30.105795 762332 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:30.105885 762332 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc000d58900 5 D0713 00:00:30.106090 762332 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:30.106552 762332 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46b214:sysno 13 D0713 00:00:30.106629 762332 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc000d58900 6 D0713 00:00:30.106805 762332 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:30.127564 762332 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:30.127656 762332 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc000d58900 7 D0713 00:00:30.127815 762332 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:30.129637 762332 usertrap_amd64.go:212] [ 858: 859] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:30.129738 762332 usertrap_amd64.go:122] [ 858: 859] Allocate a new trap: 0xc000d58900 8 D0713 00:00:30.130088 762332 usertrap_amd64.go:225] [ 858: 859] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:30.132765 762332 usertrap_amd64.go:212] [ 858: 859] Found the pattern at ip 46af76:sysno 35 D0713 00:00:30.132876 762332 usertrap_amd64.go:122] [ 858: 859] Allocate a new trap: 0xc000d58900 9 D0713 00:00:30.133955 762332 usertrap_amd64.go:225] [ 858: 859] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:30.134562 762332 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:30.134730 762332 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc000d58900 10 D0713 00:00:30.135045 762332 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:30.148724 762332 usertrap_amd64.go:212] [ 858: 859] Found the pattern at ip 46b020:sysno 39 D0713 00:00:30.148877 762332 usertrap_amd64.go:122] [ 858: 859] Allocate a new trap: 0xc000d58900 11 D0713 00:00:30.149220 762332 usertrap_amd64.go:225] [ 858: 859] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:30.150676 762332 usertrap_amd64.go:212] [ 858: 859] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:30.150789 762332 usertrap_amd64.go:122] [ 858: 859] Allocate a new trap: 0xc000d58900 12 D0713 00:00:30.151811 762332 usertrap_amd64.go:225] [ 858: 859] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:30.153087 762332 task_signals.go:470] [ 858: 858] Notified of signal 23 D0713 00:00:30.154479 762332 task_signals.go:220] [ 858: 858] Signal 23: delivering to handler D0713 00:00:30.162228 762332 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46af29:sysno 293 D0713 00:00:30.162318 762332 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc000d58900 13 D0713 00:00:30.162461 762332 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:30.167214 762332 task_signals.go:470] [ 858: 858] Notified of signal 23 D0713 00:00:30.169199 762332 task_signals.go:220] [ 858: 858] Signal 23: delivering to handler I0713 00:00:30.187927 762332 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0713 00:00:30.188265 762332 usertrap_amd64.go:212] [ 858: 858] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:30.188335 762332 usertrap_amd64.go:122] [ 858: 858] Allocate a new trap: 0xc000d58900 14 D0713 00:00:30.188496 762332 usertrap_amd64.go:225] [ 858: 858] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:30.189093 762332 task_exit.go:204] [ 858: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.189736 762332 task_signals.go:204] [ 858: 862] Signal 858, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.190137 762332 task_signals.go:204] [ 858: 861] Signal 858, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.190160 762332 task_exit.go:204] [ 858: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.190333 762332 task_signals.go:204] [ 858: 863] Signal 858, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.190376 762332 task_signals.go:204] [ 858: 859] Signal 858, PID: 859, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.190416 762332 task_signals.go:204] [ 858: 860] Signal 858, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.190512 762332 task_exit.go:204] [ 858: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.190761 762332 task_exit.go:204] [ 858: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.190958 762332 task_exit.go:204] [ 858: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.191638 762332 task_exit.go:204] [ 858: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.192137 762332 task_exit.go:204] [ 858: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.193238 762332 task_exit.go:204] [ 858: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.193334 762332 task_exit.go:204] [ 858: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.193596 762332 task_exit.go:204] [ 858: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.193644 762332 task_exit.go:204] [ 858: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.193787 762332 task_exit.go:204] [ 858: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.193863 762332 task_exit.go:204] [ 858: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.194235 762332 task_exit.go:204] [ 858: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.194355 762332 task_exit.go:204] [ 858: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.216844 762332 task_exit.go:204] [ 858: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.216968 762332 task_exit.go:204] [ 858: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.217245 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:30.217740 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:30.217928 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:30.218069 762332 task_exit.go:204] [ 858: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.227452 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.227645 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:30.246139 762332 syscalls.go:262] [ 864: 864] Allocating stack with size of 8388608 bytes D0713 00:00:30.248992 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.249584 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:30.253578 762332 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:30.253709 762332 usertrap_amd64.go:106] [ 864: 864] Map a usertrap vma at 60000 D0713 00:00:30.254370 762332 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0014ed8f0 1 D0713 00:00:30.254621 762332 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:30.256374 762332 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:30.256425 762332 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0014ed8f0 2 D0713 00:00:30.256547 762332 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:30.258839 762332 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:30.258904 762332 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0014ed8f0 3 D0713 00:00:30.259051 762332 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:30.282969 762332 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:30.283092 762332 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0014ed8f0 4 D0713 00:00:30.283303 762332 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:30.286560 762332 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:30.286630 762332 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0014ed8f0 5 D0713 00:00:30.286807 762332 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:30.287251 762332 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b214:sysno 13 D0713 00:00:30.287305 762332 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0014ed8f0 6 D0713 00:00:30.287460 762332 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:30.309811 762332 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:30.309890 762332 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0014ed8f0 7 D0713 00:00:30.310015 762332 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:30.311615 762332 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:30.311714 762332 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc0014ed8f0 8 D0713 00:00:30.311952 762332 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:30.313669 762332 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46af76:sysno 35 D0713 00:00:30.313794 762332 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc0014ed8f0 9 D0713 00:00:30.314112 762332 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:30.315911 762332 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:30.315995 762332 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0014ed8f0 10 D0713 00:00:30.316269 762332 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:30.328568 762332 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46b020:sysno 39 D0713 00:00:30.328667 762332 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc0014ed8f0 11 D0713 00:00:30.328822 762332 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:30.330480 762332 usertrap_amd64.go:212] [ 864: 865] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:30.330544 762332 usertrap_amd64.go:122] [ 864: 865] Allocate a new trap: 0xc0014ed8f0 12 D0713 00:00:30.330730 762332 usertrap_amd64.go:225] [ 864: 865] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:30.331294 762332 task_signals.go:470] [ 864: 864] Notified of signal 23 D0713 00:00:30.331607 762332 task_signals.go:220] [ 864: 864] Signal 23: delivering to handler D0713 00:00:30.339674 762332 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46af29:sysno 293 D0713 00:00:30.339747 762332 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0014ed8f0 13 D0713 00:00:30.339882 762332 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:30.344841 762332 task_signals.go:470] [ 864: 864] Notified of signal 23 D0713 00:00:30.345336 762332 task_signals.go:220] [ 864: 864] Signal 23: delivering to handler D0713 00:00:30.347226 762332 task_signals.go:470] [ 864: 864] Notified of signal 23 D0713 00:00:30.347544 762332 task_signals.go:220] [ 864: 864] Signal 23: delivering to handler D0713 00:00:30.362549 762332 task_signals.go:470] [ 864: 864] Notified of signal 23 D0713 00:00:30.362877 762332 task_signals.go:220] [ 864: 864] Signal 23: delivering to handler I0713 00:00:30.368606 762332 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0713 00:00:30.369096 762332 usertrap_amd64.go:212] [ 864: 864] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:30.369196 762332 usertrap_amd64.go:122] [ 864: 864] Allocate a new trap: 0xc0014ed8f0 14 D0713 00:00:30.369345 762332 usertrap_amd64.go:225] [ 864: 864] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:30.369817 762332 task_exit.go:204] [ 864: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.370284 762332 task_signals.go:204] [ 864: 866] Signal 864, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.370324 762332 task_signals.go:204] [ 864: 865] Signal 864, PID: 865, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.370523 762332 task_signals.go:204] [ 864: 867] Signal 864, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.370602 762332 task_exit.go:204] [ 864: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.370907 762332 task_exit.go:204] [ 864: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.371068 762332 task_signals.go:204] [ 864: 868] Signal 864, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.371562 762332 task_exit.go:204] [ 864: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.371780 762332 task_exit.go:204] [ 864: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.372284 762332 task_exit.go:204] [ 864: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.372344 762332 task_exit.go:204] [ 864: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.372572 762332 task_exit.go:204] [ 864: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.372645 762332 task_exit.go:204] [ 864: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.372851 762332 task_exit.go:204] [ 864: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.372921 762332 task_exit.go:204] [ 864: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.373090 762332 task_exit.go:204] [ 864: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.395715 762332 task_exit.go:204] [ 864: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.395839 762332 task_exit.go:204] [ 864: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.396078 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:30.396816 762332 task_exit.go:204] [ 864: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.397113 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:30.397258 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:30.404664 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.406731 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:30.428433 762332 syscalls.go:262] [ 869: 869] Allocating stack with size of 8388608 bytes D0713 00:00:30.431488 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.432179 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:30.437107 762332 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:30.437323 762332 usertrap_amd64.go:106] [ 869: 869] Map a usertrap vma at 65000 D0713 00:00:30.438537 762332 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc00202db60 1 D0713 00:00:30.438900 762332 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:30.440787 762332 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:30.440848 762332 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc00202db60 2 D0713 00:00:30.441066 762332 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:30.443506 762332 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:30.443578 762332 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc00202db60 3 D0713 00:00:30.443679 762332 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:30.465170 762332 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:30.465297 762332 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc00202db60 4 D0713 00:00:30.465543 762332 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:30.469192 762332 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:30.469301 762332 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc00202db60 5 D0713 00:00:30.469477 762332 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:30.470010 762332 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b214:sysno 13 D0713 00:00:30.470096 762332 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc00202db60 6 D0713 00:00:30.470235 762332 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:30.494803 762332 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:30.494935 762332 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc00202db60 7 D0713 00:00:30.495147 762332 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:30.497165 762332 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:30.497259 762332 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc00202db60 8 D0713 00:00:30.497406 762332 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:30.500701 762332 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:30.500782 762332 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc00202db60 9 D0713 00:00:30.501606 762332 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:30.502069 762332 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46af76:sysno 35 D0713 00:00:30.502125 762332 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc00202db60 10 D0713 00:00:30.502374 762332 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:30.515278 762332 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b020:sysno 39 D0713 00:00:30.515425 762332 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc00202db60 11 D0713 00:00:30.516218 762332 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:30.517970 762332 usertrap_amd64.go:212] [ 869: 870] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:30.518080 762332 usertrap_amd64.go:122] [ 869: 870] Allocate a new trap: 0xc00202db60 12 D0713 00:00:30.518385 762332 usertrap_amd64.go:225] [ 869: 870] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:30.519054 762332 task_signals.go:470] [ 869: 869] Notified of signal 23 D0713 00:00:30.519377 762332 task_signals.go:220] [ 869: 869] Signal 23: delivering to handler D0713 00:00:30.528823 762332 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46af29:sysno 293 D0713 00:00:30.528958 762332 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc00202db60 13 D0713 00:00:30.529094 762332 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:30.537259 762332 task_signals.go:470] [ 869: 869] Notified of signal 23 D0713 00:00:30.540332 762332 task_signals.go:220] [ 869: 869] Signal 23: delivering to handler D0713 00:00:30.556861 762332 usertrap_amd64.go:212] [ 869: 869] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:30.557048 762332 usertrap_amd64.go:122] [ 869: 869] Allocate a new trap: 0xc00202db60 14 D0713 00:00:30.557310 762332 usertrap_amd64.go:225] [ 869: 869] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:30.557829 762332 task_exit.go:204] [ 869: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.558369 762332 task_signals.go:204] [ 869: 872] Signal 869, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.558825 762332 task_exit.go:204] [ 869: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.558888 762332 task_signals.go:204] [ 869: 871] Signal 869, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.559247 762332 task_signals.go:204] [ 869: 873] Signal 869, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.559309 762332 task_exit.go:204] [ 869: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.559673 762332 task_exit.go:204] [ 869: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.560023 762332 task_signals.go:204] [ 869: 870] Signal 869, PID: 870, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.560525 762332 task_exit.go:204] [ 869: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.560852 762332 task_exit.go:204] [ 869: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.562304 762332 task_exit.go:204] [ 869: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.562404 762332 task_exit.go:204] [ 869: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.562650 762332 task_exit.go:204] [ 869: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.562710 762332 task_exit.go:204] [ 869: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.562885 762332 task_exit.go:204] [ 869: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.562946 762332 task_exit.go:204] [ 869: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.591004 762332 task_exit.go:204] [ 869: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.591145 762332 task_exit.go:204] [ 869: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.591516 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:30.592110 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:30.592182 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:30.593048 762332 task_exit.go:204] [ 869: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.602808 762332 task_signals.go:470] [ 6: 12] Notified of signal 23 D0713 00:00:30.605861 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.634129 762332 syscalls.go:262] [ 874: 874] Allocating stack with size of 8388608 bytes D0713 00:00:30.638556 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.639508 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:30.644681 762332 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:30.644885 762332 usertrap_amd64.go:106] [ 874: 874] Map a usertrap vma at 6a000 D0713 00:00:30.645924 762332 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc000bade00 1 D0713 00:00:30.646269 762332 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:30.648935 762332 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:30.649054 762332 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc000bade00 2 D0713 00:00:30.649318 762332 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:30.653408 762332 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:30.653478 762332 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc000bade00 3 D0713 00:00:30.653678 762332 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:30.677487 762332 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:30.677587 762332 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc000bade00 4 D0713 00:00:30.677878 762332 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:30.681650 762332 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:30.681731 762332 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc000bade00 5 D0713 00:00:30.681955 762332 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:30.682354 762332 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b214:sysno 13 D0713 00:00:30.682406 762332 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc000bade00 6 D0713 00:00:30.682576 762332 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:30.707668 762332 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:30.707797 762332 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc000bade00 7 D0713 00:00:30.708002 762332 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:30.715677 762332 usertrap_amd64.go:212] [ 874: 875] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:30.715896 762332 usertrap_amd64.go:122] [ 874: 875] Allocate a new trap: 0xc000bade00 8 D0713 00:00:30.716276 762332 usertrap_amd64.go:225] [ 874: 875] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:30.719436 762332 usertrap_amd64.go:212] [ 874: 875] Found the pattern at ip 46af76:sysno 35 D0713 00:00:30.719552 762332 usertrap_amd64.go:122] [ 874: 875] Allocate a new trap: 0xc000bade00 9 D0713 00:00:30.720858 762332 usertrap_amd64.go:225] [ 874: 875] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:30.721501 762332 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:30.721593 762332 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc000bade00 10 D0713 00:00:30.721836 762332 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:30.734592 762332 usertrap_amd64.go:212] [ 874: 875] Found the pattern at ip 46b020:sysno 39 D0713 00:00:30.734720 762332 usertrap_amd64.go:122] [ 874: 875] Allocate a new trap: 0xc000bade00 11 D0713 00:00:30.735664 762332 usertrap_amd64.go:225] [ 874: 875] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:30.736568 762332 usertrap_amd64.go:212] [ 874: 875] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:30.736641 762332 usertrap_amd64.go:122] [ 874: 875] Allocate a new trap: 0xc000bade00 12 D0713 00:00:30.736888 762332 usertrap_amd64.go:225] [ 874: 875] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:30.737523 762332 task_signals.go:470] [ 874: 874] Notified of signal 23 D0713 00:00:30.738237 762332 task_signals.go:220] [ 874: 874] Signal 23: delivering to handler D0713 00:00:30.751717 762332 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46af29:sysno 293 D0713 00:00:30.751815 762332 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc000bade00 13 D0713 00:00:30.752018 762332 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:30.753115 762332 task_signals.go:470] [ 874: 874] Notified of signal 23 D0713 00:00:30.753367 762332 task_signals.go:220] [ 874: 874] Signal 23: delivering to handler D0713 00:00:30.767112 762332 task_signals.go:470] [ 874: 874] Notified of signal 23 D0713 00:00:30.767652 762332 task_signals.go:220] [ 874: 874] Signal 23: delivering to handler I0713 00:00:30.779536 762332 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0713 00:00:30.779892 762332 usertrap_amd64.go:212] [ 874: 874] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:30.779966 762332 usertrap_amd64.go:122] [ 874: 874] Allocate a new trap: 0xc000bade00 14 D0713 00:00:30.780165 762332 usertrap_amd64.go:225] [ 874: 874] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:30.780708 762332 task_exit.go:204] [ 874: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.781148 762332 task_signals.go:204] [ 874: 877] Signal 874, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.781522 762332 task_signals.go:204] [ 874: 876] Signal 874, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.781560 762332 task_signals.go:204] [ 874: 878] Signal 874, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.781705 762332 task_exit.go:204] [ 874: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.781726 762332 task_signals.go:204] [ 874: 875] Signal 874, PID: 875, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.781977 762332 task_exit.go:204] [ 874: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.782672 762332 task_exit.go:204] [ 874: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.782958 762332 task_exit.go:204] [ 874: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.783569 762332 task_exit.go:204] [ 874: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.783645 762332 task_exit.go:204] [ 874: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.784231 762332 task_exit.go:204] [ 874: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.784568 762332 task_exit.go:204] [ 874: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.784669 762332 task_exit.go:204] [ 874: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.784972 762332 task_exit.go:204] [ 874: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.785123 762332 task_exit.go:204] [ 874: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.806729 762332 task_exit.go:204] [ 874: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.806831 762332 task_exit.go:204] [ 874: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.807107 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:30.807481 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:30.807548 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:30.807918 762332 task_exit.go:204] [ 874: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.816921 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.817794 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:30.837968 762332 syscalls.go:262] [ 879: 879] Allocating stack with size of 8388608 bytes D0713 00:00:30.841017 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:30.841853 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:30.843444 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:30.843758 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:30.847939 762332 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:30.848173 762332 usertrap_amd64.go:106] [ 879: 879] Map a usertrap vma at 67000 D0713 00:00:30.849275 762332 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc0020aa300 1 D0713 00:00:30.849594 762332 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:30.851867 762332 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:30.851955 762332 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc0020aa300 2 D0713 00:00:30.852100 762332 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:30.854933 762332 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:30.855014 762332 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc0020aa300 3 D0713 00:00:30.855131 762332 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:30.877520 762332 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:30.877615 762332 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc0020aa300 4 D0713 00:00:30.877829 762332 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:30.880933 762332 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:30.881048 762332 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc0020aa300 5 D0713 00:00:30.881233 762332 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:30.881600 762332 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b214:sysno 13 D0713 00:00:30.881687 762332 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc0020aa300 6 D0713 00:00:30.881830 762332 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:30.899971 762332 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:30.900063 762332 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc0020aa300 7 D0713 00:00:30.900211 762332 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:30.901921 762332 usertrap_amd64.go:212] [ 879: 880] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:30.902016 762332 usertrap_amd64.go:122] [ 879: 880] Allocate a new trap: 0xc0020aa300 8 D0713 00:00:30.902219 762332 usertrap_amd64.go:225] [ 879: 880] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:30.904723 762332 usertrap_amd64.go:212] [ 879: 880] Found the pattern at ip 46af76:sysno 35 D0713 00:00:30.904807 762332 usertrap_amd64.go:122] [ 879: 880] Allocate a new trap: 0xc0020aa300 9 D0713 00:00:30.905650 762332 usertrap_amd64.go:225] [ 879: 880] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:30.906349 762332 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:30.906457 762332 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc0020aa300 10 D0713 00:00:30.906739 762332 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:30.909879 762332 usertrap_amd64.go:212] [ 879: 880] Found the pattern at ip 46b020:sysno 39 D0713 00:00:30.909948 762332 usertrap_amd64.go:122] [ 879: 880] Allocate a new trap: 0xc0020aa300 11 D0713 00:00:30.910145 762332 usertrap_amd64.go:225] [ 879: 880] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:30.910514 762332 usertrap_amd64.go:212] [ 879: 880] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:30.910561 762332 usertrap_amd64.go:122] [ 879: 880] Allocate a new trap: 0xc0020aa300 12 D0713 00:00:30.910832 762332 usertrap_amd64.go:225] [ 879: 880] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:30.911900 762332 task_signals.go:470] [ 879: 879] Notified of signal 23 D0713 00:00:30.912197 762332 task_signals.go:220] [ 879: 879] Signal 23: delivering to handler D0713 00:00:30.923850 762332 task_signals.go:470] [ 879: 879] Notified of signal 23 D0713 00:00:30.924168 762332 task_signals.go:220] [ 879: 879] Signal 23: delivering to handler D0713 00:00:30.925794 762332 task_signals.go:470] [ 879: 879] Notified of signal 23 D0713 00:00:30.926086 762332 task_signals.go:220] [ 879: 879] Signal 23: delivering to handler D0713 00:00:30.940917 762332 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46af29:sysno 293 D0713 00:00:30.941101 762332 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc0020aa300 13 D0713 00:00:30.941186 762332 task_signals.go:470] [ 879: 879] Notified of signal 23 D0713 00:00:30.941271 762332 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:30.941709 762332 task_signals.go:220] [ 879: 879] Signal 23: delivering to handler D0713 00:00:30.943365 762332 task_signals.go:470] [ 879: 879] Notified of signal 23 D0713 00:00:30.943630 762332 task_signals.go:220] [ 879: 879] Signal 23: delivering to handler D0713 00:00:30.959503 762332 task_signals.go:470] [ 879: 879] Notified of signal 23 D0713 00:00:30.959918 762332 task_signals.go:220] [ 879: 879] Signal 23: delivering to handler I0713 00:00:30.969658 762332 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0713 00:00:30.969964 762332 usertrap_amd64.go:212] [ 879: 879] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:30.970077 762332 usertrap_amd64.go:122] [ 879: 879] Allocate a new trap: 0xc0020aa300 14 D0713 00:00:30.970201 762332 usertrap_amd64.go:225] [ 879: 879] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:30.970744 762332 task_exit.go:204] [ 879: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.971422 762332 task_signals.go:204] [ 879: 882] Signal 879, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.971647 762332 task_signals.go:204] [ 879: 883] Signal 879, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.971837 762332 task_exit.go:204] [ 879: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.971862 762332 task_signals.go:204] [ 879: 880] Signal 879, PID: 880, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.972019 762332 task_signals.go:204] [ 879: 881] Signal 879, PID: 881, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:30.972157 762332 task_exit.go:204] [ 879: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.972616 762332 task_exit.go:204] [ 879: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.972698 762332 task_exit.go:204] [ 879: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.973012 762332 task_exit.go:204] [ 879: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.973481 762332 task_exit.go:204] [ 879: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.973552 762332 task_exit.go:204] [ 879: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:30.973846 762332 task_exit.go:204] [ 879: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.974083 762332 task_exit.go:204] [ 879: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:30.974603 762332 task_exit.go:204] [ 879: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:30.974682 762332 task_exit.go:204] [ 879: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.000266 762332 task_exit.go:204] [ 879: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.000417 762332 task_exit.go:204] [ 879: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.000762 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:31.001474 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:31.001659 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:31.002225 762332 task_exit.go:204] [ 879: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.010107 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.011848 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:31.030928 762332 syscalls.go:262] [ 884: 884] Allocating stack with size of 8388608 bytes D0713 00:00:31.033959 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.034821 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:31.039272 762332 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:31.039435 762332 usertrap_amd64.go:106] [ 884: 884] Map a usertrap vma at 60000 D0713 00:00:31.040302 762332 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc000f2e930 1 D0713 00:00:31.040584 762332 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:31.042475 762332 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:31.042544 762332 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc000f2e930 2 D0713 00:00:31.042715 762332 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:31.045416 762332 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:31.045493 762332 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc000f2e930 3 D0713 00:00:31.045626 762332 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:31.073515 762332 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:31.073653 762332 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc000f2e930 4 D0713 00:00:31.073816 762332 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:31.077860 762332 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:31.077955 762332 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc000f2e930 5 D0713 00:00:31.078114 762332 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:31.078672 762332 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b214:sysno 13 D0713 00:00:31.078736 762332 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc000f2e930 6 D0713 00:00:31.078854 762332 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:31.099825 762332 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:31.099919 762332 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc000f2e930 7 D0713 00:00:31.100057 762332 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:31.102021 762332 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:31.102126 762332 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc000f2e930 8 D0713 00:00:31.102420 762332 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:31.105448 762332 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:31.105544 762332 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc000f2e930 9 D0713 00:00:31.106685 762332 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:31.107557 762332 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46af76:sysno 35 D0713 00:00:31.107626 762332 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc000f2e930 10 D0713 00:00:31.107870 762332 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:31.119440 762332 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46b020:sysno 39 D0713 00:00:31.119554 762332 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc000f2e930 11 D0713 00:00:31.119789 762332 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:31.120360 762332 usertrap_amd64.go:212] [ 884: 885] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:31.120445 762332 usertrap_amd64.go:122] [ 884: 885] Allocate a new trap: 0xc000f2e930 12 D0713 00:00:31.120769 762332 usertrap_amd64.go:225] [ 884: 885] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:31.122037 762332 task_signals.go:470] [ 884: 884] Notified of signal 23 D0713 00:00:31.122252 762332 task_signals.go:220] [ 884: 884] Signal 23: delivering to handler D0713 00:00:31.132736 762332 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46af29:sysno 293 D0713 00:00:31.132855 762332 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc000f2e930 13 D0713 00:00:31.133158 762332 task_signals.go:470] [ 884: 884] Notified of signal 23 D0713 00:00:31.133136 762332 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:31.133649 762332 task_signals.go:220] [ 884: 884] Signal 23: delivering to handler D0713 00:00:31.154219 762332 task_signals.go:470] [ 884: 884] Notified of signal 23 D0713 00:00:31.154459 762332 task_signals.go:220] [ 884: 884] Signal 23: delivering to handler D0713 00:00:31.163521 762332 usertrap_amd64.go:212] [ 884: 884] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:31.163601 762332 usertrap_amd64.go:122] [ 884: 884] Allocate a new trap: 0xc000f2e930 14 D0713 00:00:31.163795 762332 usertrap_amd64.go:225] [ 884: 884] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:31.164305 762332 task_exit.go:204] [ 884: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.164902 762332 task_exit.go:204] [ 884: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.165121 762332 task_signals.go:204] [ 884: 887] Signal 884, PID: 887, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.165363 762332 task_signals.go:204] [ 884: 886] Signal 884, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.165444 762332 task_signals.go:204] [ 884: 885] Signal 884, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.165409 762332 task_signals.go:204] [ 884: 888] Signal 884, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.165667 762332 task_exit.go:204] [ 884: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.166126 762332 task_exit.go:204] [ 884: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.166339 762332 task_exit.go:204] [ 884: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.166637 762332 task_exit.go:204] [ 884: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.167218 762332 task_exit.go:204] [ 884: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.167355 762332 task_exit.go:204] [ 884: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.168091 762332 task_exit.go:204] [ 884: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.168160 762332 task_exit.go:204] [ 884: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.168383 762332 task_exit.go:204] [ 884: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.168469 762332 task_exit.go:204] [ 884: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.192668 762332 task_exit.go:204] [ 884: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.192760 762332 task_exit.go:204] [ 884: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.193037 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:31.193530 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:31.193614 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:31.193802 762332 task_exit.go:204] [ 884: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.201617 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.203796 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:31.222967 762332 syscalls.go:262] [ 889: 889] Allocating stack with size of 8388608 bytes D0713 00:00:31.225896 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.226504 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:31.229760 762332 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:31.229975 762332 usertrap_amd64.go:106] [ 889: 889] Map a usertrap vma at 69000 D0713 00:00:31.231112 762332 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00101a3c0 1 D0713 00:00:31.231540 762332 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:31.234089 762332 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:31.234161 762332 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00101a3c0 2 D0713 00:00:31.234349 762332 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:31.237521 762332 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:31.237604 762332 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00101a3c0 3 D0713 00:00:31.237806 762332 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:31.259151 762332 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:31.259261 762332 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00101a3c0 4 D0713 00:00:31.259430 762332 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:31.262786 762332 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:31.262873 762332 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00101a3c0 5 D0713 00:00:31.263062 762332 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:31.263564 762332 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46b214:sysno 13 D0713 00:00:31.263649 762332 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00101a3c0 6 D0713 00:00:31.263830 762332 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:31.283771 762332 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:31.283830 762332 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00101a3c0 7 D0713 00:00:31.283959 762332 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:31.285579 762332 usertrap_amd64.go:212] [ 889: 890] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:31.285683 762332 usertrap_amd64.go:122] [ 889: 890] Allocate a new trap: 0xc00101a3c0 8 D0713 00:00:31.285875 762332 usertrap_amd64.go:225] [ 889: 890] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:31.287107 762332 usertrap_amd64.go:212] [ 889: 890] Found the pattern at ip 46af76:sysno 35 D0713 00:00:31.287184 762332 usertrap_amd64.go:122] [ 889: 890] Allocate a new trap: 0xc00101a3c0 9 D0713 00:00:31.287397 762332 usertrap_amd64.go:225] [ 889: 890] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:31.289247 762332 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:31.289333 762332 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00101a3c0 10 D0713 00:00:31.289510 762332 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:31.301383 762332 usertrap_amd64.go:212] [ 889: 890] Found the pattern at ip 46b020:sysno 39 D0713 00:00:31.301487 762332 usertrap_amd64.go:122] [ 889: 890] Allocate a new trap: 0xc00101a3c0 11 D0713 00:00:31.301680 762332 usertrap_amd64.go:225] [ 889: 890] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:31.302092 762332 usertrap_amd64.go:212] [ 889: 890] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:31.302170 762332 usertrap_amd64.go:122] [ 889: 890] Allocate a new trap: 0xc00101a3c0 12 D0713 00:00:31.302344 762332 usertrap_amd64.go:225] [ 889: 890] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:31.302708 762332 task_signals.go:470] [ 889: 889] Notified of signal 23 D0713 00:00:31.302931 762332 task_signals.go:220] [ 889: 889] Signal 23: delivering to handler D0713 00:00:31.308744 762332 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46af29:sysno 293 D0713 00:00:31.308833 762332 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00101a3c0 13 D0713 00:00:31.309029 762332 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:31.314155 762332 task_signals.go:470] [ 889: 889] Notified of signal 23 D0713 00:00:31.317348 762332 task_signals.go:220] [ 889: 889] Signal 23: delivering to handler D0713 00:00:31.332266 762332 usertrap_amd64.go:212] [ 889: 889] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:31.332362 762332 usertrap_amd64.go:122] [ 889: 889] Allocate a new trap: 0xc00101a3c0 14 D0713 00:00:31.332561 762332 usertrap_amd64.go:225] [ 889: 889] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:31.332674 762332 task_signals.go:470] [ 889: 889] Notified of signal 23 D0713 00:00:31.332876 762332 task_signals.go:220] [ 889: 889] Signal 23: delivering to handler D0713 00:00:31.334098 762332 task_exit.go:204] [ 889: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.334627 762332 task_signals.go:204] [ 889: 891] Signal 889, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.334684 762332 task_signals.go:204] [ 889: 892] Signal 889, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.335051 762332 task_signals.go:204] [ 889: 890] Signal 889, PID: 890, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.335087 762332 task_signals.go:204] [ 889: 893] Signal 889, PID: 893, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.335289 762332 task_exit.go:204] [ 889: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.335757 762332 task_exit.go:204] [ 889: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.335849 762332 task_exit.go:204] [ 889: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.336136 762332 task_exit.go:204] [ 889: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.336606 762332 task_exit.go:204] [ 889: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.336753 762332 task_exit.go:204] [ 889: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.336912 762332 task_exit.go:204] [ 889: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.337635 762332 task_exit.go:204] [ 889: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.337715 762332 task_exit.go:204] [ 889: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.337950 762332 task_exit.go:204] [ 889: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.338042 762332 task_exit.go:204] [ 889: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.364150 762332 task_exit.go:204] [ 889: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.364238 762332 task_exit.go:204] [ 889: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.364459 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:31.364778 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:31.364851 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:31.365962 762332 task_exit.go:204] [ 889: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.374565 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.376702 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:31.396465 762332 syscalls.go:262] [ 894: 894] Allocating stack with size of 8388608 bytes D0713 00:00:31.399458 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.400630 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:31.402372 762332 task_signals.go:470] [ 6: 12] Notified of signal 23 D0713 00:00:31.402716 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:31.403962 762332 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:31.404167 762332 usertrap_amd64.go:106] [ 894: 894] Map a usertrap vma at 64000 D0713 00:00:31.405315 762332 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc000f2f0e0 1 D0713 00:00:31.405698 762332 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:31.408667 762332 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:31.408769 762332 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc000f2f0e0 2 D0713 00:00:31.408933 762332 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:31.412376 762332 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:31.412442 762332 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc000f2f0e0 3 D0713 00:00:31.412584 762332 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:31.436261 762332 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:31.436357 762332 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc000f2f0e0 4 D0713 00:00:31.436498 762332 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:31.439365 762332 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:31.439424 762332 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc000f2f0e0 5 D0713 00:00:31.439558 762332 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:31.439952 762332 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46b214:sysno 13 D0713 00:00:31.440019 762332 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc000f2f0e0 6 D0713 00:00:31.440161 762332 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:31.460765 762332 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:31.460854 762332 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc000f2f0e0 7 D0713 00:00:31.461049 762332 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:31.462860 762332 usertrap_amd64.go:212] [ 894: 895] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:31.462950 762332 usertrap_amd64.go:122] [ 894: 895] Allocate a new trap: 0xc000f2f0e0 8 D0713 00:00:31.463209 762332 usertrap_amd64.go:225] [ 894: 895] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:31.466399 762332 usertrap_amd64.go:212] [ 894: 895] Found the pattern at ip 46af76:sysno 35 D0713 00:00:31.466494 762332 usertrap_amd64.go:122] [ 894: 895] Allocate a new trap: 0xc000f2f0e0 9 D0713 00:00:31.467433 762332 usertrap_amd64.go:225] [ 894: 895] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:31.467907 762332 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:31.467989 762332 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc000f2f0e0 10 D0713 00:00:31.468163 762332 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:31.482828 762332 usertrap_amd64.go:212] [ 894: 895] Found the pattern at ip 46b020:sysno 39 D0713 00:00:31.482949 762332 usertrap_amd64.go:122] [ 894: 895] Allocate a new trap: 0xc000f2f0e0 11 D0713 00:00:31.484032 762332 usertrap_amd64.go:225] [ 894: 895] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:31.484494 762332 usertrap_amd64.go:212] [ 894: 895] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:31.484575 762332 usertrap_amd64.go:122] [ 894: 895] Allocate a new trap: 0xc000f2f0e0 12 D0713 00:00:31.484781 762332 usertrap_amd64.go:225] [ 894: 895] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:31.485337 762332 task_signals.go:470] [ 894: 894] Notified of signal 23 D0713 00:00:31.485617 762332 task_signals.go:220] [ 894: 894] Signal 23: delivering to handler D0713 00:00:31.492421 762332 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46af29:sysno 293 D0713 00:00:31.492496 762332 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc000f2f0e0 13 D0713 00:00:31.492639 762332 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:31.498098 762332 task_signals.go:470] [ 894: 894] Notified of signal 23 D0713 00:00:31.499715 762332 task_signals.go:220] [ 894: 894] Signal 23: delivering to handler D0713 00:00:31.514329 762332 task_signals.go:470] [ 894: 894] Notified of signal 23 D0713 00:00:31.515785 762332 task_signals.go:220] [ 894: 894] Signal 23: delivering to handler D0713 00:00:31.517707 762332 usertrap_amd64.go:212] [ 894: 894] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:31.517790 762332 usertrap_amd64.go:122] [ 894: 894] Allocate a new trap: 0xc000f2f0e0 14 D0713 00:00:31.517959 762332 usertrap_amd64.go:225] [ 894: 894] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:31.518426 762332 task_exit.go:204] [ 894: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.518795 762332 task_signals.go:204] [ 894: 897] Signal 894, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.518980 762332 task_signals.go:204] [ 894: 895] Signal 894, PID: 895, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.519005 762332 task_signals.go:204] [ 894: 896] Signal 894, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.519109 762332 task_exit.go:204] [ 894: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.519318 762332 task_signals.go:204] [ 894: 899] Signal 894, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.519666 762332 task_exit.go:204] [ 894: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.519842 762332 task_signals.go:204] [ 894: 898] Signal 894, PID: 898, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.520105 762332 task_exit.go:204] [ 894: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.520463 762332 task_exit.go:204] [ 894: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.520901 762332 task_exit.go:204] [ 894: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.521255 762332 task_exit.go:204] [ 894: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.521676 762332 task_exit.go:204] [ 894: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.521764 762332 task_exit.go:204] [ 894: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.522067 762332 task_exit.go:204] [ 894: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.522234 762332 task_exit.go:204] [ 894: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.522687 762332 task_exit.go:204] [ 894: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.522757 762332 task_exit.go:204] [ 894: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.523016 762332 task_exit.go:204] [ 894: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.523138 762332 task_exit.go:204] [ 894: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.545342 762332 task_exit.go:204] [ 894: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.545480 762332 task_exit.go:204] [ 894: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.545704 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:31.546207 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:31.546281 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:31.546474 762332 task_exit.go:204] [ 894: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.554036 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.557526 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:31.579412 762332 syscalls.go:262] [ 900: 900] Allocating stack with size of 8388608 bytes D0713 00:00:31.582757 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.583764 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:31.587470 762332 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:31.587693 762332 usertrap_amd64.go:106] [ 900: 900] Map a usertrap vma at 60000 D0713 00:00:31.588801 762332 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0020aaf00 1 D0713 00:00:31.589286 762332 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:31.591692 762332 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:31.591748 762332 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0020aaf00 2 D0713 00:00:31.591877 762332 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:31.594281 762332 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:31.594351 762332 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0020aaf00 3 D0713 00:00:31.594579 762332 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:31.616025 762332 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:31.616096 762332 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0020aaf00 4 D0713 00:00:31.616269 762332 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:31.619590 762332 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:31.619696 762332 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0020aaf00 5 D0713 00:00:31.619846 762332 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:31.620328 762332 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b214:sysno 13 D0713 00:00:31.620415 762332 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0020aaf00 6 D0713 00:00:31.620594 762332 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:31.644500 762332 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:31.644615 762332 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0020aaf00 7 D0713 00:00:31.644823 762332 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:31.646912 762332 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:31.646994 762332 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc0020aaf00 8 D0713 00:00:31.647187 762332 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:31.648786 762332 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46af76:sysno 35 D0713 00:00:31.648893 762332 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc0020aaf00 9 D0713 00:00:31.649133 762332 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:31.650929 762332 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:31.650986 762332 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0020aaf00 10 D0713 00:00:31.651881 762332 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:31.664585 762332 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b020:sysno 39 D0713 00:00:31.664655 762332 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc0020aaf00 11 D0713 00:00:31.664878 762332 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:31.665504 762332 usertrap_amd64.go:212] [ 900: 901] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:31.665572 762332 usertrap_amd64.go:122] [ 900: 901] Allocate a new trap: 0xc0020aaf00 12 D0713 00:00:31.665756 762332 usertrap_amd64.go:225] [ 900: 901] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:31.667521 762332 task_signals.go:470] [ 900: 900] Notified of signal 23 D0713 00:00:31.667942 762332 task_signals.go:220] [ 900: 900] Signal 23: delivering to handler D0713 00:00:31.677490 762332 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46af29:sysno 293 D0713 00:00:31.677576 762332 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0020aaf00 13 D0713 00:00:31.677748 762332 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:31.678965 762332 task_signals.go:470] [ 900: 900] Notified of signal 23 D0713 00:00:31.679233 762332 task_signals.go:220] [ 900: 900] Signal 23: delivering to handler D0713 00:00:31.695189 762332 task_signals.go:470] [ 900: 900] Notified of signal 23 D0713 00:00:31.695512 762332 task_signals.go:220] [ 900: 900] Signal 23: delivering to handler D0713 00:00:31.701243 762332 usertrap_amd64.go:212] [ 900: 900] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:31.701316 762332 usertrap_amd64.go:122] [ 900: 900] Allocate a new trap: 0xc0020aaf00 14 D0713 00:00:31.701488 762332 usertrap_amd64.go:225] [ 900: 900] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:31.701974 762332 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.702408 762332 task_signals.go:204] [ 900: 904] Signal 900, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.702396 762332 task_signals.go:204] [ 900: 902] Signal 900, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.702386 762332 task_signals.go:204] [ 900: 901] Signal 900, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.702451 762332 task_signals.go:204] [ 900: 903] Signal 900, PID: 903, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.702613 762332 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.702794 762332 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.703326 762332 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.703481 762332 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.703799 762332 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.703998 762332 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.704069 762332 task_exit.go:204] [ 900: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.705208 762332 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.705285 762332 task_exit.go:204] [ 900: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.705637 762332 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.705703 762332 task_exit.go:204] [ 900: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.726532 762332 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.726736 762332 task_exit.go:204] [ 900: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.727000 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:31.727348 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:31.727501 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:31.727606 762332 task_exit.go:204] [ 900: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.734377 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.737391 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:31.753570 762332 syscalls.go:262] [ 905: 905] Allocating stack with size of 8388608 bytes D0713 00:00:31.756591 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.757197 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:31.760009 762332 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:31.760185 762332 usertrap_amd64.go:106] [ 905: 905] Map a usertrap vma at 62000 D0713 00:00:31.761071 762332 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d58840 1 D0713 00:00:31.761325 762332 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:31.763054 762332 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:31.763109 762332 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d58840 2 D0713 00:00:31.763217 762332 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:31.765675 762332 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:31.765748 762332 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d58840 3 D0713 00:00:31.765856 762332 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:31.788074 762332 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:31.788185 762332 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d58840 4 D0713 00:00:31.788357 762332 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:31.791553 762332 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:31.791625 762332 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d58840 5 D0713 00:00:31.791787 762332 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:31.792277 762332 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b214:sysno 13 D0713 00:00:31.792340 762332 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d58840 6 D0713 00:00:31.792509 762332 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:31.814535 762332 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:31.814598 762332 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d58840 7 D0713 00:00:31.814745 762332 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:31.816537 762332 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:31.816662 762332 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc000d58840 8 D0713 00:00:31.816856 762332 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:31.818199 762332 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46af76:sysno 35 D0713 00:00:31.818316 762332 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc000d58840 9 D0713 00:00:31.818593 762332 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:31.820035 762332 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:31.820098 762332 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d58840 10 D0713 00:00:31.820270 762332 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:31.835043 762332 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b020:sysno 39 D0713 00:00:31.835185 762332 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc000d58840 11 D0713 00:00:31.835868 762332 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:31.836809 762332 usertrap_amd64.go:212] [ 905: 906] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:31.836909 762332 usertrap_amd64.go:122] [ 905: 906] Allocate a new trap: 0xc000d58840 12 D0713 00:00:31.837175 762332 usertrap_amd64.go:225] [ 905: 906] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:31.837924 762332 task_signals.go:470] [ 905: 905] Notified of signal 23 D0713 00:00:31.838436 762332 task_signals.go:220] [ 905: 905] Signal 23: delivering to handler D0713 00:00:31.843632 762332 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46af29:sysno 293 D0713 00:00:31.843745 762332 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d58840 13 D0713 00:00:31.843927 762332 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:31.850081 762332 task_signals.go:470] [ 905: 905] Notified of signal 23 D0713 00:00:31.852516 762332 task_signals.go:220] [ 905: 905] Signal 23: delivering to handler D0713 00:00:31.869373 762332 usertrap_amd64.go:212] [ 905: 905] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:31.869482 762332 usertrap_amd64.go:122] [ 905: 905] Allocate a new trap: 0xc000d58840 14 D0713 00:00:31.869685 762332 usertrap_amd64.go:225] [ 905: 905] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:31.870225 762332 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.870836 762332 task_signals.go:204] [ 905: 907] Signal 905, PID: 907, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.870826 762332 task_signals.go:204] [ 905: 906] Signal 905, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.870830 762332 task_signals.go:204] [ 905: 909] Signal 905, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.871035 762332 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.871077 762332 task_signals.go:204] [ 905: 908] Signal 905, PID: 908, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:31.871293 762332 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.871452 762332 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.871670 762332 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.871917 762332 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:31.872662 762332 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.872735 762332 task_exit.go:204] [ 905: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.873040 762332 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.873103 762332 task_exit.go:204] [ 905: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.873358 762332 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.873417 762332 task_exit.go:204] [ 905: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.901572 762332 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:31.901760 762332 task_exit.go:204] [ 905: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.902266 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:31.902999 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:31.903238 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:31.903785 762332 task_exit.go:204] [ 905: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:31.912826 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.913285 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:31.933679 762332 syscalls.go:262] [ 910: 910] Allocating stack with size of 8388608 bytes D0713 00:00:31.937319 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:31.938104 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:31.945425 762332 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:31.945593 762332 usertrap_amd64.go:106] [ 910: 910] Map a usertrap vma at 64000 D0713 00:00:31.946480 762332 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000f2f860 1 D0713 00:00:31.946815 762332 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:31.949246 762332 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:31.949315 762332 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000f2f860 2 D0713 00:00:31.949472 762332 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:31.952541 762332 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:31.952605 762332 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000f2f860 3 D0713 00:00:31.952763 762332 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:31.974908 762332 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:31.975000 762332 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000f2f860 4 D0713 00:00:31.975115 762332 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:31.978043 762332 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:31.978113 762332 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000f2f860 5 D0713 00:00:31.978306 762332 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:31.978843 762332 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b214:sysno 13 D0713 00:00:31.978899 762332 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000f2f860 6 D0713 00:00:31.979047 762332 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:32.000551 762332 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:32.000632 762332 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000f2f860 7 D0713 00:00:32.000751 762332 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:32.002530 762332 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:32.002607 762332 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc000f2f860 8 D0713 00:00:32.002862 762332 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:32.005635 762332 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46af76:sysno 35 D0713 00:00:32.005757 762332 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc000f2f860 9 D0713 00:00:32.006676 762332 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:32.007353 762332 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:32.007454 762332 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000f2f860 10 D0713 00:00:32.007727 762332 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:32.010003 762332 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46b020:sysno 39 D0713 00:00:32.010104 762332 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc000f2f860 11 D0713 00:00:32.011008 762332 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:32.011715 762332 usertrap_amd64.go:212] [ 910: 911] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:32.011778 762332 usertrap_amd64.go:122] [ 910: 911] Allocate a new trap: 0xc000f2f860 12 D0713 00:00:32.011926 762332 usertrap_amd64.go:225] [ 910: 911] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:32.012329 762332 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 00:00:32.013040 762332 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 00:00:32.025716 762332 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 00:00:32.026375 762332 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 00:00:32.027850 762332 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 00:00:32.028562 762332 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 00:00:32.030121 762332 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 00:00:32.030354 762332 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 00:00:32.037379 762332 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46af29:sysno 293 D0713 00:00:32.037473 762332 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000f2f860 13 D0713 00:00:32.037651 762332 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:32.042314 762332 task_signals.go:470] [ 910: 910] Notified of signal 23 D0713 00:00:32.045157 762332 task_signals.go:220] [ 910: 910] Signal 23: delivering to handler D0713 00:00:32.059420 762332 usertrap_amd64.go:212] [ 910: 910] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:32.059536 762332 usertrap_amd64.go:122] [ 910: 910] Allocate a new trap: 0xc000f2f860 14 D0713 00:00:32.059714 762332 usertrap_amd64.go:225] [ 910: 910] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:32.060222 762332 task_exit.go:204] [ 910: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.060742 762332 task_signals.go:204] [ 910: 913] Signal 910, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.060865 762332 task_signals.go:204] [ 910: 914] Signal 910, PID: 914, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.060861 762332 task_signals.go:204] [ 910: 912] Signal 910, PID: 912, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.061304 762332 task_exit.go:204] [ 910: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.061512 762332 task_signals.go:204] [ 910: 911] Signal 910, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.061844 762332 task_exit.go:204] [ 910: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.062484 762332 task_exit.go:204] [ 910: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.062566 762332 task_exit.go:204] [ 910: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.062852 762332 task_exit.go:204] [ 910: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.063015 762332 task_exit.go:204] [ 910: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.063093 762332 task_exit.go:204] [ 910: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.063346 762332 task_exit.go:204] [ 910: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.063726 762332 task_exit.go:204] [ 910: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.063798 762332 task_exit.go:204] [ 910: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.063986 762332 task_exit.go:204] [ 910: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.090190 762332 task_exit.go:204] [ 910: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.090301 762332 task_exit.go:204] [ 910: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.090562 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:32.090938 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:32.091014 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:32.091306 762332 task_exit.go:204] [ 910: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.099638 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.101749 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:32.123036 762332 syscalls.go:262] [ 915: 915] Allocating stack with size of 8388608 bytes D0713 00:00:32.126195 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.127067 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:32.130017 762332 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:32.130213 762332 usertrap_amd64.go:106] [ 915: 915] Map a usertrap vma at 67000 executing program D0713 00:00:32.131376 762332 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc001de2240 1 D0713 00:00:32.131818 762332 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:32.134020 762332 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:32.134073 762332 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc001de2240 2 D0713 00:00:32.134199 762332 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:32.137452 762332 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:32.137558 762332 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc001de2240 3 D0713 00:00:32.137761 762332 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:32.160585 762332 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:32.160670 762332 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc001de2240 4 D0713 00:00:32.160860 762332 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:32.164128 762332 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:32.164223 762332 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc001de2240 5 D0713 00:00:32.164456 762332 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:32.164996 762332 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b214:sysno 13 D0713 00:00:32.165056 762332 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc001de2240 6 D0713 00:00:32.165192 762332 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:32.186825 762332 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:32.186922 762332 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc001de2240 7 D0713 00:00:32.187089 762332 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:32.188886 762332 usertrap_amd64.go:212] [ 915: 916] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:32.189024 762332 usertrap_amd64.go:122] [ 915: 916] Allocate a new trap: 0xc001de2240 8 D0713 00:00:32.189282 762332 usertrap_amd64.go:225] [ 915: 916] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:32.192220 762332 usertrap_amd64.go:212] [ 915: 916] Found the pattern at ip 46af76:sysno 35 D0713 00:00:32.192342 762332 usertrap_amd64.go:122] [ 915: 916] Allocate a new trap: 0xc001de2240 9 D0713 00:00:32.193506 762332 usertrap_amd64.go:225] [ 915: 916] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:32.194098 762332 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:32.194177 762332 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc001de2240 10 D0713 00:00:32.194434 762332 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:32.209204 762332 usertrap_amd64.go:212] [ 915: 916] Found the pattern at ip 46b020:sysno 39 D0713 00:00:32.209306 762332 usertrap_amd64.go:122] [ 915: 916] Allocate a new trap: 0xc001de2240 11 D0713 00:00:32.209475 762332 usertrap_amd64.go:225] [ 915: 916] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:32.209957 762332 usertrap_amd64.go:212] [ 915: 916] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:32.210021 762332 usertrap_amd64.go:122] [ 915: 916] Allocate a new trap: 0xc001de2240 12 D0713 00:00:32.210162 762332 usertrap_amd64.go:225] [ 915: 916] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:32.210781 762332 task_signals.go:470] [ 915: 915] Notified of signal 23 D0713 00:00:32.211264 762332 task_signals.go:220] [ 915: 915] Signal 23: delivering to handler D0713 00:00:32.221552 762332 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46af29:sysno 293 D0713 00:00:32.221615 762332 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc001de2240 13 D0713 00:00:32.221738 762332 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:32.227386 762332 task_signals.go:470] [ 915: 915] Notified of signal 23 D0713 00:00:32.230466 762332 task_signals.go:220] [ 915: 915] Signal 23: delivering to handler D0713 00:00:32.245732 762332 usertrap_amd64.go:212] [ 915: 915] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:32.245822 762332 usertrap_amd64.go:122] [ 915: 915] Allocate a new trap: 0xc001de2240 14 D0713 00:00:32.245958 762332 usertrap_amd64.go:225] [ 915: 915] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:32.246370 762332 task_exit.go:204] [ 915: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.246770 762332 task_signals.go:204] [ 915: 918] Signal 915, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.247001 762332 task_signals.go:204] [ 915: 916] Signal 915, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.247056 762332 task_signals.go:204] [ 915: 919] Signal 915, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.247127 762332 task_signals.go:204] [ 915: 917] Signal 915, PID: 917, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.247268 762332 task_signals.go:204] [ 915: 920] Signal 915, PID: 920, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.247336 762332 task_exit.go:204] [ 915: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.247673 762332 task_exit.go:204] [ 915: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.248105 762332 task_exit.go:204] [ 915: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.248290 762332 task_exit.go:204] [ 915: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.248605 762332 task_exit.go:204] [ 915: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.249199 762332 task_exit.go:204] [ 915: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.249838 762332 task_exit.go:204] [ 915: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.249906 762332 task_exit.go:204] [ 915: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.250216 762332 task_exit.go:204] [ 915: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.250307 762332 task_exit.go:204] [ 915: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.250468 762332 task_exit.go:204] [ 915: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.250551 762332 task_exit.go:204] [ 915: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.250820 762332 task_exit.go:204] [ 915: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.250888 762332 task_exit.go:204] [ 915: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.272093 762332 task_exit.go:204] [ 915: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.272197 762332 task_exit.go:204] [ 915: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.272420 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:32.272737 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:32.272793 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:32.273170 762332 task_exit.go:204] [ 915: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.280137 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.283175 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:32.302938 762332 syscalls.go:262] [ 921: 921] Allocating stack with size of 8388608 bytes D0713 00:00:32.305990 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.306511 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:32.310384 762332 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:32.310710 762332 usertrap_amd64.go:106] [ 921: 921] Map a usertrap vma at 67000 D0713 00:00:32.312197 762332 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc001de2930 1 D0713 00:00:32.312649 762332 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:32.315119 762332 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:32.315190 762332 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc001de2930 2 D0713 00:00:32.315348 762332 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:32.318232 762332 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:32.318297 762332 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc001de2930 3 D0713 00:00:32.318429 762332 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:32.344264 762332 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:32.344400 762332 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc001de2930 4 D0713 00:00:32.344578 762332 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:32.347705 762332 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:32.347770 762332 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc001de2930 5 D0713 00:00:32.347889 762332 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:32.348357 762332 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b214:sysno 13 D0713 00:00:32.348436 762332 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc001de2930 6 D0713 00:00:32.348580 762332 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:32.377110 762332 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:32.377244 762332 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc001de2930 7 D0713 00:00:32.377440 762332 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:32.379549 762332 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:32.379688 762332 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc001de2930 8 D0713 00:00:32.379986 762332 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:32.382022 762332 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46af76:sysno 35 D0713 00:00:32.382126 762332 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc001de2930 9 D0713 00:00:32.382317 762332 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:32.382925 762332 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:32.382985 762332 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc001de2930 10 D0713 00:00:32.383920 762332 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:32.396524 762332 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46b020:sysno 39 D0713 00:00:32.396612 762332 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc001de2930 11 D0713 00:00:32.396764 762332 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:32.398439 762332 usertrap_amd64.go:212] [ 921: 922] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:32.398537 762332 usertrap_amd64.go:122] [ 921: 922] Allocate a new trap: 0xc001de2930 12 D0713 00:00:32.398712 762332 usertrap_amd64.go:225] [ 921: 922] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:32.399320 762332 task_signals.go:470] [ 921: 921] Notified of signal 23 D0713 00:00:32.399603 762332 task_signals.go:220] [ 921: 921] Signal 23: delivering to handler D0713 00:00:32.407631 762332 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46af29:sysno 293 D0713 00:00:32.407699 762332 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc001de2930 13 D0713 00:00:32.407859 762332 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:32.413429 762332 task_signals.go:470] [ 921: 921] Notified of signal 23 D0713 00:00:32.414261 762332 task_signals.go:220] [ 921: 921] Signal 23: delivering to handler D0713 00:00:32.430408 762332 task_signals.go:470] [ 921: 921] Notified of signal 23 D0713 00:00:32.430900 762332 task_signals.go:220] [ 921: 921] Signal 23: delivering to handler D0713 00:00:32.436145 762332 usertrap_amd64.go:212] [ 921: 921] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:32.436234 762332 usertrap_amd64.go:122] [ 921: 921] Allocate a new trap: 0xc001de2930 14 D0713 00:00:32.436349 762332 usertrap_amd64.go:225] [ 921: 921] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:32.436711 762332 task_exit.go:204] [ 921: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.437297 762332 task_signals.go:204] [ 921: 923] Signal 921, PID: 923, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.437413 762332 task_signals.go:204] [ 921: 925] Signal 921, PID: 925, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.437422 762332 task_signals.go:204] [ 921: 924] Signal 921, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.437526 762332 task_signals.go:204] [ 921: 922] Signal 921, PID: 922, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.437546 762332 task_exit.go:204] [ 921: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.437759 762332 task_exit.go:204] [ 921: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.438167 762332 task_exit.go:204] [ 921: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.438452 762332 task_exit.go:204] [ 921: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.438599 762332 task_exit.go:204] [ 921: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.439826 762332 task_exit.go:204] [ 921: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.439927 762332 task_exit.go:204] [ 921: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.440229 762332 task_exit.go:204] [ 921: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.440295 762332 task_exit.go:204] [ 921: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.440494 762332 task_exit.go:204] [ 921: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.440564 762332 task_exit.go:204] [ 921: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.467140 762332 task_exit.go:204] [ 921: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.467241 762332 task_exit.go:204] [ 921: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.467542 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:32.468282 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:32.468406 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:32.468330 762332 task_exit.go:204] [ 921: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.476496 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.478671 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:32.497043 762332 syscalls.go:262] [ 926: 926] Allocating stack with size of 8388608 bytes D0713 00:00:32.500212 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.500715 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:32.506612 762332 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:32.506848 762332 usertrap_amd64.go:106] [ 926: 926] Map a usertrap vma at 62000 D0713 00:00:32.507741 762332 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc00202cf60 1 D0713 00:00:32.508089 762332 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:32.510521 762332 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:32.510602 762332 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc00202cf60 2 D0713 00:00:32.510848 762332 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:32.514010 762332 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:32.514074 762332 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc00202cf60 3 D0713 00:00:32.514230 762332 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:32.539115 762332 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:32.539242 762332 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc00202cf60 4 D0713 00:00:32.539403 762332 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:32.546769 762332 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:32.546849 762332 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc00202cf60 5 D0713 00:00:32.547034 762332 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:32.547494 762332 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b214:sysno 13 D0713 00:00:32.547585 762332 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc00202cf60 6 D0713 00:00:32.547748 762332 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:32.573684 762332 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:32.573925 762332 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc00202cf60 7 D0713 00:00:32.574157 762332 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:32.576052 762332 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:32.576109 762332 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc00202cf60 8 D0713 00:00:32.576290 762332 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:32.578074 762332 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46af76:sysno 35 D0713 00:00:32.578168 762332 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc00202cf60 9 D0713 00:00:32.578441 762332 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:32.580207 762332 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:32.580303 762332 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc00202cf60 10 D0713 00:00:32.580494 762332 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:32.581954 762332 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b020:sysno 39 D0713 00:00:32.582061 762332 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc00202cf60 11 D0713 00:00:32.582273 762332 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:32.582955 762332 usertrap_amd64.go:212] [ 926: 927] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:32.583046 762332 usertrap_amd64.go:122] [ 926: 927] Allocate a new trap: 0xc00202cf60 12 D0713 00:00:32.583226 762332 usertrap_amd64.go:225] [ 926: 927] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:32.583766 762332 task_signals.go:470] [ 926: 929] Notified of signal 23 D0713 00:00:32.584419 762332 task_signals.go:179] [ 926: 929] Restarting syscall 202: interrupted by signal 23 D0713 00:00:32.584506 762332 task_signals.go:220] [ 926: 929] Signal 23: delivering to handler D0713 00:00:32.595644 762332 task_signals.go:470] [ 926: 926] Notified of signal 23 D0713 00:00:32.595971 762332 task_signals.go:220] [ 926: 926] Signal 23: delivering to handler D0713 00:00:32.604228 762332 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46af29:sysno 293 D0713 00:00:32.604329 762332 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc00202cf60 13 D0713 00:00:32.604524 762332 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:32.609317 762332 task_signals.go:470] [ 926: 926] Notified of signal 23 D0713 00:00:32.612351 762332 task_signals.go:220] [ 926: 926] Signal 23: delivering to handler D0713 00:00:32.627299 762332 task_signals.go:470] [ 926: 926] Notified of signal 23 D0713 00:00:32.627805 762332 task_signals.go:179] [ 926: 926] Restarting syscall 202: interrupted by signal 23 D0713 00:00:32.627937 762332 task_signals.go:220] [ 926: 926] Signal 23: delivering to handler D0713 00:00:32.630408 762332 usertrap_amd64.go:212] [ 926: 926] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:32.630507 762332 usertrap_amd64.go:122] [ 926: 926] Allocate a new trap: 0xc00202cf60 14 D0713 00:00:32.630724 762332 usertrap_amd64.go:225] [ 926: 926] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:32.631735 762332 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.632204 762332 task_signals.go:204] [ 926: 929] Signal 926, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.632255 762332 task_signals.go:204] [ 926: 927] Signal 926, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.632555 762332 task_signals.go:204] [ 926: 928] Signal 926, PID: 928, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.632693 762332 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.633109 762332 task_signals.go:204] [ 926: 930] Signal 926, PID: 930, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.633347 762332 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.633580 762332 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.634000 762332 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.634184 762332 task_exit.go:204] [ 926: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.634489 762332 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.634840 762332 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.635393 762332 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.635492 762332 task_exit.go:204] [ 926: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.635716 762332 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.635825 762332 task_exit.go:204] [ 926: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.658883 762332 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.659007 762332 task_exit.go:204] [ 926: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.659353 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:32.659808 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:32.660009 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:32.661855 762332 task_exit.go:204] [ 926: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.669618 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:32.670621 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.694893 762332 syscalls.go:262] [ 931: 931] Allocating stack with size of 8388608 bytes D0713 00:00:32.698463 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.699380 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:32.703538 762332 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:32.703856 762332 usertrap_amd64.go:106] [ 931: 931] Map a usertrap vma at 67000 D0713 00:00:32.705115 762332 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc0014ed9b0 1 D0713 00:00:32.705560 762332 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:32.709819 762332 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:32.709923 762332 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc0014ed9b0 2 D0713 00:00:32.710086 762332 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:32.714111 762332 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:32.714224 762332 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc0014ed9b0 3 D0713 00:00:32.714446 762332 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:32.739885 762332 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:32.740009 762332 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc0014ed9b0 4 D0713 00:00:32.740201 762332 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:32.743216 762332 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:32.743284 762332 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc0014ed9b0 5 D0713 00:00:32.743457 762332 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:32.743878 762332 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46b214:sysno 13 D0713 00:00:32.743934 762332 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc0014ed9b0 6 D0713 00:00:32.744043 762332 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:32.778562 762332 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:32.778676 762332 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc0014ed9b0 7 D0713 00:00:32.778977 762332 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:32.780936 762332 usertrap_amd64.go:212] [ 931: 932] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:32.781056 762332 usertrap_amd64.go:122] [ 931: 932] Allocate a new trap: 0xc0014ed9b0 8 D0713 00:00:32.781259 762332 usertrap_amd64.go:225] [ 931: 932] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:32.783725 762332 usertrap_amd64.go:212] [ 931: 932] Found the pattern at ip 46af76:sysno 35 D0713 00:00:32.783799 762332 usertrap_amd64.go:122] [ 931: 932] Allocate a new trap: 0xc0014ed9b0 9 D0713 00:00:32.784029 762332 usertrap_amd64.go:225] [ 931: 932] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:32.785618 762332 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:32.785743 762332 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc0014ed9b0 10 D0713 00:00:32.786686 762332 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:32.798626 762332 usertrap_amd64.go:212] [ 931: 932] Found the pattern at ip 46b020:sysno 39 D0713 00:00:32.798705 762332 usertrap_amd64.go:122] [ 931: 932] Allocate a new trap: 0xc0014ed9b0 11 D0713 00:00:32.798870 762332 usertrap_amd64.go:225] [ 931: 932] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:32.799395 762332 usertrap_amd64.go:212] [ 931: 932] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:32.799455 762332 usertrap_amd64.go:122] [ 931: 932] Allocate a new trap: 0xc0014ed9b0 12 D0713 00:00:32.799640 762332 usertrap_amd64.go:225] [ 931: 932] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:32.800168 762332 task_signals.go:470] [ 931: 931] Notified of signal 23 D0713 00:00:32.801325 762332 task_signals.go:220] [ 931: 931] Signal 23: delivering to handler D0713 00:00:32.813534 762332 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46af29:sysno 293 D0713 00:00:32.813654 762332 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc0014ed9b0 13 D0713 00:00:32.813806 762332 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:32.814664 762332 task_signals.go:470] [ 931: 931] Notified of signal 23 D0713 00:00:32.814925 762332 task_signals.go:220] [ 931: 931] Signal 23: delivering to handler D0713 00:00:32.827633 762332 task_signals.go:470] [ 931: 931] Notified of signal 23 D0713 00:00:32.830983 762332 task_signals.go:220] [ 931: 931] Signal 23: delivering to handler D0713 00:00:32.840442 762332 usertrap_amd64.go:212] [ 931: 931] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:32.840544 762332 usertrap_amd64.go:122] [ 931: 931] Allocate a new trap: 0xc0014ed9b0 14 D0713 00:00:32.840739 762332 usertrap_amd64.go:225] [ 931: 931] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:32.841322 762332 task_exit.go:204] [ 931: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.841851 762332 task_signals.go:204] [ 931: 935] Signal 931, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.842115 762332 task_signals.go:204] [ 931: 934] Signal 931, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.842330 762332 task_signals.go:204] [ 931: 933] Signal 931, PID: 933, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.842444 762332 task_exit.go:204] [ 931: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.842620 762332 task_exit.go:204] [ 931: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.842775 762332 task_exit.go:204] [ 931: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.843002 762332 task_exit.go:204] [ 931: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.843016 762332 task_signals.go:204] [ 931: 932] Signal 931, PID: 932, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:32.843273 762332 task_exit.go:204] [ 931: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:32.843980 762332 task_exit.go:204] [ 931: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.844077 762332 task_exit.go:204] [ 931: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.844615 762332 task_exit.go:204] [ 931: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.844694 762332 task_exit.go:204] [ 931: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.845458 762332 task_exit.go:204] [ 931: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.845547 762332 task_exit.go:204] [ 931: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.869418 762332 task_exit.go:204] [ 931: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:32.869527 762332 task_exit.go:204] [ 931: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.869805 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:32.870226 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:32.870316 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:32.870381 762332 task_exit.go:204] [ 931: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:32.878277 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.881138 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:32.906367 762332 syscalls.go:262] [ 936: 936] Allocating stack with size of 8388608 bytes D0713 00:00:32.910343 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:32.911715 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:32.917425 762332 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:32.917711 762332 usertrap_amd64.go:106] [ 936: 936] Map a usertrap vma at 65000 D0713 00:00:32.918918 762332 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc00047e0c0 1 D0713 00:00:32.919248 762332 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:32.921280 762332 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:32.921364 762332 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc00047e0c0 2 D0713 00:00:32.921513 762332 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:32.924182 762332 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:32.924258 762332 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc00047e0c0 3 D0713 00:00:32.924378 762332 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:32.946950 762332 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:32.947043 762332 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc00047e0c0 4 D0713 00:00:32.947212 762332 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:32.950290 762332 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:32.950370 762332 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc00047e0c0 5 D0713 00:00:32.950483 762332 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:32.950867 762332 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b214:sysno 13 D0713 00:00:32.950948 762332 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc00047e0c0 6 D0713 00:00:32.951092 762332 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:32.971359 762332 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:32.971465 762332 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc00047e0c0 7 D0713 00:00:32.971589 762332 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:32.973388 762332 usertrap_amd64.go:212] [ 936: 937] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:32.973551 762332 usertrap_amd64.go:122] [ 936: 937] Allocate a new trap: 0xc00047e0c0 8 D0713 00:00:32.973866 762332 usertrap_amd64.go:225] [ 936: 937] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:32.975355 762332 usertrap_amd64.go:212] [ 936: 937] Found the pattern at ip 46af76:sysno 35 D0713 00:00:32.975491 762332 usertrap_amd64.go:122] [ 936: 937] Allocate a new trap: 0xc00047e0c0 9 D0713 00:00:32.975715 762332 usertrap_amd64.go:225] [ 936: 937] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:32.977057 762332 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:32.979924 762332 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc00047e0c0 10 D0713 00:00:32.980113 762332 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:32.993082 762332 usertrap_amd64.go:212] [ 936: 937] Found the pattern at ip 46b020:sysno 39 D0713 00:00:32.993276 762332 usertrap_amd64.go:122] [ 936: 937] Allocate a new trap: 0xc00047e0c0 11 D0713 00:00:32.993490 762332 usertrap_amd64.go:225] [ 936: 937] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:32.994119 762332 usertrap_amd64.go:212] [ 936: 937] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:32.994191 762332 usertrap_amd64.go:122] [ 936: 937] Allocate a new trap: 0xc00047e0c0 12 D0713 00:00:32.994334 762332 usertrap_amd64.go:225] [ 936: 937] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:32.994863 762332 task_signals.go:470] [ 936: 936] Notified of signal 23 D0713 00:00:32.995667 762332 task_signals.go:220] [ 936: 936] Signal 23: delivering to handler D0713 00:00:33.008822 762332 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46af29:sysno 293 D0713 00:00:33.008914 762332 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc00047e0c0 13 D0713 00:00:33.009127 762332 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:33.009493 762332 task_signals.go:470] [ 936: 936] Notified of signal 23 D0713 00:00:33.010174 762332 task_signals.go:220] [ 936: 936] Signal 23: delivering to handler D0713 00:00:33.011529 762332 task_signals.go:470] [ 936: 936] Notified of signal 23 D0713 00:00:33.012097 762332 task_signals.go:179] [ 936: 936] Restarting syscall 202: interrupted by signal 23 D0713 00:00:33.012163 762332 task_signals.go:220] [ 936: 936] Signal 23: delivering to handler D0713 00:00:33.026240 762332 task_signals.go:470] [ 936: 936] Notified of signal 23 D0713 00:00:33.027807 762332 task_signals.go:220] [ 936: 936] Signal 23: delivering to handler D0713 00:00:33.035004 762332 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:33.035086 762332 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc00047e0c0 14 D0713 00:00:33.035269 762332 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:33.035722 762332 task_exit.go:204] [ 936: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.036261 762332 task_signals.go:204] [ 936: 938] Signal 936, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.036479 762332 task_signals.go:204] [ 936: 937] Signal 936, PID: 937, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.036570 762332 task_exit.go:204] [ 936: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.036565 762332 task_signals.go:204] [ 936: 940] Signal 936, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.036512 762332 task_signals.go:204] [ 936: 941] Signal 936, PID: 941, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.036803 762332 task_signals.go:204] [ 936: 939] Signal 936, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.037081 762332 task_exit.go:204] [ 936: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.037315 762332 task_exit.go:204] [ 936: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.037741 762332 task_exit.go:204] [ 936: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.038028 762332 task_exit.go:204] [ 936: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.038355 762332 task_exit.go:204] [ 936: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.038804 762332 task_exit.go:204] [ 936: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.038871 762332 task_exit.go:204] [ 936: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.039795 762332 task_exit.go:204] [ 936: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.039860 762332 task_exit.go:204] [ 936: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.040085 762332 task_exit.go:204] [ 936: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.040149 762332 task_exit.go:204] [ 936: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.040518 762332 task_exit.go:204] [ 936: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.040632 762332 task_exit.go:204] [ 936: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.062707 762332 task_exit.go:204] [ 936: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.062801 762332 task_exit.go:204] [ 936: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.063085 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:33.063514 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:33.063630 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:33.063879 762332 task_exit.go:204] [ 936: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.071058 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.075383 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:33.095860 762332 syscalls.go:262] [ 942: 942] Allocating stack with size of 8388608 bytes D0713 00:00:33.099484 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.100469 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:33.105551 762332 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:33.105779 762332 usertrap_amd64.go:106] [ 942: 942] Map a usertrap vma at 67000 D0713 00:00:33.106723 762332 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc000992270 1 D0713 00:00:33.107074 762332 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:33.109336 762332 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:33.109420 762332 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc000992270 2 D0713 00:00:33.109564 762332 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:33.112885 762332 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:33.113015 762332 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc000992270 3 D0713 00:00:33.113185 762332 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:33.136413 762332 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:33.136515 762332 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc000992270 4 D0713 00:00:33.136730 762332 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:33.139933 762332 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:33.139979 762332 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc000992270 5 D0713 00:00:33.140133 762332 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:33.140530 762332 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b214:sysno 13 D0713 00:00:33.140592 762332 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc000992270 6 D0713 00:00:33.140731 762332 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:33.147418 762332 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0713 00:00:33.164397 762332 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:33.164466 762332 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc000992270 7 D0713 00:00:33.164612 762332 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:33.166714 762332 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:33.166837 762332 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc000992270 8 D0713 00:00:33.167081 762332 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:33.169306 762332 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46af76:sysno 35 D0713 00:00:33.169411 762332 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc000992270 9 D0713 00:00:33.169678 762332 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:33.171123 762332 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:33.171227 762332 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc000992270 10 D0713 00:00:33.171562 762332 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:33.184037 762332 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46b020:sysno 39 D0713 00:00:33.184136 762332 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc000992270 11 D0713 00:00:33.184335 762332 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:33.184818 762332 usertrap_amd64.go:212] [ 942: 943] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:33.184866 762332 usertrap_amd64.go:122] [ 942: 943] Allocate a new trap: 0xc000992270 12 D0713 00:00:33.185037 762332 usertrap_amd64.go:225] [ 942: 943] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:33.185533 762332 task_signals.go:470] [ 942: 942] Notified of signal 23 D0713 00:00:33.186505 762332 task_signals.go:220] [ 942: 942] Signal 23: delivering to handler D0713 00:00:33.197787 762332 task_signals.go:470] [ 942: 942] Notified of signal 23 D0713 00:00:33.197886 762332 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46af29:sysno 293 D0713 00:00:33.197985 762332 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc000992270 13 D0713 00:00:33.198179 762332 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:33.198539 762332 task_signals.go:220] [ 942: 942] Signal 23: delivering to handler D0713 00:00:33.199662 762332 task_signals.go:481] [ 942: 942] No task notified of signal 23 D0713 00:00:33.199833 762332 task_signals.go:220] [ 942: 942] Signal 23: delivering to handler D0713 00:00:33.202143 762332 task_signals.go:470] [ 942: 942] Notified of signal 23 D0713 00:00:33.202411 762332 task_signals.go:220] [ 942: 942] Signal 23: delivering to handler D0713 00:00:33.219827 762332 task_signals.go:470] [ 942: 942] Notified of signal 23 D0713 00:00:33.222299 762332 task_signals.go:220] [ 942: 942] Signal 23: delivering to handler D0713 00:00:33.224483 762332 usertrap_amd64.go:212] [ 942: 942] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:33.224562 762332 usertrap_amd64.go:122] [ 942: 942] Allocate a new trap: 0xc000992270 14 D0713 00:00:33.224738 762332 usertrap_amd64.go:225] [ 942: 942] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:33.225248 762332 task_exit.go:204] [ 942: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.225928 762332 task_signals.go:204] [ 942: 944] Signal 942, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.226139 762332 task_signals.go:204] [ 942: 943] Signal 942, PID: 943, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.226147 762332 task_signals.go:204] [ 942: 946] Signal 942, PID: 946, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.226316 762332 task_signals.go:204] [ 942: 945] Signal 942, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.226333 762332 task_exit.go:204] [ 942: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.226756 762332 task_exit.go:204] [ 942: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.227238 762332 task_exit.go:204] [ 942: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.227299 762332 task_exit.go:204] [ 942: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.227564 762332 task_exit.go:204] [ 942: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.227882 762332 task_exit.go:204] [ 942: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.228013 762332 task_exit.go:204] [ 942: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.228726 762332 task_exit.go:204] [ 942: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.228850 762332 task_exit.go:204] [ 942: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.229310 762332 task_exit.go:204] [ 942: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.229423 762332 task_exit.go:204] [ 942: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.251656 762332 task_exit.go:204] [ 942: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.251795 762332 task_exit.go:204] [ 942: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.252094 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:33.252508 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:33.252595 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:33.252769 762332 task_exit.go:204] [ 942: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.260517 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.262545 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:33.283359 762332 syscalls.go:262] [ 947: 947] Allocating stack with size of 8388608 bytes D0713 00:00:33.287279 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.288015 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:33.292036 762332 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:33.292299 762332 usertrap_amd64.go:106] [ 947: 947] Map a usertrap vma at 68000 D0713 00:00:33.293548 762332 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00202d710 1 D0713 00:00:33.293966 762332 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:33.296432 762332 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:33.296513 762332 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00202d710 2 D0713 00:00:33.296722 762332 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:33.299882 762332 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:33.299941 762332 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00202d710 3 D0713 00:00:33.300070 762332 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:33.324349 762332 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:33.324444 762332 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00202d710 4 D0713 00:00:33.324685 762332 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:33.328075 762332 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:33.328131 762332 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00202d710 5 D0713 00:00:33.328272 762332 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:33.328695 762332 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b214:sysno 13 D0713 00:00:33.328744 762332 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00202d710 6 D0713 00:00:33.328894 762332 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:33.351105 762332 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:33.351203 762332 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00202d710 7 D0713 00:00:33.351355 762332 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:33.353360 762332 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:33.353458 762332 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc00202d710 8 D0713 00:00:33.353747 762332 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:33.355970 762332 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46af76:sysno 35 D0713 00:00:33.356052 762332 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc00202d710 9 D0713 00:00:33.356308 762332 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:33.359001 762332 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:33.359100 762332 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00202d710 10 D0713 00:00:33.359423 762332 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:33.373570 762332 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46b020:sysno 39 D0713 00:00:33.373640 762332 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc00202d710 11 D0713 00:00:33.373827 762332 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:33.374320 762332 usertrap_amd64.go:212] [ 947: 948] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:33.374390 762332 usertrap_amd64.go:122] [ 947: 948] Allocate a new trap: 0xc00202d710 12 D0713 00:00:33.374603 762332 usertrap_amd64.go:225] [ 947: 948] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:33.375201 762332 task_signals.go:470] [ 947: 947] Notified of signal 23 D0713 00:00:33.375816 762332 task_signals.go:220] [ 947: 947] Signal 23: delivering to handler D0713 00:00:33.385874 762332 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46af29:sysno 293 D0713 00:00:33.385953 762332 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00202d710 13 D0713 00:00:33.386138 762332 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:33.387462 762332 task_signals.go:470] [ 947: 947] Notified of signal 23 D0713 00:00:33.387701 762332 task_signals.go:179] [ 947: 947] Restarting syscall 202: interrupted by signal 23 D0713 00:00:33.387805 762332 task_signals.go:220] [ 947: 947] Signal 23: delivering to handler D0713 00:00:33.401258 762332 task_signals.go:470] [ 947: 947] Notified of signal 23 D0713 00:00:33.403456 762332 task_signals.go:220] [ 947: 947] Signal 23: delivering to handler D0713 00:00:33.410882 762332 usertrap_amd64.go:212] [ 947: 947] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:33.410965 762332 usertrap_amd64.go:122] [ 947: 947] Allocate a new trap: 0xc00202d710 14 D0713 00:00:33.411097 762332 usertrap_amd64.go:225] [ 947: 947] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:33.411496 762332 task_exit.go:204] [ 947: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.411947 762332 task_signals.go:204] [ 947: 950] Signal 947, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.412005 762332 task_signals.go:204] [ 947: 949] Signal 947, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.411917 762332 task_signals.go:204] [ 947: 948] Signal 947, PID: 948, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.412319 762332 task_exit.go:204] [ 947: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.412523 762332 task_signals.go:204] [ 947: 952] Signal 947, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.412553 762332 task_signals.go:204] [ 947: 951] Signal 947, PID: 951, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.412713 762332 task_exit.go:204] [ 947: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.412936 762332 task_exit.go:204] [ 947: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.413833 762332 task_exit.go:204] [ 947: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.413941 762332 task_exit.go:204] [ 947: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.414182 762332 task_exit.go:204] [ 947: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.414258 762332 task_exit.go:204] [ 947: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.414797 762332 task_exit.go:204] [ 947: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.414871 762332 task_exit.go:204] [ 947: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.415225 762332 task_exit.go:204] [ 947: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.415618 762332 task_exit.go:204] [ 947: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.415699 762332 task_exit.go:204] [ 947: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.416034 762332 task_exit.go:204] [ 947: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.416112 762332 task_exit.go:204] [ 947: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.439390 762332 task_exit.go:204] [ 947: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.439507 762332 task_exit.go:204] [ 947: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.439737 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:33.440192 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:33.440277 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:33.440438 762332 task_exit.go:204] [ 947: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.447802 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.450970 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:33.466509 762332 syscalls.go:262] [ 953: 953] Allocating stack with size of 8388608 bytes D0713 00:00:33.469888 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.470433 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:33.473320 762332 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:33.473499 762332 usertrap_amd64.go:106] [ 953: 953] Map a usertrap vma at 69000 D0713 00:00:33.474416 762332 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc00202d7d0 1 D0713 00:00:33.474711 762332 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:33.476418 762332 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:33.476469 762332 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc00202d7d0 2 D0713 00:00:33.476581 762332 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:33.478784 762332 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:33.478844 762332 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc00202d7d0 3 D0713 00:00:33.478991 762332 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:33.498547 762332 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:33.498642 762332 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc00202d7d0 4 D0713 00:00:33.498759 762332 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:33.501372 762332 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:33.501436 762332 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc00202d7d0 5 D0713 00:00:33.501605 762332 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:33.501969 762332 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b214:sysno 13 D0713 00:00:33.502057 762332 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc00202d7d0 6 D0713 00:00:33.502198 762332 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:33.521638 762332 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:33.521751 762332 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc00202d7d0 7 D0713 00:00:33.521876 762332 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:33.523339 762332 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:33.523443 762332 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc00202d7d0 8 D0713 00:00:33.523589 762332 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:33.525075 762332 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46af76:sysno 35 D0713 00:00:33.525154 762332 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc00202d7d0 9 D0713 00:00:33.525302 762332 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:33.526833 762332 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:33.526905 762332 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc00202d7d0 10 D0713 00:00:33.527076 762332 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:33.540686 762332 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b020:sysno 39 D0713 00:00:33.540784 762332 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc00202d7d0 11 D0713 00:00:33.540994 762332 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:33.541492 762332 usertrap_amd64.go:212] [ 953: 954] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:33.541570 762332 usertrap_amd64.go:122] [ 953: 954] Allocate a new trap: 0xc00202d7d0 12 D0713 00:00:33.541752 762332 usertrap_amd64.go:225] [ 953: 954] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:33.542334 762332 task_signals.go:470] [ 953: 953] Notified of signal 23 D0713 00:00:33.543307 762332 task_signals.go:220] [ 953: 953] Signal 23: delivering to handler D0713 00:00:33.549503 762332 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46af29:sysno 293 D0713 00:00:33.549586 762332 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc00202d7d0 13 D0713 00:00:33.549797 762332 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:33.554600 762332 task_signals.go:470] [ 953: 953] Notified of signal 23 D0713 00:00:33.555260 762332 task_signals.go:220] [ 953: 953] Signal 23: delivering to handler D0713 00:00:33.572033 762332 task_signals.go:470] [ 953: 953] Notified of signal 23 D0713 00:00:33.572806 762332 task_signals.go:220] [ 953: 953] Signal 23: delivering to handler D0713 00:00:33.574676 762332 usertrap_amd64.go:212] [ 953: 953] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:33.574752 762332 usertrap_amd64.go:122] [ 953: 953] Allocate a new trap: 0xc00202d7d0 14 D0713 00:00:33.574894 762332 usertrap_amd64.go:225] [ 953: 953] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:33.575309 762332 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.575850 762332 task_signals.go:204] [ 953: 957] Signal 953, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.575867 762332 task_signals.go:204] [ 953: 956] Signal 953, PID: 956, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.576019 762332 task_signals.go:204] [ 953: 954] Signal 953, PID: 954, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.576152 762332 task_signals.go:204] [ 953: 955] Signal 953, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.576215 762332 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.576866 762332 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.577116 762332 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.577550 762332 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.578055 762332 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.578327 762332 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.578402 762332 task_exit.go:204] [ 953: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.578717 762332 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.578815 762332 task_exit.go:204] [ 953: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.579386 762332 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.579454 762332 task_exit.go:204] [ 953: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.599876 762332 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.600000 762332 task_exit.go:204] [ 953: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.600200 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:33.600657 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:33.600768 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:33.600846 762332 task_exit.go:204] [ 953: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.609893 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.611515 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:33.632433 762332 syscalls.go:262] [ 958: 958] Allocating stack with size of 8388608 bytes D0713 00:00:33.636295 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.637226 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:33.641494 762332 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:33.641706 762332 usertrap_amd64.go:106] [ 958: 958] Map a usertrap vma at 66000 D0713 00:00:33.642825 762332 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00047f200 1 D0713 00:00:33.643174 762332 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:33.645553 762332 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:33.645636 762332 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00047f200 2 D0713 00:00:33.645792 762332 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:33.648864 762332 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:33.648978 762332 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00047f200 3 D0713 00:00:33.649149 762332 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:33.678009 762332 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:33.678109 762332 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00047f200 4 D0713 00:00:33.678258 762332 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:33.681171 762332 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:33.681254 762332 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00047f200 5 D0713 00:00:33.681437 762332 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:33.681914 762332 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b214:sysno 13 D0713 00:00:33.681976 762332 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00047f200 6 D0713 00:00:33.682155 762332 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:33.706233 762332 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:33.706339 762332 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00047f200 7 D0713 00:00:33.706537 762332 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:33.708391 762332 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:33.708461 762332 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc00047f200 8 D0713 00:00:33.708665 762332 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:33.710432 762332 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46af76:sysno 35 D0713 00:00:33.710502 762332 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc00047f200 9 D0713 00:00:33.710708 762332 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:33.711929 762332 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:33.711993 762332 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00047f200 10 D0713 00:00:33.712880 762332 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:33.727555 762332 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b020:sysno 39 D0713 00:00:33.727625 762332 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc00047f200 11 D0713 00:00:33.727829 762332 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:33.729007 762332 usertrap_amd64.go:212] [ 958: 959] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:33.729086 762332 usertrap_amd64.go:122] [ 958: 959] Allocate a new trap: 0xc00047f200 12 D0713 00:00:33.729259 762332 usertrap_amd64.go:225] [ 958: 959] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:33.730631 762332 task_signals.go:470] [ 958: 958] Notified of signal 23 D0713 00:00:33.730927 762332 task_signals.go:179] [ 958: 958] Restarting syscall 202: interrupted by signal 23 D0713 00:00:33.731007 762332 task_signals.go:220] [ 958: 958] Signal 23: delivering to handler D0713 00:00:33.738985 762332 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46af29:sysno 293 D0713 00:00:33.739078 762332 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00047f200 13 D0713 00:00:33.739214 762332 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:33.744154 762332 task_signals.go:470] [ 958: 958] Notified of signal 23 D0713 00:00:33.746945 762332 task_signals.go:220] [ 958: 958] Signal 23: delivering to handler D0713 00:00:33.762005 762332 usertrap_amd64.go:212] [ 958: 958] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:33.762111 762332 usertrap_amd64.go:122] [ 958: 958] Allocate a new trap: 0xc00047f200 14 D0713 00:00:33.762279 762332 usertrap_amd64.go:225] [ 958: 958] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:33.762708 762332 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.763036 762332 task_signals.go:204] [ 958: 963] Signal 958, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.763012 762332 task_signals.go:204] [ 958: 961] Signal 958, PID: 961, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.763117 762332 task_signals.go:204] [ 958: 962] Signal 958, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.763337 762332 task_exit.go:204] [ 958: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.763510 762332 task_signals.go:204] [ 958: 960] Signal 958, PID: 960, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.763624 762332 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.763637 762332 task_signals.go:204] [ 958: 959] Signal 958, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.763771 762332 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.763951 762332 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.764355 762332 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.764631 762332 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.765192 762332 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.765270 762332 task_exit.go:204] [ 958: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.765575 762332 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.765645 762332 task_exit.go:204] [ 958: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.765823 762332 task_exit.go:204] [ 958: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.765888 762332 task_exit.go:204] [ 958: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.766073 762332 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.766145 762332 task_exit.go:204] [ 958: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.786091 762332 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.786177 762332 task_exit.go:204] [ 958: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.786337 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:33.786613 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:33.786677 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:33.786843 762332 task_exit.go:204] [ 958: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.794145 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.797936 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:33.816335 762332 syscalls.go:262] [ 964: 964] Allocating stack with size of 8388608 bytes D0713 00:00:33.820012 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.820999 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:33.825535 762332 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:33.825735 762332 usertrap_amd64.go:106] [ 964: 964] Map a usertrap vma at 6a000 D0713 00:00:33.826710 762332 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc002388ed0 1 D0713 00:00:33.827069 762332 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:33.829296 762332 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:33.829379 762332 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc002388ed0 2 D0713 00:00:33.829523 762332 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:33.832403 762332 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:33.832471 762332 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc002388ed0 3 D0713 00:00:33.832598 762332 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:33.854303 762332 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:33.854399 762332 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc002388ed0 4 D0713 00:00:33.854550 762332 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:33.857421 762332 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:33.857503 762332 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc002388ed0 5 D0713 00:00:33.857661 762332 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:33.858123 762332 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b214:sysno 13 D0713 00:00:33.858181 762332 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc002388ed0 6 D0713 00:00:33.858353 762332 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:33.881040 762332 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:33.881133 762332 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc002388ed0 7 D0713 00:00:33.881311 762332 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:33.883266 762332 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:33.883405 762332 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc002388ed0 8 D0713 00:00:33.883648 762332 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:33.885632 762332 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46af76:sysno 35 D0713 00:00:33.885697 762332 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc002388ed0 9 D0713 00:00:33.885900 762332 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:33.887427 762332 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:33.887506 762332 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc002388ed0 10 D0713 00:00:33.887693 762332 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:33.899408 762332 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b020:sysno 39 D0713 00:00:33.899505 762332 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc002388ed0 11 D0713 00:00:33.900298 762332 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:33.900820 762332 usertrap_amd64.go:212] [ 964: 965] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:33.900916 762332 usertrap_amd64.go:122] [ 964: 965] Allocate a new trap: 0xc002388ed0 12 D0713 00:00:33.901101 762332 usertrap_amd64.go:225] [ 964: 965] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:33.903097 762332 task_signals.go:470] [ 964: 964] Notified of signal 23 D0713 00:00:33.903786 762332 task_signals.go:220] [ 964: 964] Signal 23: delivering to handler D0713 00:00:33.912832 762332 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46af29:sysno 293 D0713 00:00:33.912920 762332 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc002388ed0 13 D0713 00:00:33.913091 762332 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:33.914034 762332 task_signals.go:470] [ 964: 964] Notified of signal 23 D0713 00:00:33.914490 762332 task_signals.go:220] [ 964: 964] Signal 23: delivering to handler D0713 00:00:33.915888 762332 task_signals.go:470] [ 964: 964] Notified of signal 23 D0713 00:00:33.916058 762332 task_signals.go:220] [ 964: 964] Signal 23: delivering to handler D0713 00:00:33.930730 762332 task_signals.go:470] [ 964: 964] Notified of signal 23 D0713 00:00:33.931082 762332 task_signals.go:220] [ 964: 964] Signal 23: delivering to handler I0713 00:00:33.937918 762332 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0713 00:00:33.938239 762332 usertrap_amd64.go:212] [ 964: 964] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:33.938303 762332 usertrap_amd64.go:122] [ 964: 964] Allocate a new trap: 0xc002388ed0 14 D0713 00:00:33.938455 762332 usertrap_amd64.go:225] [ 964: 964] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:33.938996 762332 task_exit.go:204] [ 964: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.939331 762332 task_signals.go:204] [ 964: 968] Signal 964, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.939450 762332 task_signals.go:204] [ 964: 966] Signal 964, PID: 966, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.939619 762332 task_exit.go:204] [ 964: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.939842 762332 task_signals.go:204] [ 964: 965] Signal 964, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.940091 762332 task_exit.go:204] [ 964: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.940305 762332 task_signals.go:204] [ 964: 967] Signal 964, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:33.940523 762332 task_exit.go:204] [ 964: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.941038 762332 task_exit.go:204] [ 964: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.941291 762332 task_exit.go:204] [ 964: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:33.942072 762332 task_exit.go:204] [ 964: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.942158 762332 task_exit.go:204] [ 964: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.942341 762332 task_exit.go:204] [ 964: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.942388 762332 task_exit.go:204] [ 964: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.942655 762332 task_exit.go:204] [ 964: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.942724 762332 task_exit.go:204] [ 964: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.965072 762332 task_exit.go:204] [ 964: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:33.965172 762332 task_exit.go:204] [ 964: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.965471 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:33.965871 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:33.965982 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:33.966105 762332 task_exit.go:204] [ 964: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:33.972709 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.976599 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:33.993064 762332 syscalls.go:262] [ 969: 969] Allocating stack with size of 8388608 bytes D0713 00:00:33.996143 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:33.996637 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:33.999986 762332 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:34.000152 762332 usertrap_amd64.go:106] [ 969: 969] Map a usertrap vma at 61000 D0713 00:00:34.001043 762332 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc002389320 1 D0713 00:00:34.001306 762332 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:34.002980 762332 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:34.003031 762332 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc002389320 2 D0713 00:00:34.003158 762332 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:34.006565 762332 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:34.006640 762332 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc002389320 3 D0713 00:00:34.006805 762332 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:34.030953 762332 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:34.031050 762332 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc002389320 4 D0713 00:00:34.031253 762332 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:34.034170 762332 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:34.034244 762332 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc002389320 5 D0713 00:00:34.034398 762332 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:34.034708 762332 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b214:sysno 13 D0713 00:00:34.034750 762332 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc002389320 6 D0713 00:00:34.034904 762332 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:34.053410 762332 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:34.053476 762332 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc002389320 7 D0713 00:00:34.053624 762332 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:34.055173 762332 usertrap_amd64.go:212] [ 969: 970] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:34.055236 762332 usertrap_amd64.go:122] [ 969: 970] Allocate a new trap: 0xc002389320 8 D0713 00:00:34.055428 762332 usertrap_amd64.go:225] [ 969: 970] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:34.056837 762332 usertrap_amd64.go:212] [ 969: 970] Found the pattern at ip 46af76:sysno 35 D0713 00:00:34.056900 762332 usertrap_amd64.go:122] [ 969: 970] Allocate a new trap: 0xc002389320 9 D0713 00:00:34.057091 762332 usertrap_amd64.go:225] [ 969: 970] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:34.058631 762332 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:34.058718 762332 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc002389320 10 D0713 00:00:34.058916 762332 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:34.059391 762332 usertrap_amd64.go:212] [ 969: 970] Found the pattern at ip 46b020:sysno 39 D0713 00:00:34.059502 762332 usertrap_amd64.go:122] [ 969: 970] Allocate a new trap: 0xc002389320 11 D0713 00:00:34.059665 762332 usertrap_amd64.go:225] [ 969: 970] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:34.060049 762332 usertrap_amd64.go:212] [ 969: 970] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:34.060214 762332 usertrap_amd64.go:122] [ 969: 970] Allocate a new trap: 0xc002389320 12 D0713 00:00:34.060501 762332 usertrap_amd64.go:225] [ 969: 970] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:34.061783 762332 task_signals.go:470] [ 969: 972] Notified of signal 23 D0713 00:00:34.062126 762332 task_signals.go:179] [ 969: 972] Restarting syscall 202: interrupted by signal 23 D0713 00:00:34.062229 762332 task_signals.go:220] [ 969: 972] Signal 23: delivering to handler D0713 00:00:34.072606 762332 task_signals.go:470] [ 969: 969] Notified of signal 23 D0713 00:00:34.073271 762332 task_signals.go:220] [ 969: 969] Signal 23: delivering to handler D0713 00:00:34.074183 762332 task_signals.go:470] [ 969: 969] Notified of signal 23 D0713 00:00:34.074831 762332 task_signals.go:220] [ 969: 969] Signal 23: delivering to handler D0713 00:00:34.075625 762332 task_signals.go:470] [ 969: 969] Notified of signal 23 D0713 00:00:34.075794 762332 task_signals.go:220] [ 969: 969] Signal 23: delivering to handler D0713 00:00:34.076547 762332 task_signals.go:470] [ 969: 969] Notified of signal 23 D0713 00:00:34.076672 762332 task_signals.go:220] [ 969: 969] Signal 23: delivering to handler D0713 00:00:34.083205 762332 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46af29:sysno 293 D0713 00:00:34.083265 762332 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc002389320 13 D0713 00:00:34.083409 762332 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:34.088521 762332 task_signals.go:470] [ 969: 969] Notified of signal 23 D0713 00:00:34.090442 762332 task_signals.go:220] [ 969: 969] Signal 23: delivering to handler D0713 00:00:34.105421 762332 usertrap_amd64.go:212] [ 969: 969] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:34.105506 762332 usertrap_amd64.go:122] [ 969: 969] Allocate a new trap: 0xc002389320 14 D0713 00:00:34.105675 762332 usertrap_amd64.go:225] [ 969: 969] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:34.106077 762332 task_exit.go:204] [ 969: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.106416 762332 task_signals.go:204] [ 969: 972] Signal 969, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.106543 762332 task_signals.go:204] [ 969: 971] Signal 969, PID: 971, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.106533 762332 task_signals.go:204] [ 969: 973] Signal 969, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.106569 762332 task_signals.go:204] [ 969: 970] Signal 969, PID: 970, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.106621 762332 task_exit.go:204] [ 969: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.106805 762332 task_exit.go:204] [ 969: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.107210 762332 task_exit.go:204] [ 969: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.107279 762332 task_exit.go:204] [ 969: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.107532 762332 task_exit.go:204] [ 969: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.107887 762332 task_exit.go:204] [ 969: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.107936 762332 task_exit.go:204] [ 969: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.108064 762332 task_exit.go:204] [ 969: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.108355 762332 task_exit.go:204] [ 969: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.108409 762332 task_exit.go:204] [ 969: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.108555 762332 task_exit.go:204] [ 969: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.132056 762332 task_exit.go:204] [ 969: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.132143 762332 task_exit.go:204] [ 969: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.132369 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:34.132614 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:34.132666 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:34.132930 762332 task_exit.go:204] [ 969: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.165137 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:34.165397 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.188000 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:34.188242 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.212239 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:34.212598 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.231777 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:34.232088 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.278661 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:34.279342 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.297517 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:34.297924 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.341916 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:34.342159 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.362106 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:34.362315 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.373618 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:34.373870 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.377696 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.390671 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:34.396332 762332 syscalls.go:262] [ 974: 974] Allocating stack with size of 8388608 bytes D0713 00:00:34.399343 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.400454 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.402304 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:34.402697 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.404328 762332 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:34.404525 762332 usertrap_amd64.go:106] [ 974: 974] Map a usertrap vma at 65000 D0713 00:00:34.405888 762332 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc000465230 1 D0713 00:00:34.406365 762332 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:34.408375 762332 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:34.408438 762332 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc000465230 2 D0713 00:00:34.408565 762332 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:34.411693 762332 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:34.411776 762332 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc000465230 3 D0713 00:00:34.411919 762332 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:34.433900 762332 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:34.433995 762332 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc000465230 4 D0713 00:00:34.434126 762332 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:34.437319 762332 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:34.437415 762332 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc000465230 5 D0713 00:00:34.437544 762332 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:34.437882 762332 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46b214:sysno 13 D0713 00:00:34.437928 762332 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc000465230 6 D0713 00:00:34.438050 762332 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:34.462434 762332 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:34.462544 762332 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc000465230 7 D0713 00:00:34.462721 762332 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:34.465044 762332 usertrap_amd64.go:212] [ 974: 975] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:34.465314 762332 usertrap_amd64.go:122] [ 974: 975] Allocate a new trap: 0xc000465230 8 D0713 00:00:34.465627 762332 usertrap_amd64.go:225] [ 974: 975] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:34.467584 762332 usertrap_amd64.go:212] [ 974: 975] Found the pattern at ip 46af76:sysno 35 D0713 00:00:34.467678 762332 usertrap_amd64.go:122] [ 974: 975] Allocate a new trap: 0xc000465230 9 D0713 00:00:34.469074 762332 usertrap_amd64.go:225] [ 974: 975] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:34.469965 762332 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:34.470068 762332 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc000465230 10 D0713 00:00:34.471341 762332 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:34.487790 762332 usertrap_amd64.go:212] [ 974: 975] Found the pattern at ip 46b020:sysno 39 D0713 00:00:34.487895 762332 usertrap_amd64.go:122] [ 974: 975] Allocate a new trap: 0xc000465230 11 D0713 00:00:34.488042 762332 usertrap_amd64.go:225] [ 974: 975] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:34.488702 762332 usertrap_amd64.go:212] [ 974: 975] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:34.488797 762332 usertrap_amd64.go:122] [ 974: 975] Allocate a new trap: 0xc000465230 12 D0713 00:00:34.489098 762332 usertrap_amd64.go:225] [ 974: 975] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:34.489780 762332 task_signals.go:470] [ 974: 974] Notified of signal 23 D0713 00:00:34.492333 762332 task_signals.go:220] [ 974: 974] Signal 23: delivering to handler D0713 00:00:34.494799 762332 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46af29:sysno 293 D0713 00:00:34.494875 762332 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc000465230 13 D0713 00:00:34.495101 762332 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:34.500829 762332 task_signals.go:470] [ 974: 974] Notified of signal 23 D0713 00:00:34.503523 762332 task_signals.go:220] [ 974: 974] Signal 23: delivering to handler I0713 00:00:34.517744 762332 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0713 00:00:34.518036 762332 usertrap_amd64.go:212] [ 974: 974] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:34.518110 762332 usertrap_amd64.go:122] [ 974: 974] Allocate a new trap: 0xc000465230 14 D0713 00:00:34.518310 762332 usertrap_amd64.go:225] [ 974: 974] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:34.518716 762332 task_exit.go:204] [ 974: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.519286 762332 task_signals.go:204] [ 974: 976] Signal 974, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.519279 762332 task_signals.go:204] [ 974: 978] Signal 974, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.519286 762332 task_signals.go:204] [ 974: 977] Signal 974, PID: 977, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.519460 762332 task_signals.go:204] [ 974: 979] Signal 974, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.519445 762332 task_exit.go:204] [ 974: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.520476 762332 task_signals.go:204] [ 974: 975] Signal 974, PID: 975, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.520522 762332 task_exit.go:204] [ 974: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.520815 762332 task_exit.go:204] [ 974: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.521090 762332 task_exit.go:204] [ 974: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.521382 762332 task_exit.go:204] [ 974: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.521547 762332 task_exit.go:204] [ 974: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.522202 762332 task_exit.go:204] [ 974: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.522348 762332 task_exit.go:204] [ 974: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.522773 762332 task_exit.go:204] [ 974: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.522882 762332 task_exit.go:204] [ 974: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.523573 762332 task_exit.go:204] [ 974: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.523670 762332 task_exit.go:204] [ 974: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.524469 762332 task_exit.go:204] [ 974: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.524544 762332 task_exit.go:204] [ 974: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.550505 762332 task_exit.go:204] [ 974: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.550589 762332 task_exit.go:204] [ 974: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.550868 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:34.551541 762332 task_exit.go:204] [ 974: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.551383 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:34.552303 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:34.559526 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.561143 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:34.580569 762332 syscalls.go:262] [ 980: 980] Allocating stack with size of 8388608 bytes D0713 00:00:34.583743 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.584332 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.590036 762332 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:34.590202 762332 usertrap_amd64.go:106] [ 980: 980] Map a usertrap vma at 64000 D0713 00:00:34.590953 762332 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0008e2d80 1 D0713 00:00:34.591231 762332 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:34.593057 762332 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:34.593138 762332 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0008e2d80 2 D0713 00:00:34.593309 762332 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:34.595495 762332 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:34.595547 762332 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0008e2d80 3 D0713 00:00:34.595727 762332 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:34.615831 762332 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:34.615941 762332 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0008e2d80 4 D0713 00:00:34.616108 762332 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:34.618963 762332 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:34.619061 762332 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0008e2d80 5 D0713 00:00:34.619224 762332 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:34.620164 762332 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b214:sysno 13 D0713 00:00:34.620219 762332 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0008e2d80 6 D0713 00:00:34.620339 762332 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:34.643559 762332 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:34.643655 762332 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0008e2d80 7 D0713 00:00:34.643816 762332 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:34.645672 762332 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:34.645762 762332 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc0008e2d80 8 D0713 00:00:34.645968 762332 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:34.649548 762332 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46af76:sysno 35 D0713 00:00:34.649625 762332 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc0008e2d80 9 D0713 00:00:34.649895 762332 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:34.650343 762332 usertrap_amd64.go:212] [ 980: 983] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:34.650400 762332 usertrap_amd64.go:122] [ 980: 983] Allocate a new trap: 0xc0008e2d80 10 D0713 00:00:34.650551 762332 usertrap_amd64.go:225] [ 980: 983] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:34.663605 762332 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b020:sysno 39 D0713 00:00:34.663714 762332 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc0008e2d80 11 D0713 00:00:34.665334 762332 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:34.666490 762332 usertrap_amd64.go:212] [ 980: 981] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:34.666559 762332 usertrap_amd64.go:122] [ 980: 981] Allocate a new trap: 0xc0008e2d80 12 D0713 00:00:34.666755 762332 usertrap_amd64.go:225] [ 980: 981] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:34.667714 762332 task_signals.go:470] [ 980: 980] Notified of signal 23 D0713 00:00:34.667947 762332 task_signals.go:220] [ 980: 980] Signal 23: delivering to handler D0713 00:00:34.677073 762332 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46af29:sysno 293 D0713 00:00:34.677151 762332 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0008e2d80 13 D0713 00:00:34.677318 762332 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:34.682930 762332 task_signals.go:470] [ 980: 980] Notified of signal 23 D0713 00:00:34.685562 762332 task_signals.go:220] [ 980: 980] Signal 23: delivering to handler I0713 00:00:34.702857 762332 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0713 00:00:34.703181 762332 usertrap_amd64.go:212] [ 980: 980] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:34.703240 762332 usertrap_amd64.go:122] [ 980: 980] Allocate a new trap: 0xc0008e2d80 14 D0713 00:00:34.703403 762332 usertrap_amd64.go:225] [ 980: 980] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:34.703911 762332 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.704367 762332 task_signals.go:204] [ 980: 982] Signal 980, PID: 982, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.704421 762332 task_signals.go:204] [ 980: 983] Signal 980, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.704578 762332 task_signals.go:204] [ 980: 985] Signal 980, PID: 985, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.704856 762332 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.705192 762332 task_signals.go:204] [ 980: 981] Signal 980, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.705533 762332 task_signals.go:204] [ 980: 984] Signal 980, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.705966 762332 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.706055 762332 task_exit.go:204] [ 980: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.706313 762332 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.706526 762332 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.706891 762332 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.706957 762332 task_exit.go:204] [ 980: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.707103 762332 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.707496 762332 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.707557 762332 task_exit.go:204] [ 980: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.707762 762332 task_exit.go:204] [ 980: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.708107 762332 task_exit.go:204] [ 980: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.708167 762332 task_exit.go:204] [ 980: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.708500 762332 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.736156 762332 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.736278 762332 task_exit.go:204] [ 980: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.736508 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:34.737329 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:34.737418 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:34.738202 762332 task_exit.go:204] [ 980: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.746153 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.748506 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:34.771195 762332 syscalls.go:262] [ 986: 986] Allocating stack with size of 8388608 bytes D0713 00:00:34.774647 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.775551 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.777346 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:34.777777 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.780040 762332 usertrap_amd64.go:212] [ 986: 986] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:34.780245 762332 usertrap_amd64.go:106] [ 986: 986] Map a usertrap vma at 64000 D0713 00:00:34.781445 762332 usertrap_amd64.go:122] [ 986: 986] Allocate a new trap: 0xc0004657a0 1 D0713 00:00:34.782079 762332 usertrap_amd64.go:225] [ 986: 986] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:34.783991 762332 usertrap_amd64.go:212] [ 986: 986] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:34.784049 762332 usertrap_amd64.go:122] [ 986: 986] Allocate a new trap: 0xc0004657a0 2 D0713 00:00:34.784204 762332 usertrap_amd64.go:225] [ 986: 986] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:34.787693 762332 usertrap_amd64.go:212] [ 986: 986] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:34.787786 762332 usertrap_amd64.go:122] [ 986: 986] Allocate a new trap: 0xc0004657a0 3 D0713 00:00:34.787974 762332 usertrap_amd64.go:225] [ 986: 986] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:34.813246 762332 usertrap_amd64.go:212] [ 986: 986] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:34.813348 762332 usertrap_amd64.go:122] [ 986: 986] Allocate a new trap: 0xc0004657a0 4 D0713 00:00:34.813562 762332 usertrap_amd64.go:225] [ 986: 986] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:34.818942 762332 usertrap_amd64.go:212] [ 986: 986] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:34.819026 762332 usertrap_amd64.go:122] [ 986: 986] Allocate a new trap: 0xc0004657a0 5 D0713 00:00:34.819202 762332 usertrap_amd64.go:225] [ 986: 986] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:34.819726 762332 usertrap_amd64.go:212] [ 986: 986] Found the pattern at ip 46b214:sysno 13 D0713 00:00:34.819829 762332 usertrap_amd64.go:122] [ 986: 986] Allocate a new trap: 0xc0004657a0 6 D0713 00:00:34.819996 762332 usertrap_amd64.go:225] [ 986: 986] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:34.850731 762332 usertrap_amd64.go:212] [ 986: 986] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:34.850805 762332 usertrap_amd64.go:122] [ 986: 986] Allocate a new trap: 0xc0004657a0 7 D0713 00:00:34.850922 762332 usertrap_amd64.go:225] [ 986: 986] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:34.852684 762332 usertrap_amd64.go:212] [ 986: 987] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:34.852753 762332 usertrap_amd64.go:122] [ 986: 987] Allocate a new trap: 0xc0004657a0 8 D0713 00:00:34.852884 762332 usertrap_amd64.go:225] [ 986: 987] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:34.854829 762332 usertrap_amd64.go:212] [ 986: 987] Found the pattern at ip 46af76:sysno 35 D0713 00:00:34.854929 762332 usertrap_amd64.go:122] [ 986: 987] Allocate a new trap: 0xc0004657a0 9 D0713 00:00:34.855206 762332 usertrap_amd64.go:225] [ 986: 987] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:34.856852 762332 usertrap_amd64.go:212] [ 986: 986] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:34.856991 762332 usertrap_amd64.go:122] [ 986: 986] Allocate a new trap: 0xc0004657a0 10 D0713 00:00:34.857255 762332 usertrap_amd64.go:225] [ 986: 986] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:34.869591 762332 usertrap_amd64.go:212] [ 986: 987] Found the pattern at ip 46b020:sysno 39 D0713 00:00:34.869760 762332 usertrap_amd64.go:122] [ 986: 987] Allocate a new trap: 0xc0004657a0 11 D0713 00:00:34.869990 762332 usertrap_amd64.go:225] [ 986: 987] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:34.870443 762332 usertrap_amd64.go:212] [ 986: 987] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:34.870502 762332 usertrap_amd64.go:122] [ 986: 987] Allocate a new trap: 0xc0004657a0 12 D0713 00:00:34.870667 762332 usertrap_amd64.go:225] [ 986: 987] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:34.872587 762332 task_signals.go:470] [ 986: 986] Notified of signal 23 D0713 00:00:34.873159 762332 task_signals.go:220] [ 986: 986] Signal 23: delivering to handler D0713 00:00:34.882322 762332 usertrap_amd64.go:212] [ 986: 986] Found the pattern at ip 46af29:sysno 293 D0713 00:00:34.882419 762332 usertrap_amd64.go:122] [ 986: 986] Allocate a new trap: 0xc0004657a0 13 D0713 00:00:34.882556 762332 usertrap_amd64.go:225] [ 986: 986] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:34.883659 762332 task_signals.go:470] [ 986: 986] Notified of signal 23 D0713 00:00:34.883840 762332 task_signals.go:220] [ 986: 986] Signal 23: delivering to handler D0713 00:00:34.901294 762332 task_signals.go:470] [ 986: 986] Notified of signal 23 D0713 00:00:34.903872 762332 task_signals.go:220] [ 986: 986] Signal 23: delivering to handler I0713 00:00:34.906336 762332 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0713 00:00:34.906786 762332 usertrap_amd64.go:212] [ 986: 986] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:34.906868 762332 usertrap_amd64.go:122] [ 986: 986] Allocate a new trap: 0xc0004657a0 14 D0713 00:00:34.907048 762332 usertrap_amd64.go:225] [ 986: 986] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:34.907543 762332 task_exit.go:204] [ 986: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.908015 762332 task_signals.go:204] [ 986: 988] Signal 986, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.908244 762332 task_signals.go:204] [ 986: 989] Signal 986, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.908494 762332 task_exit.go:204] [ 986: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.908764 762332 task_exit.go:204] [ 986: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.908775 762332 task_signals.go:204] [ 986: 987] Signal 986, PID: 987, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.908753 762332 task_signals.go:204] [ 986: 990] Signal 986, PID: 990, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:34.909205 762332 task_exit.go:204] [ 986: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.909556 762332 task_exit.go:204] [ 986: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.909958 762332 task_exit.go:204] [ 986: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.910031 762332 task_exit.go:204] [ 986: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.910368 762332 task_exit.go:204] [ 986: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:34.910991 762332 task_exit.go:204] [ 986: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.911078 762332 task_exit.go:204] [ 986: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.911425 762332 task_exit.go:204] [ 986: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.911492 762332 task_exit.go:204] [ 986: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.936261 762332 task_exit.go:204] [ 986: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:34.936379 762332 task_exit.go:204] [ 986: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.936683 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:34.937165 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:34.937367 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:34.937577 762332 task_exit.go:204] [ 986: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:34.946533 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.947050 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:34.967484 762332 syscalls.go:262] [ 991: 991] Allocating stack with size of 8388608 bytes D0713 00:00:34.970614 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:34.971188 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:34.974644 762332 usertrap_amd64.go:212] [ 991: 991] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:34.974798 762332 usertrap_amd64.go:106] [ 991: 991] Map a usertrap vma at 61000 D0713 00:00:34.975515 762332 usertrap_amd64.go:122] [ 991: 991] Allocate a new trap: 0xc00043dc50 1 D0713 00:00:34.975771 762332 usertrap_amd64.go:225] [ 991: 991] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:34.977687 762332 usertrap_amd64.go:212] [ 991: 991] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:34.977747 762332 usertrap_amd64.go:122] [ 991: 991] Allocate a new trap: 0xc00043dc50 2 D0713 00:00:34.977904 762332 usertrap_amd64.go:225] [ 991: 991] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:34.980600 762332 usertrap_amd64.go:212] [ 991: 991] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:34.980661 762332 usertrap_amd64.go:122] [ 991: 991] Allocate a new trap: 0xc00043dc50 3 D0713 00:00:34.980804 762332 usertrap_amd64.go:225] [ 991: 991] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:35.005864 762332 usertrap_amd64.go:212] [ 991: 991] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:35.005949 762332 usertrap_amd64.go:122] [ 991: 991] Allocate a new trap: 0xc00043dc50 4 D0713 00:00:35.006114 762332 usertrap_amd64.go:225] [ 991: 991] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:35.008890 762332 usertrap_amd64.go:212] [ 991: 991] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:35.009000 762332 usertrap_amd64.go:122] [ 991: 991] Allocate a new trap: 0xc00043dc50 5 D0713 00:00:35.009179 762332 usertrap_amd64.go:225] [ 991: 991] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:35.009697 762332 usertrap_amd64.go:212] [ 991: 991] Found the pattern at ip 46b214:sysno 13 D0713 00:00:35.009757 762332 usertrap_amd64.go:122] [ 991: 991] Allocate a new trap: 0xc00043dc50 6 D0713 00:00:35.009946 762332 usertrap_amd64.go:225] [ 991: 991] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:35.030849 762332 usertrap_amd64.go:212] [ 991: 991] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:35.030965 762332 usertrap_amd64.go:122] [ 991: 991] Allocate a new trap: 0xc00043dc50 7 D0713 00:00:35.031130 762332 usertrap_amd64.go:225] [ 991: 991] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:35.033285 762332 usertrap_amd64.go:212] [ 991: 992] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:35.033405 762332 usertrap_amd64.go:122] [ 991: 992] Allocate a new trap: 0xc00043dc50 8 D0713 00:00:35.033674 762332 usertrap_amd64.go:225] [ 991: 992] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:35.035201 762332 usertrap_amd64.go:212] [ 991: 992] Found the pattern at ip 46af76:sysno 35 D0713 00:00:35.035264 762332 usertrap_amd64.go:122] [ 991: 992] Allocate a new trap: 0xc00043dc50 9 D0713 00:00:35.035409 762332 usertrap_amd64.go:225] [ 991: 992] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:35.036255 762332 usertrap_amd64.go:212] [ 991: 991] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:35.036385 762332 usertrap_amd64.go:122] [ 991: 991] Allocate a new trap: 0xc00043dc50 10 D0713 00:00:35.037200 762332 usertrap_amd64.go:225] [ 991: 991] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:35.052337 762332 usertrap_amd64.go:212] [ 991: 992] Found the pattern at ip 46b020:sysno 39 D0713 00:00:35.052442 762332 usertrap_amd64.go:122] [ 991: 992] Allocate a new trap: 0xc00043dc50 11 D0713 00:00:35.053110 762332 usertrap_amd64.go:225] [ 991: 992] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:35.053541 762332 usertrap_amd64.go:212] [ 991: 992] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:35.053633 762332 usertrap_amd64.go:122] [ 991: 992] Allocate a new trap: 0xc00043dc50 12 D0713 00:00:35.054207 762332 usertrap_amd64.go:225] [ 991: 992] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:35.054701 762332 task_signals.go:470] [ 991: 991] Notified of signal 23 D0713 00:00:35.055056 762332 task_signals.go:220] [ 991: 991] Signal 23: delivering to handler D0713 00:00:35.062128 762332 usertrap_amd64.go:212] [ 991: 991] Found the pattern at ip 46af29:sysno 293 D0713 00:00:35.062217 762332 usertrap_amd64.go:122] [ 991: 991] Allocate a new trap: 0xc00043dc50 13 D0713 00:00:35.062337 762332 usertrap_amd64.go:225] [ 991: 991] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:35.069406 762332 task_signals.go:470] [ 991: 991] Notified of signal 23 D0713 00:00:35.069583 762332 task_signals.go:220] [ 991: 991] Signal 23: delivering to handler I0713 00:00:35.081803 762332 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0713 00:00:35.082082 762332 usertrap_amd64.go:212] [ 991: 991] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:35.082140 762332 usertrap_amd64.go:122] [ 991: 991] Allocate a new trap: 0xc00043dc50 14 D0713 00:00:35.082270 762332 usertrap_amd64.go:225] [ 991: 991] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:35.082886 762332 task_exit.go:204] [ 991: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.083196 762332 task_signals.go:204] [ 991: 995] Signal 991, PID: 995, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.083204 762332 task_signals.go:204] [ 991: 992] Signal 991, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.083259 762332 task_signals.go:204] [ 991: 996] Signal 991, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.083217 762332 task_signals.go:204] [ 991: 993] Signal 991, PID: 993, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.083534 762332 task_exit.go:204] [ 991: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.083795 762332 task_exit.go:204] [ 991: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.083974 762332 task_signals.go:204] [ 991: 994] Signal 991, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.084172 762332 task_exit.go:204] [ 991: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.084478 762332 task_exit.go:204] [ 991: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.085032 762332 task_exit.go:204] [ 991: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.085532 762332 task_exit.go:204] [ 991: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.085612 762332 task_exit.go:204] [ 991: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.085899 762332 task_exit.go:204] [ 991: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.085978 762332 task_exit.go:204] [ 991: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.086173 762332 task_exit.go:204] [ 991: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.086229 762332 task_exit.go:204] [ 991: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.086527 762332 task_exit.go:204] [ 991: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.086625 762332 task_exit.go:204] [ 991: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.086779 762332 task_exit.go:204] [ 991: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.107900 762332 task_exit.go:204] [ 991: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.107983 762332 task_exit.go:204] [ 991: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.108184 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:35.108590 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:35.108728 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:35.108896 762332 task_exit.go:204] [ 991: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.115581 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.120088 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 executing program D0713 00:00:35.133755 762332 syscalls.go:262] [ 997: 997] Allocating stack with size of 8388608 bytes D0713 00:00:35.136704 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.137221 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:35.140566 762332 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:35.140721 762332 usertrap_amd64.go:106] [ 997: 997] Map a usertrap vma at 65000 D0713 00:00:35.141774 762332 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc002389d10 1 D0713 00:00:35.142100 762332 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:35.144200 762332 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:35.144263 762332 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc002389d10 2 D0713 00:00:35.144428 762332 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:35.147813 762332 sampler.go:191] Time: Adjusting syscall overhead down to 875 D0713 00:00:35.148138 762332 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:35.148253 762332 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc002389d10 3 D0713 00:00:35.148449 762332 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:35.168957 762332 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:35.169064 762332 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc002389d10 4 D0713 00:00:35.169202 762332 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:35.171821 762332 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:35.171867 762332 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc002389d10 5 D0713 00:00:35.171970 762332 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:35.172452 762332 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b214:sysno 13 D0713 00:00:35.172558 762332 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc002389d10 6 D0713 00:00:35.172727 762332 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:35.190505 762332 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:35.190595 762332 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc002389d10 7 D0713 00:00:35.190721 762332 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:35.192309 762332 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:35.192456 762332 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc002389d10 8 D0713 00:00:35.192778 762332 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:35.195003 762332 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46af76:sysno 35 D0713 00:00:35.195086 762332 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc002389d10 9 D0713 00:00:35.195346 762332 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:35.195982 762332 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:35.196053 762332 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc002389d10 10 D0713 00:00:35.196287 762332 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:35.210306 762332 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46b020:sysno 39 D0713 00:00:35.210407 762332 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc002389d10 11 D0713 00:00:35.210732 762332 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:35.211380 762332 usertrap_amd64.go:212] [ 997: 998] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:35.211458 762332 usertrap_amd64.go:122] [ 997: 998] Allocate a new trap: 0xc002389d10 12 D0713 00:00:35.212314 762332 usertrap_amd64.go:225] [ 997: 998] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:35.213918 762332 task_signals.go:470] [ 997: 997] Notified of signal 23 D0713 00:00:35.214210 762332 task_signals.go:220] [ 997: 997] Signal 23: delivering to handler D0713 00:00:35.222955 762332 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46af29:sysno 293 D0713 00:00:35.223057 762332 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc002389d10 13 D0713 00:00:35.223242 762332 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:35.228409 762332 task_signals.go:470] [ 997: 997] Notified of signal 23 D0713 00:00:35.228654 762332 task_signals.go:220] [ 997: 997] Signal 23: delivering to handler D0713 00:00:35.242738 762332 task_signals.go:470] [ 997: 997] Notified of signal 23 D0713 00:00:35.244490 762332 task_signals.go:220] [ 997: 997] Signal 23: delivering to handler I0713 00:00:35.246735 762332 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0713 00:00:35.247074 762332 usertrap_amd64.go:212] [ 997: 997] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:35.247135 762332 usertrap_amd64.go:122] [ 997: 997] Allocate a new trap: 0xc002389d10 14 D0713 00:00:35.247331 762332 usertrap_amd64.go:225] [ 997: 997] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:35.247811 762332 task_exit.go:204] [ 997: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.248308 762332 task_signals.go:204] [ 997: 998] Signal 997, PID: 998, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.248383 762332 task_signals.go:204] [ 997: 1001] Signal 997, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.248736 762332 task_signals.go:204] [ 997: 999] Signal 997, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.248909 762332 task_exit.go:204] [ 997: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.249151 762332 task_signals.go:204] [ 997: 1000] Signal 997, PID: 1000, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.249448 762332 task_exit.go:204] [ 997: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.249913 762332 task_exit.go:204] [ 997: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.250170 762332 task_exit.go:204] [ 997: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.250715 762332 task_exit.go:204] [ 997: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.250916 762332 task_exit.go:204] [ 997: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.251460 762332 task_exit.go:204] [ 997: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.251549 762332 task_exit.go:204] [ 997: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.252079 762332 task_exit.go:204] [ 997: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.252166 762332 task_exit.go:204] [ 997: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.252341 762332 task_exit.go:204] [ 997: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.275994 762332 task_exit.go:204] [ 997: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.276112 762332 task_exit.go:204] [ 997: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.276401 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:35.276834 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:35.276936 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:35.277195 762332 task_exit.go:204] [ 997: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.284406 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.286836 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:35.305102 762332 syscalls.go:262] [ 1002: 1002] Allocating stack with size of 8388608 bytes D0713 00:00:35.308191 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.308768 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:35.310053 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:35.310289 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:35.311892 762332 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:35.312019 762332 usertrap_amd64.go:106] [ 1002: 1002] Map a usertrap vma at 67000 D0713 00:00:35.312719 762332 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc00043df50 1 D0713 00:00:35.313124 762332 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:35.315065 762332 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:35.315127 762332 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc00043df50 2 D0713 00:00:35.315291 762332 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:35.317939 762332 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:35.318014 762332 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc00043df50 3 D0713 00:00:35.318162 762332 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:35.343138 762332 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:35.343240 762332 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc00043df50 4 D0713 00:00:35.343412 762332 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:35.346661 762332 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:35.346735 762332 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc00043df50 5 D0713 00:00:35.346920 762332 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:35.347450 762332 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b214:sysno 13 D0713 00:00:35.347543 762332 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc00043df50 6 D0713 00:00:35.347724 762332 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:35.373869 762332 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:35.373952 762332 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc00043df50 7 D0713 00:00:35.374074 762332 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:35.375896 762332 usertrap_amd64.go:212] [ 1002: 1003] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:35.375961 762332 usertrap_amd64.go:122] [ 1002: 1003] Allocate a new trap: 0xc00043df50 8 D0713 00:00:35.376214 762332 usertrap_amd64.go:225] [ 1002: 1003] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:35.380109 762332 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:35.380261 762332 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc00043df50 9 D0713 00:00:35.380628 762332 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:35.382061 762332 usertrap_amd64.go:212] [ 1002: 1003] Found the pattern at ip 46af76:sysno 35 D0713 00:00:35.382138 762332 usertrap_amd64.go:122] [ 1002: 1003] Allocate a new trap: 0xc00043df50 10 D0713 00:00:35.382338 762332 usertrap_amd64.go:225] [ 1002: 1003] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:35.396331 762332 usertrap_amd64.go:212] [ 1002: 1003] Found the pattern at ip 46b020:sysno 39 D0713 00:00:35.396447 762332 usertrap_amd64.go:122] [ 1002: 1003] Allocate a new trap: 0xc00043df50 11 D0713 00:00:35.396608 762332 usertrap_amd64.go:225] [ 1002: 1003] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:35.397102 762332 usertrap_amd64.go:212] [ 1002: 1003] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:35.397166 762332 usertrap_amd64.go:122] [ 1002: 1003] Allocate a new trap: 0xc00043df50 12 D0713 00:00:35.397383 762332 usertrap_amd64.go:225] [ 1002: 1003] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:35.398158 762332 task_signals.go:470] [ 1002: 1002] Notified of signal 23 D0713 00:00:35.398591 762332 task_signals.go:220] [ 1002: 1002] Signal 23: delivering to handler D0713 00:00:35.407891 762332 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46af29:sysno 293 D0713 00:00:35.407960 762332 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc00043df50 13 D0713 00:00:35.408091 762332 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:35.413261 762332 task_signals.go:470] [ 1002: 1002] Notified of signal 23 D0713 00:00:35.415462 762332 task_signals.go:220] [ 1002: 1002] Signal 23: delivering to handler I0713 00:00:35.429837 762332 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0713 00:00:35.430122 762332 usertrap_amd64.go:212] [ 1002: 1002] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:35.430208 762332 usertrap_amd64.go:122] [ 1002: 1002] Allocate a new trap: 0xc00043df50 14 D0713 00:00:35.430377 762332 usertrap_amd64.go:225] [ 1002: 1002] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:35.430840 762332 task_exit.go:204] [ 1002: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.431303 762332 task_signals.go:204] [ 1002: 1003] Signal 1002, PID: 1003, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.431332 762332 task_signals.go:204] [ 1002: 1004] Signal 1002, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.431510 762332 task_signals.go:204] [ 1002: 1006] Signal 1002, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.431573 762332 task_signals.go:204] [ 1002: 1005] Signal 1002, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.431696 762332 task_exit.go:204] [ 1002: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.431996 762332 task_exit.go:204] [ 1002: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.432006 762332 task_signals.go:204] [ 1002: 1007] Signal 1002, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.432116 762332 task_exit.go:204] [ 1002: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.432396 762332 task_exit.go:204] [ 1002: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.432622 762332 task_exit.go:204] [ 1002: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.432855 762332 task_exit.go:204] [ 1002: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.433529 762332 task_exit.go:204] [ 1002: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.433591 762332 task_exit.go:204] [ 1002: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.433815 762332 task_exit.go:204] [ 1002: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.433907 762332 task_exit.go:204] [ 1002: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.434049 762332 task_exit.go:204] [ 1002: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.434106 762332 task_exit.go:204] [ 1002: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.434417 762332 task_exit.go:204] [ 1002: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.434464 762332 task_exit.go:204] [ 1002: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.456981 762332 task_exit.go:204] [ 1002: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.457073 762332 task_exit.go:204] [ 1002: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.457290 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:35.457547 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:35.457629 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:35.457841 762332 task_exit.go:204] [ 1002: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.465430 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.467684 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:35.483478 762332 syscalls.go:262] [ 1008: 1008] Allocating stack with size of 8388608 bytes D0713 00:00:35.486464 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.487036 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:35.491667 762332 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:35.491818 762332 usertrap_amd64.go:106] [ 1008: 1008] Map a usertrap vma at 63000 D0713 00:00:35.492594 762332 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc000d98d20 1 D0713 00:00:35.492879 762332 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:35.494657 762332 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:35.494727 762332 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc000d98d20 2 D0713 00:00:35.494851 762332 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:35.497168 762332 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:35.497221 762332 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc000d98d20 3 D0713 00:00:35.497319 762332 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:35.517549 762332 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:35.517618 762332 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc000d98d20 4 D0713 00:00:35.517750 762332 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:35.520350 762332 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:35.520413 762332 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc000d98d20 5 D0713 00:00:35.520537 762332 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:35.520933 762332 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b214:sysno 13 D0713 00:00:35.521024 762332 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc000d98d20 6 D0713 00:00:35.521133 762332 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:35.544121 762332 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:35.544226 762332 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc000d98d20 7 D0713 00:00:35.544385 762332 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:35.546104 762332 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:35.546177 762332 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc000d98d20 8 D0713 00:00:35.546440 762332 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:35.548437 762332 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46af76:sysno 35 D0713 00:00:35.548518 762332 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc000d98d20 9 D0713 00:00:35.548683 762332 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:35.550841 762332 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:35.551018 762332 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc000d98d20 10 D0713 00:00:35.551239 762332 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:35.565344 762332 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46b020:sysno 39 D0713 00:00:35.565487 762332 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc000d98d20 11 D0713 00:00:35.565731 762332 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:35.566458 762332 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:35.566544 762332 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc000d98d20 12 D0713 00:00:35.566725 762332 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:35.567415 762332 task_signals.go:470] [ 1008: 1008] Notified of signal 23 D0713 00:00:35.568209 762332 task_signals.go:220] [ 1008: 1008] Signal 23: delivering to handler D0713 00:00:35.576222 762332 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46af29:sysno 293 D0713 00:00:35.576295 762332 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc000d98d20 13 D0713 00:00:35.576516 762332 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:35.581815 762332 task_signals.go:470] [ 1008: 1008] Notified of signal 23 D0713 00:00:35.582035 762332 task_signals.go:220] [ 1008: 1008] Signal 23: delivering to handler D0713 00:00:35.593927 762332 task_signals.go:470] [ 1008: 1008] Notified of signal 23 D0713 00:00:35.594523 762332 task_signals.go:220] [ 1008: 1008] Signal 23: delivering to handler D0713 00:00:35.603036 762332 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:35.603125 762332 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc000d98d20 14 D0713 00:00:35.603325 762332 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:35.603832 762332 task_exit.go:204] [ 1008: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.604353 762332 task_signals.go:204] [ 1008: 1009] Signal 1008, PID: 1009, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.604345 762332 task_signals.go:204] [ 1008: 1012] Signal 1008, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.604680 762332 task_signals.go:204] [ 1008: 1011] Signal 1008, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.604732 762332 task_exit.go:204] [ 1008: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.605023 762332 task_signals.go:204] [ 1008: 1013] Signal 1008, PID: 1013, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.605057 762332 task_exit.go:204] [ 1008: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.605520 762332 task_exit.go:204] [ 1008: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.605863 762332 task_exit.go:204] [ 1008: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.606075 762332 task_signals.go:204] [ 1008: 1010] Signal 1008, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.606489 762332 task_exit.go:204] [ 1008: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.606563 762332 task_exit.go:204] [ 1008: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.606803 762332 task_exit.go:204] [ 1008: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.607327 762332 task_exit.go:204] [ 1008: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.607400 762332 task_exit.go:204] [ 1008: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.607938 762332 task_exit.go:204] [ 1008: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.608038 762332 task_exit.go:204] [ 1008: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.608468 762332 task_exit.go:204] [ 1008: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.608537 762332 task_exit.go:204] [ 1008: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.608721 762332 task_exit.go:204] [ 1008: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.633367 762332 task_exit.go:204] [ 1008: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.633474 762332 task_exit.go:204] [ 1008: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.633788 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:35.634145 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:35.634278 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:35.635023 762332 task_exit.go:204] [ 1008: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.643596 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:35.643819 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.663976 762332 syscalls.go:262] [ 1014: 1014] Allocating stack with size of 8388608 bytes D0713 00:00:35.667160 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.667803 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:35.672508 762332 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:35.672666 762332 usertrap_amd64.go:106] [ 1014: 1014] Map a usertrap vma at 67000 D0713 00:00:35.673734 762332 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000d992c0 1 D0713 00:00:35.674270 762332 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:35.676601 762332 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:35.676667 762332 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000d992c0 2 D0713 00:00:35.676829 762332 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:35.679840 762332 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:35.679905 762332 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000d992c0 3 D0713 00:00:35.680026 762332 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:35.707859 762332 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:35.707967 762332 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000d992c0 4 D0713 00:00:35.708142 762332 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:35.710968 762332 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:35.711028 762332 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000d992c0 5 D0713 00:00:35.711146 762332 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:35.711520 762332 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b214:sysno 13 D0713 00:00:35.711574 762332 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000d992c0 6 D0713 00:00:35.711717 762332 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:35.734653 762332 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:35.734766 762332 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000d992c0 7 D0713 00:00:35.734932 762332 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:35.736791 762332 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:35.736893 762332 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc000d992c0 8 D0713 00:00:35.737100 762332 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:35.739000 762332 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46af76:sysno 35 D0713 00:00:35.739046 762332 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc000d992c0 9 D0713 00:00:35.739221 762332 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:35.741148 762332 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:35.741251 762332 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000d992c0 10 D0713 00:00:35.741478 762332 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:35.754136 762332 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46b020:sysno 39 D0713 00:00:35.754226 762332 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc000d992c0 11 D0713 00:00:35.754379 762332 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:35.754714 762332 usertrap_amd64.go:212] [ 1014: 1015] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:35.754769 762332 usertrap_amd64.go:122] [ 1014: 1015] Allocate a new trap: 0xc000d992c0 12 D0713 00:00:35.754881 762332 usertrap_amd64.go:225] [ 1014: 1015] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:35.755272 762332 task_signals.go:470] [ 1014: 1014] Notified of signal 23 D0713 00:00:35.755924 762332 task_signals.go:220] [ 1014: 1014] Signal 23: delivering to handler D0713 00:00:35.757027 762332 task_signals.go:470] [ 1014: 1014] Notified of signal 23 D0713 00:00:35.757690 762332 task_signals.go:220] [ 1014: 1014] Signal 23: delivering to handler D0713 00:00:35.758940 762332 task_signals.go:470] [ 1014: 1014] Notified of signal 23 D0713 00:00:35.759620 762332 task_signals.go:220] [ 1014: 1014] Signal 23: delivering to handler D0713 00:00:35.760715 762332 task_signals.go:470] [ 1014: 1014] Notified of signal 23 D0713 00:00:35.761371 762332 task_signals.go:220] [ 1014: 1014] Signal 23: delivering to handler D0713 00:00:35.762548 762332 task_signals.go:470] [ 1014: 1014] Notified of signal 23 D0713 00:00:35.763423 762332 task_signals.go:220] [ 1014: 1014] Signal 23: delivering to handler D0713 00:00:35.764816 762332 task_signals.go:481] [ 1014: 1014] No task notified of signal 23 D0713 00:00:35.768267 762332 task_signals.go:220] [ 1014: 1014] Signal 23: delivering to handler D0713 00:00:35.771303 762332 task_signals.go:470] [ 1014: 1014] Notified of signal 23 D0713 00:00:35.771564 762332 task_signals.go:179] [ 1014: 1014] Restarting syscall 202: interrupted by signal 23 D0713 00:00:35.771647 762332 task_signals.go:220] [ 1014: 1014] Signal 23: delivering to handler D0713 00:00:35.779316 762332 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46af29:sysno 293 D0713 00:00:35.779384 762332 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000d992c0 13 D0713 00:00:35.779530 762332 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:35.786972 762332 task_signals.go:470] [ 1014: 1014] Notified of signal 23 D0713 00:00:35.788710 762332 task_signals.go:220] [ 1014: 1014] Signal 23: delivering to handler D0713 00:00:35.800335 762332 usertrap_amd64.go:212] [ 1014: 1014] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:35.800411 762332 usertrap_amd64.go:122] [ 1014: 1014] Allocate a new trap: 0xc000d992c0 14 D0713 00:00:35.800535 762332 usertrap_amd64.go:225] [ 1014: 1014] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:35.800975 762332 task_exit.go:204] [ 1014: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.801527 762332 task_signals.go:204] [ 1014: 1016] Signal 1014, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.801742 762332 task_signals.go:204] [ 1014: 1018] Signal 1014, PID: 1018, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.801789 762332 task_signals.go:204] [ 1014: 1015] Signal 1014, PID: 1015, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.801812 762332 task_signals.go:204] [ 1014: 1017] Signal 1014, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:35.801998 762332 task_exit.go:204] [ 1014: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.802267 762332 task_exit.go:204] [ 1014: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.802806 762332 task_exit.go:204] [ 1014: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.803271 762332 task_exit.go:204] [ 1014: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.803329 762332 task_exit.go:204] [ 1014: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.803499 762332 task_exit.go:204] [ 1014: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:35.803899 762332 task_exit.go:204] [ 1014: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.803965 762332 task_exit.go:204] [ 1014: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.804165 762332 task_exit.go:204] [ 1014: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.804334 762332 task_exit.go:204] [ 1014: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.804414 762332 task_exit.go:204] [ 1014: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.829391 762332 task_exit.go:204] [ 1014: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:35.829542 762332 task_exit.go:204] [ 1014: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.830025 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:35.831211 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:35.831390 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:35.832752 762332 task_exit.go:204] [ 1014: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:35.840623 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:35.841942 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.871593 762332 syscalls.go:262] [ 1019: 1019] Allocating stack with size of 8388608 bytes D0713 00:00:35.876123 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:35.876883 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:35.881821 762332 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:35.882074 762332 usertrap_amd64.go:106] [ 1019: 1019] Map a usertrap vma at 67000 D0713 00:00:35.883191 762332 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000bad740 1 D0713 00:00:35.883681 762332 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:35.886993 762332 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:35.887108 762332 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000bad740 2 D0713 00:00:35.887263 762332 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:35.890276 762332 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:35.890338 762332 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000bad740 3 D0713 00:00:35.890472 762332 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:35.915644 762332 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:35.915723 762332 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000bad740 4 D0713 00:00:35.915932 762332 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:35.919166 762332 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:35.919242 762332 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000bad740 5 D0713 00:00:35.919412 762332 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:35.919925 762332 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b214:sysno 13 D0713 00:00:35.920001 762332 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000bad740 6 D0713 00:00:35.920261 762332 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:35.948295 762332 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:35.948366 762332 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000bad740 7 D0713 00:00:35.948524 762332 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:35.950375 762332 usertrap_amd64.go:212] [ 1019: 1020] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:35.950456 762332 usertrap_amd64.go:122] [ 1019: 1020] Allocate a new trap: 0xc000bad740 8 D0713 00:00:35.950651 762332 usertrap_amd64.go:225] [ 1019: 1020] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:35.952206 762332 usertrap_amd64.go:212] [ 1019: 1020] Found the pattern at ip 46af76:sysno 35 D0713 00:00:35.952318 762332 usertrap_amd64.go:122] [ 1019: 1020] Allocate a new trap: 0xc000bad740 9 D0713 00:00:35.952496 762332 usertrap_amd64.go:225] [ 1019: 1020] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:35.955358 762332 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:35.955466 762332 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000bad740 10 D0713 00:00:35.955737 762332 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:35.959383 762332 usertrap_amd64.go:212] [ 1019: 1020] Found the pattern at ip 46b020:sysno 39 D0713 00:00:35.959486 762332 usertrap_amd64.go:122] [ 1019: 1020] Allocate a new trap: 0xc000bad740 11 D0713 00:00:35.960319 762332 usertrap_amd64.go:225] [ 1019: 1020] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:35.960894 762332 usertrap_amd64.go:212] [ 1019: 1020] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:35.960996 762332 usertrap_amd64.go:122] [ 1019: 1020] Allocate a new trap: 0xc000bad740 12 D0713 00:00:35.961826 762332 usertrap_amd64.go:225] [ 1019: 1020] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:35.962833 762332 task_signals.go:470] [ 1019: 1019] Notified of signal 23 D0713 00:00:35.963933 762332 task_signals.go:220] [ 1019: 1019] Signal 23: delivering to handler D0713 00:00:35.974092 762332 task_signals.go:470] [ 1019: 1019] Notified of signal 23 D0713 00:00:35.974386 762332 task_signals.go:220] [ 1019: 1019] Signal 23: delivering to handler D0713 00:00:35.986110 762332 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46af29:sysno 293 D0713 00:00:35.986213 762332 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000bad740 13 D0713 00:00:35.986428 762332 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:35.987058 762332 task_signals.go:470] [ 1019: 1019] Notified of signal 23 D0713 00:00:35.987611 762332 task_signals.go:220] [ 1019: 1019] Signal 23: delivering to handler D0713 00:00:35.988863 762332 task_signals.go:481] [ 1019: 1019] No task notified of signal 23 D0713 00:00:35.989129 762332 task_signals.go:220] [ 1019: 1019] Signal 23: delivering to handler D0713 00:00:35.991005 762332 task_signals.go:470] [ 1019: 1019] Notified of signal 23 D0713 00:00:35.991366 762332 task_signals.go:220] [ 1019: 1019] Signal 23: delivering to handler D0713 00:00:36.007362 762332 task_signals.go:470] [ 1019: 1019] Notified of signal 23 D0713 00:00:36.008853 762332 task_signals.go:220] [ 1019: 1019] Signal 23: delivering to handler D0713 00:00:36.018462 762332 usertrap_amd64.go:212] [ 1019: 1019] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:36.018543 762332 usertrap_amd64.go:122] [ 1019: 1019] Allocate a new trap: 0xc000bad740 14 D0713 00:00:36.018690 762332 usertrap_amd64.go:225] [ 1019: 1019] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:36.019141 762332 task_exit.go:204] [ 1019: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.019424 762332 task_signals.go:204] [ 1019: 1021] Signal 1019, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.019639 762332 task_signals.go:204] [ 1019: 1020] Signal 1019, PID: 1020, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.019735 762332 task_signals.go:204] [ 1019: 1022] Signal 1019, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.019836 762332 task_signals.go:204] [ 1019: 1023] Signal 1019, PID: 1023, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.020044 762332 task_exit.go:204] [ 1019: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.020327 762332 task_exit.go:204] [ 1019: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.020507 762332 task_exit.go:204] [ 1019: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.020927 762332 task_exit.go:204] [ 1019: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.021479 762332 task_exit.go:204] [ 1019: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.021559 762332 task_exit.go:204] [ 1019: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.022206 762332 task_exit.go:204] [ 1019: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.022343 762332 task_exit.go:204] [ 1019: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.022433 762332 task_exit.go:204] [ 1019: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.022728 762332 task_exit.go:204] [ 1019: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.022777 762332 task_exit.go:204] [ 1019: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.047238 762332 task_exit.go:204] [ 1019: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.047350 762332 task_exit.go:204] [ 1019: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.047591 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:36.047972 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:36.048046 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:36.048316 762332 task_exit.go:204] [ 1019: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead I0713 00:00:36.049778 762332 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0713 00:00:36.057444 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.057762 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:36.077486 762332 syscalls.go:262] [ 1024: 1024] Allocating stack with size of 8388608 bytes D0713 00:00:36.080747 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.081586 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:36.083117 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:36.083408 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:36.092711 762332 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:36.092885 762332 usertrap_amd64.go:106] [ 1024: 1024] Map a usertrap vma at 68000 D0713 00:00:36.093729 762332 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000d98420 1 D0713 00:00:36.094086 762332 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:36.096578 762332 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:36.096649 762332 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000d98420 2 D0713 00:00:36.096831 762332 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:36.100113 762332 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:36.100224 762332 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000d98420 3 D0713 00:00:36.100429 762332 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:36.124367 762332 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:36.124457 762332 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000d98420 4 D0713 00:00:36.124707 762332 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:36.128059 762332 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:36.128140 762332 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000d98420 5 D0713 00:00:36.128319 762332 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:36.128840 762332 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b214:sysno 13 D0713 00:00:36.128911 762332 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000d98420 6 D0713 00:00:36.129139 762332 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:36.150629 762332 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:36.150701 762332 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000d98420 7 D0713 00:00:36.150864 762332 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:36.152881 762332 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:36.153045 762332 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc000d98420 8 D0713 00:00:36.153337 762332 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:36.155257 762332 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46af76:sysno 35 D0713 00:00:36.155337 762332 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc000d98420 9 D0713 00:00:36.155542 762332 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:36.157056 762332 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:36.157121 762332 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000d98420 10 D0713 00:00:36.157387 762332 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:36.169570 762332 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46b020:sysno 39 D0713 00:00:36.169675 762332 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc000d98420 11 D0713 00:00:36.169904 762332 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:36.170474 762332 usertrap_amd64.go:212] [ 1024: 1025] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:36.170534 762332 usertrap_amd64.go:122] [ 1024: 1025] Allocate a new trap: 0xc000d98420 12 D0713 00:00:36.170726 762332 usertrap_amd64.go:225] [ 1024: 1025] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:36.172681 762332 task_signals.go:470] [ 1024: 1024] Notified of signal 23 D0713 00:00:36.173144 762332 task_signals.go:220] [ 1024: 1024] Signal 23: delivering to handler D0713 00:00:36.180711 762332 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46af29:sysno 293 D0713 00:00:36.180892 762332 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000d98420 13 D0713 00:00:36.181167 762332 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:36.188790 762332 task_signals.go:470] [ 1024: 1024] Notified of signal 23 D0713 00:00:36.190784 762332 task_signals.go:220] [ 1024: 1024] Signal 23: delivering to handler D0713 00:00:36.192594 762332 task_signals.go:470] [ 1024: 1024] Notified of signal 23 D0713 00:00:36.192773 762332 task_signals.go:220] [ 1024: 1024] Signal 23: delivering to handler I0713 00:00:36.207155 762332 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0713 00:00:36.207386 762332 usertrap_amd64.go:212] [ 1024: 1024] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:36.207437 762332 usertrap_amd64.go:122] [ 1024: 1024] Allocate a new trap: 0xc000d98420 14 D0713 00:00:36.207582 762332 usertrap_amd64.go:225] [ 1024: 1024] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:36.207978 762332 task_exit.go:204] [ 1024: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.208281 762332 task_signals.go:204] [ 1024: 1026] Signal 1024, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.208484 762332 task_signals.go:204] [ 1024: 1028] Signal 1024, PID: 1028, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.208423 762332 task_signals.go:204] [ 1024: 1025] Signal 1024, PID: 1025, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.208663 762332 task_signals.go:204] [ 1024: 1027] Signal 1024, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.208736 762332 task_exit.go:204] [ 1024: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.208896 762332 task_exit.go:204] [ 1024: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.209236 762332 task_exit.go:204] [ 1024: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.209872 762332 task_exit.go:204] [ 1024: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.210156 762332 task_exit.go:204] [ 1024: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.210896 762332 task_exit.go:204] [ 1024: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.210971 762332 task_exit.go:204] [ 1024: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.211208 762332 task_exit.go:204] [ 1024: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.211332 762332 task_exit.go:204] [ 1024: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.211702 762332 task_exit.go:204] [ 1024: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.211783 762332 task_exit.go:204] [ 1024: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.235125 762332 task_exit.go:204] [ 1024: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.235232 762332 task_exit.go:204] [ 1024: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.235447 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:36.235812 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:36.235899 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:36.235938 762332 task_exit.go:204] [ 1024: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.243949 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.246186 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:36.272311 762332 syscalls.go:262] [ 1029: 1029] Allocating stack with size of 8388608 bytes D0713 00:00:36.276005 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.276745 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:36.283913 762332 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:36.284151 762332 usertrap_amd64.go:106] [ 1029: 1029] Map a usertrap vma at 63000 D0713 00:00:36.285383 762332 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0015821b0 1 D0713 00:00:36.285876 762332 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:36.288812 762332 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:36.288908 762332 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0015821b0 2 D0713 00:00:36.289108 762332 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:36.292071 762332 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:36.292162 762332 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0015821b0 3 D0713 00:00:36.292357 762332 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:36.314668 762332 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:36.314760 762332 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0015821b0 4 D0713 00:00:36.314961 762332 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:36.318210 762332 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:36.318311 762332 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0015821b0 5 D0713 00:00:36.318524 762332 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:36.318998 762332 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b214:sysno 13 D0713 00:00:36.319062 762332 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0015821b0 6 D0713 00:00:36.319215 762332 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:36.338002 762332 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:36.338078 762332 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0015821b0 7 D0713 00:00:36.338197 762332 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:36.339775 762332 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:36.339894 762332 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0015821b0 8 D0713 00:00:36.340211 762332 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:36.343247 762332 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46af76:sysno 35 D0713 00:00:36.343394 762332 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0015821b0 9 D0713 00:00:36.344347 762332 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:36.345039 762332 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:36.345146 762332 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0015821b0 10 D0713 00:00:36.345443 762332 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:36.358453 762332 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b020:sysno 39 D0713 00:00:36.358560 762332 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0015821b0 11 D0713 00:00:36.359517 762332 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:36.360047 762332 usertrap_amd64.go:212] [ 1029: 1030] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:36.360122 762332 usertrap_amd64.go:122] [ 1029: 1030] Allocate a new trap: 0xc0015821b0 12 D0713 00:00:36.360307 762332 usertrap_amd64.go:225] [ 1029: 1030] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:36.360783 762332 task_signals.go:470] [ 1029: 1029] Notified of signal 23 D0713 00:00:36.361533 762332 task_signals.go:220] [ 1029: 1029] Signal 23: delivering to handler D0713 00:00:36.371889 762332 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46af29:sysno 293 D0713 00:00:36.371954 762332 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0015821b0 13 D0713 00:00:36.372087 762332 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:36.373144 762332 task_signals.go:470] [ 1029: 1029] Notified of signal 23 D0713 00:00:36.373421 762332 task_signals.go:220] [ 1029: 1029] Signal 23: delivering to handler D0713 00:00:36.387761 762332 task_signals.go:470] [ 1029: 1029] Notified of signal 23 D0713 00:00:36.390029 762332 task_signals.go:220] [ 1029: 1029] Signal 23: delivering to handler I0713 00:00:36.397087 762332 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0713 00:00:36.397360 762332 usertrap_amd64.go:212] [ 1029: 1029] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:36.397422 762332 usertrap_amd64.go:122] [ 1029: 1029] Allocate a new trap: 0xc0015821b0 14 D0713 00:00:36.397550 762332 usertrap_amd64.go:225] [ 1029: 1029] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:36.397917 762332 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.398457 762332 task_signals.go:204] [ 1029: 1031] Signal 1029, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.398423 762332 task_signals.go:204] [ 1029: 1032] Signal 1029, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.398451 762332 task_signals.go:204] [ 1029: 1034] Signal 1029, PID: 1034, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.398505 762332 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.398853 762332 task_exit.go:204] [ 1029: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.399042 762332 task_signals.go:204] [ 1029: 1033] Signal 1029, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.399183 762332 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.399444 762332 task_signals.go:204] [ 1029: 1030] Signal 1029, PID: 1030, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.399745 762332 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.400011 762332 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.400277 762332 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.400750 762332 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.400823 762332 task_exit.go:204] [ 1029: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.401874 762332 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.401958 762332 task_exit.go:204] [ 1029: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.402230 762332 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.402282 762332 task_exit.go:204] [ 1029: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.402410 762332 task_exit.go:204] [ 1029: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.402475 762332 task_exit.go:204] [ 1029: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.425811 762332 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.425924 762332 task_exit.go:204] [ 1029: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.426169 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:36.426470 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:36.426541 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:36.427086 762332 task_exit.go:204] [ 1029: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.434351 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.438278 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:36.455939 762332 syscalls.go:262] [ 1035: 1035] Allocating stack with size of 8388608 bytes D0713 00:00:36.458938 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.460437 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:36.466066 762332 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:36.466205 762332 usertrap_amd64.go:106] [ 1035: 1035] Map a usertrap vma at 6a000 D0713 00:00:36.467141 762332 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001582510 1 D0713 00:00:36.467509 762332 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:36.470141 762332 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:36.470220 762332 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001582510 2 D0713 00:00:36.470399 762332 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:36.474717 762332 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:36.474810 762332 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001582510 3 D0713 00:00:36.474930 762332 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:36.498022 762332 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:36.498129 762332 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001582510 4 D0713 00:00:36.498353 762332 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:36.501936 762332 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:36.502048 762332 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001582510 5 D0713 00:00:36.502252 762332 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:36.502770 762332 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b214:sysno 13 D0713 00:00:36.502840 762332 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001582510 6 D0713 00:00:36.503000 762332 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:36.526547 762332 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:36.526639 762332 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001582510 7 D0713 00:00:36.526776 762332 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:36.528728 762332 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:36.528841 762332 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc001582510 8 D0713 00:00:36.529117 762332 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:36.530922 762332 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46af76:sysno 35 D0713 00:00:36.530995 762332 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc001582510 9 D0713 00:00:36.531191 762332 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:36.532517 762332 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:36.532583 762332 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001582510 10 D0713 00:00:36.532771 762332 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:36.548691 762332 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b020:sysno 39 D0713 00:00:36.548787 762332 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc001582510 11 D0713 00:00:36.550532 762332 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:36.550920 762332 usertrap_amd64.go:212] [ 1035: 1036] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:36.550981 762332 usertrap_amd64.go:122] [ 1035: 1036] Allocate a new trap: 0xc001582510 12 D0713 00:00:36.551666 762332 usertrap_amd64.go:225] [ 1035: 1036] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:36.552161 762332 task_signals.go:470] [ 1035: 1035] Notified of signal 23 D0713 00:00:36.552383 762332 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler D0713 00:00:36.558895 762332 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46af29:sysno 293 D0713 00:00:36.558958 762332 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001582510 13 D0713 00:00:36.559110 762332 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:36.564010 762332 task_signals.go:470] [ 1035: 1035] Notified of signal 23 D0713 00:00:36.564315 762332 task_signals.go:179] [ 1035: 1035] Restarting syscall 202: interrupted by signal 23 D0713 00:00:36.564396 762332 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler D0713 00:00:36.577092 762332 task_signals.go:470] [ 1035: 1035] Notified of signal 23 D0713 00:00:36.577382 762332 task_signals.go:220] [ 1035: 1035] Signal 23: delivering to handler D0713 00:00:36.583114 762332 usertrap_amd64.go:212] [ 1035: 1035] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:36.583215 762332 usertrap_amd64.go:122] [ 1035: 1035] Allocate a new trap: 0xc001582510 14 D0713 00:00:36.583410 762332 usertrap_amd64.go:225] [ 1035: 1035] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:36.583907 762332 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.584265 762332 task_signals.go:204] [ 1035: 1039] Signal 1035, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.584337 762332 task_signals.go:204] [ 1035: 1038] Signal 1035, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.584511 762332 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.584739 762332 task_signals.go:204] [ 1035: 1040] Signal 1035, PID: 1040, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.584887 762332 task_signals.go:204] [ 1035: 1037] Signal 1035, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.584996 762332 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.585229 762332 task_signals.go:204] [ 1035: 1036] Signal 1035, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.585594 762332 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.585654 762332 task_exit.go:204] [ 1035: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.585868 762332 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.586138 762332 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.586189 762332 task_exit.go:204] [ 1035: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.586359 762332 task_exit.go:204] [ 1035: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.586715 762332 task_exit.go:204] [ 1035: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.586771 762332 task_exit.go:204] [ 1035: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.586924 762332 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.587190 762332 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.587695 762332 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.587812 762332 task_exit.go:204] [ 1035: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.609921 762332 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.610044 762332 task_exit.go:204] [ 1035: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.610313 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:36.610722 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:36.610817 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:36.610991 762332 task_exit.go:204] [ 1035: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.619480 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.620677 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:36.642231 762332 syscalls.go:262] [ 1041: 1041] Allocating stack with size of 8388608 bytes D0713 00:00:36.647213 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.648116 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:36.652528 762332 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:36.652832 762332 usertrap_amd64.go:106] [ 1041: 1041] Map a usertrap vma at 65000 D0713 00:00:36.654159 762332 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0008e2660 1 D0713 00:00:36.654514 762332 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:36.656603 762332 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:36.656663 762332 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0008e2660 2 D0713 00:00:36.656874 762332 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:36.659741 762332 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:36.659848 762332 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0008e2660 3 D0713 00:00:36.660043 762332 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:36.683562 762332 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:36.683658 762332 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0008e2660 4 D0713 00:00:36.683802 762332 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:36.686937 762332 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:36.687026 762332 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0008e2660 5 D0713 00:00:36.687229 762332 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:36.687682 762332 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b214:sysno 13 D0713 00:00:36.687753 762332 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0008e2660 6 D0713 00:00:36.687924 762332 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:36.708642 762332 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:36.708752 762332 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0008e2660 7 D0713 00:00:36.708972 762332 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:36.710822 762332 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:36.710976 762332 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0008e2660 8 D0713 00:00:36.711268 762332 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:36.713796 762332 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46af76:sysno 35 D0713 00:00:36.713875 762332 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0008e2660 9 D0713 00:00:36.714130 762332 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:36.714949 762332 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:36.715030 762332 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0008e2660 10 D0713 00:00:36.715927 762332 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:36.727913 762332 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46b020:sysno 39 D0713 00:00:36.728055 762332 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0008e2660 11 D0713 00:00:36.728835 762332 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:36.729308 762332 usertrap_amd64.go:212] [ 1041: 1042] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:36.729450 762332 usertrap_amd64.go:122] [ 1041: 1042] Allocate a new trap: 0xc0008e2660 12 D0713 00:00:36.729750 762332 usertrap_amd64.go:225] [ 1041: 1042] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:36.730296 762332 task_signals.go:470] [ 1041: 1041] Notified of signal 23 D0713 00:00:36.731481 762332 task_signals.go:220] [ 1041: 1041] Signal 23: delivering to handler D0713 00:00:36.738203 762332 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46af29:sysno 293 D0713 00:00:36.738444 762332 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0008e2660 13 D0713 00:00:36.738724 762332 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:36.745327 762332 task_signals.go:470] [ 1041: 1041] Notified of signal 23 D0713 00:00:36.747386 762332 task_signals.go:220] [ 1041: 1041] Signal 23: delivering to handler D0713 00:00:36.765043 762332 usertrap_amd64.go:212] [ 1041: 1041] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:36.765129 762332 usertrap_amd64.go:122] [ 1041: 1041] Allocate a new trap: 0xc0008e2660 14 D0713 00:00:36.765327 762332 usertrap_amd64.go:225] [ 1041: 1041] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:36.765912 762332 task_exit.go:204] [ 1041: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.766389 762332 task_signals.go:204] [ 1041: 1042] Signal 1041, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.766444 762332 task_signals.go:204] [ 1041: 1043] Signal 1041, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.766686 762332 task_signals.go:204] [ 1041: 1044] Signal 1041, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.766784 762332 task_exit.go:204] [ 1041: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.766971 762332 task_signals.go:204] [ 1041: 1045] Signal 1041, PID: 1045, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.767336 762332 task_exit.go:204] [ 1041: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.767540 762332 task_exit.go:204] [ 1041: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.767677 762332 task_exit.go:204] [ 1041: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.767939 762332 task_exit.go:204] [ 1041: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.768111 762332 task_exit.go:204] [ 1041: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.768203 762332 task_exit.go:204] [ 1041: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.769131 762332 task_exit.go:204] [ 1041: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.769269 762332 task_exit.go:204] [ 1041: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.769563 762332 task_exit.go:204] [ 1041: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.769626 762332 task_exit.go:204] [ 1041: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.790604 762332 task_exit.go:204] [ 1041: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.790703 762332 task_exit.go:204] [ 1041: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.790943 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:36.791369 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:36.791465 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:36.791845 762332 task_exit.go:204] [ 1041: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.799566 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.801616 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:36.822815 762332 syscalls.go:262] [ 1046: 1046] Allocating stack with size of 8388608 bytes D0713 00:00:36.826182 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.826872 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:36.830323 762332 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:36.830504 762332 usertrap_amd64.go:106] [ 1046: 1046] Map a usertrap vma at 64000 D0713 00:00:36.831608 762332 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc002a8ee70 1 D0713 00:00:36.831953 762332 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:36.834941 762332 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:36.835022 762332 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc002a8ee70 2 D0713 00:00:36.835239 762332 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:36.838041 762332 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:36.838093 762332 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc002a8ee70 3 D0713 00:00:36.838206 762332 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:36.861136 762332 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:36.861262 762332 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc002a8ee70 4 D0713 00:00:36.861436 762332 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:36.864817 762332 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:36.864915 762332 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc002a8ee70 5 D0713 00:00:36.865128 762332 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:36.865619 762332 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b214:sysno 13 D0713 00:00:36.865678 762332 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc002a8ee70 6 D0713 00:00:36.865836 762332 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:36.885723 762332 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:36.885861 762332 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc002a8ee70 7 D0713 00:00:36.886057 762332 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:36.888012 762332 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:36.888080 762332 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc002a8ee70 8 D0713 00:00:36.888338 762332 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:36.890552 762332 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46af76:sysno 35 D0713 00:00:36.890649 762332 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc002a8ee70 9 D0713 00:00:36.890852 762332 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:36.892343 762332 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:36.892449 762332 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc002a8ee70 10 D0713 00:00:36.892692 762332 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:36.907231 762332 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b020:sysno 39 D0713 00:00:36.907343 762332 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc002a8ee70 11 D0713 00:00:36.907500 762332 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:36.907943 762332 usertrap_amd64.go:212] [ 1046: 1047] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:36.908028 762332 usertrap_amd64.go:122] [ 1046: 1047] Allocate a new trap: 0xc002a8ee70 12 D0713 00:00:36.908653 762332 usertrap_amd64.go:225] [ 1046: 1047] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:36.909423 762332 task_signals.go:470] [ 1046: 1046] Notified of signal 23 D0713 00:00:36.909787 762332 task_signals.go:220] [ 1046: 1046] Signal 23: delivering to handler D0713 00:00:36.916776 762332 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46af29:sysno 293 D0713 00:00:36.916861 762332 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc002a8ee70 13 D0713 00:00:36.917040 762332 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:36.920573 762332 task_signals.go:470] [ 1046: 1046] Notified of signal 23 D0713 00:00:36.920740 762332 task_signals.go:220] [ 1046: 1046] Signal 23: delivering to handler D0713 00:00:36.934893 762332 task_signals.go:470] [ 1046: 1046] Notified of signal 23 D0713 00:00:36.935215 762332 task_signals.go:220] [ 1046: 1046] Signal 23: delivering to handler D0713 00:00:36.939610 762332 usertrap_amd64.go:212] [ 1046: 1046] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:36.939679 762332 usertrap_amd64.go:122] [ 1046: 1046] Allocate a new trap: 0xc002a8ee70 14 D0713 00:00:36.939805 762332 usertrap_amd64.go:225] [ 1046: 1046] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:36.940222 762332 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.940586 762332 task_signals.go:204] [ 1046: 1050] Signal 1046, PID: 1050, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.940690 762332 task_signals.go:204] [ 1046: 1048] Signal 1046, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.940745 762332 task_signals.go:204] [ 1046: 1051] Signal 1046, PID: 1051, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.940873 762332 task_signals.go:204] [ 1046: 1047] Signal 1046, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.941098 762332 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.941423 762332 task_signals.go:204] [ 1046: 1049] Signal 1046, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:36.941421 762332 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.941715 762332 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.941974 762332 task_exit.go:204] [ 1046: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.942265 762332 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.942666 762332 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.942764 762332 task_exit.go:204] [ 1046: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.943231 762332 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.943286 762332 task_exit.go:204] [ 1046: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.943472 762332 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:36.943926 762332 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.943985 762332 task_exit.go:204] [ 1046: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.945301 762332 task_exit.go:204] [ 1046: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.945400 762332 task_exit.go:204] [ 1046: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.966852 762332 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:36.966941 762332 task_exit.go:204] [ 1046: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.967167 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:36.967426 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:36.967498 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:36.967817 762332 task_exit.go:204] [ 1046: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:36.976258 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:36.977816 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:36.999491 762332 syscalls.go:262] [ 1052: 1052] Allocating stack with size of 8388608 bytes D0713 00:00:37.003303 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.003996 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:37.008533 762332 usertrap_amd64.go:212] [ 1052: 1052] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:37.008764 762332 usertrap_amd64.go:106] [ 1052: 1052] Map a usertrap vma at 61000 D0713 00:00:37.009697 762332 usertrap_amd64.go:122] [ 1052: 1052] Allocate a new trap: 0xc001582d20 1 D0713 00:00:37.010002 762332 usertrap_amd64.go:225] [ 1052: 1052] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:37.012421 762332 usertrap_amd64.go:212] [ 1052: 1052] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:37.012478 762332 usertrap_amd64.go:122] [ 1052: 1052] Allocate a new trap: 0xc001582d20 2 D0713 00:00:37.012617 762332 usertrap_amd64.go:225] [ 1052: 1052] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:37.016474 762332 usertrap_amd64.go:212] [ 1052: 1052] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:37.016633 762332 usertrap_amd64.go:122] [ 1052: 1052] Allocate a new trap: 0xc001582d20 3 D0713 00:00:37.016846 762332 usertrap_amd64.go:225] [ 1052: 1052] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:37.040526 762332 usertrap_amd64.go:212] [ 1052: 1052] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:37.040614 762332 usertrap_amd64.go:122] [ 1052: 1052] Allocate a new trap: 0xc001582d20 4 D0713 00:00:37.040810 762332 usertrap_amd64.go:225] [ 1052: 1052] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:37.044384 762332 usertrap_amd64.go:212] [ 1052: 1052] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:37.044460 762332 usertrap_amd64.go:122] [ 1052: 1052] Allocate a new trap: 0xc001582d20 5 D0713 00:00:37.044609 762332 usertrap_amd64.go:225] [ 1052: 1052] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:37.045160 762332 usertrap_amd64.go:212] [ 1052: 1052] Found the pattern at ip 46b214:sysno 13 D0713 00:00:37.045231 762332 usertrap_amd64.go:122] [ 1052: 1052] Allocate a new trap: 0xc001582d20 6 D0713 00:00:37.045388 762332 usertrap_amd64.go:225] [ 1052: 1052] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:37.065285 762332 usertrap_amd64.go:212] [ 1052: 1052] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:37.065394 762332 usertrap_amd64.go:122] [ 1052: 1052] Allocate a new trap: 0xc001582d20 7 D0713 00:00:37.065542 762332 usertrap_amd64.go:225] [ 1052: 1052] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:37.067251 762332 usertrap_amd64.go:212] [ 1052: 1053] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:37.067330 762332 usertrap_amd64.go:122] [ 1052: 1053] Allocate a new trap: 0xc001582d20 8 D0713 00:00:37.067616 762332 usertrap_amd64.go:225] [ 1052: 1053] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:37.069920 762332 usertrap_amd64.go:212] [ 1052: 1053] Found the pattern at ip 46af76:sysno 35 D0713 00:00:37.070002 762332 usertrap_amd64.go:122] [ 1052: 1053] Allocate a new trap: 0xc001582d20 9 D0713 00:00:37.070981 762332 usertrap_amd64.go:225] [ 1052: 1053] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:37.071748 762332 usertrap_amd64.go:212] [ 1052: 1052] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:37.071839 762332 usertrap_amd64.go:122] [ 1052: 1052] Allocate a new trap: 0xc001582d20 10 D0713 00:00:37.072110 762332 usertrap_amd64.go:225] [ 1052: 1052] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:37.087586 762332 usertrap_amd64.go:212] [ 1052: 1053] Found the pattern at ip 46b020:sysno 39 D0713 00:00:37.087686 762332 usertrap_amd64.go:122] [ 1052: 1053] Allocate a new trap: 0xc001582d20 11 D0713 00:00:37.087913 762332 usertrap_amd64.go:225] [ 1052: 1053] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:37.088493 762332 usertrap_amd64.go:212] [ 1052: 1053] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:37.088546 762332 usertrap_amd64.go:122] [ 1052: 1053] Allocate a new trap: 0xc001582d20 12 D0713 00:00:37.088675 762332 usertrap_amd64.go:225] [ 1052: 1053] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:37.089187 762332 task_signals.go:470] [ 1052: 1052] Notified of signal 23 D0713 00:00:37.090109 762332 task_signals.go:220] [ 1052: 1052] Signal 23: delivering to handler D0713 00:00:37.096286 762332 usertrap_amd64.go:212] [ 1052: 1052] Found the pattern at ip 46af29:sysno 293 D0713 00:00:37.096387 762332 usertrap_amd64.go:122] [ 1052: 1052] Allocate a new trap: 0xc001582d20 13 D0713 00:00:37.096552 762332 usertrap_amd64.go:225] [ 1052: 1052] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:37.103376 762332 task_signals.go:470] [ 1052: 1052] Notified of signal 23 D0713 00:00:37.105353 762332 task_signals.go:220] [ 1052: 1052] Signal 23: delivering to handler D0713 00:00:37.113320 762332 usertrap_amd64.go:212] [ 1052: 1052] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:37.113416 762332 usertrap_amd64.go:122] [ 1052: 1052] Allocate a new trap: 0xc001582d20 14 D0713 00:00:37.114399 762332 usertrap_amd64.go:225] [ 1052: 1052] Apply the binary patch addr 46b6e0 trap addr 61460 ([184 24 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:37.121748 762332 usertrap_amd64.go:212] [ 1052: 1052] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:37.121839 762332 usertrap_amd64.go:122] [ 1052: 1052] Allocate a new trap: 0xc001582d20 15 D0713 00:00:37.122030 762332 usertrap_amd64.go:225] [ 1052: 1052] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 00:00:37.122563 762332 task_exit.go:204] [ 1052: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.123156 762332 task_signals.go:204] [ 1052: 1056] Signal 1052, PID: 1056, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.123272 762332 task_signals.go:204] [ 1052: 1053] Signal 1052, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.123428 762332 task_exit.go:204] [ 1052: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.123438 762332 task_signals.go:204] [ 1052: 1057] Signal 1052, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.123762 762332 task_exit.go:204] [ 1052: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.124064 762332 task_signals.go:204] [ 1052: 1055] Signal 1052, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.124205 762332 task_signals.go:204] [ 1052: 1054] Signal 1052, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.124476 762332 task_exit.go:204] [ 1052: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.125187 762332 task_exit.go:204] [ 1052: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.125603 762332 task_exit.go:204] [ 1052: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.125869 762332 task_exit.go:204] [ 1052: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.126015 762332 task_exit.go:204] [ 1052: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.126086 762332 task_exit.go:204] [ 1052: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.127118 762332 task_exit.go:204] [ 1052: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.127218 762332 task_exit.go:204] [ 1052: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.127538 762332 task_exit.go:204] [ 1052: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.127639 762332 task_exit.go:204] [ 1052: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.127891 762332 task_exit.go:204] [ 1052: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.127978 762332 task_exit.go:204] [ 1052: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.151941 762332 task_exit.go:204] [ 1052: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.152062 762332 task_exit.go:204] [ 1052: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.152311 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:37.152825 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:37.152935 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:37.153221 762332 task_exit.go:204] [ 1052: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.161407 762332 task_stop.go:118] [ 6: 17] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.163556 762332 task_signals.go:481] [ 6: 17] No task notified of signal 23 D0713 00:00:37.181352 762332 syscalls.go:262] [ 1058: 1058] Allocating stack with size of 8388608 bytes D0713 00:00:37.184641 762332 task_stop.go:138] [ 6: 17] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.185334 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:37.189540 762332 task_signals.go:470] [ 6: 17] Notified of signal 23 D0713 00:00:37.189876 762332 task_signals.go:220] [ 6: 17] Signal 23: delivering to handler D0713 00:00:37.190927 762332 usertrap_amd64.go:212] [ 1058: 1058] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:37.191119 762332 usertrap_amd64.go:106] [ 1058: 1058] Map a usertrap vma at 69000 D0713 00:00:37.192208 762332 usertrap_amd64.go:122] [ 1058: 1058] Allocate a new trap: 0xc000d98930 1 D0713 00:00:37.192597 762332 usertrap_amd64.go:225] [ 1058: 1058] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:37.194898 762332 usertrap_amd64.go:212] [ 1058: 1058] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:37.194980 762332 usertrap_amd64.go:122] [ 1058: 1058] Allocate a new trap: 0xc000d98930 2 D0713 00:00:37.195139 762332 usertrap_amd64.go:225] [ 1058: 1058] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:37.198224 762332 usertrap_amd64.go:212] [ 1058: 1058] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:37.198278 762332 usertrap_amd64.go:122] [ 1058: 1058] Allocate a new trap: 0xc000d98930 3 D0713 00:00:37.198412 762332 usertrap_amd64.go:225] [ 1058: 1058] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:37.221163 762332 usertrap_amd64.go:212] [ 1058: 1058] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:37.221291 762332 usertrap_amd64.go:122] [ 1058: 1058] Allocate a new trap: 0xc000d98930 4 D0713 00:00:37.221528 762332 usertrap_amd64.go:225] [ 1058: 1058] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:37.225137 762332 usertrap_amd64.go:212] [ 1058: 1058] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:37.225300 762332 usertrap_amd64.go:122] [ 1058: 1058] Allocate a new trap: 0xc000d98930 5 D0713 00:00:37.225522 762332 usertrap_amd64.go:225] [ 1058: 1058] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:37.226102 762332 usertrap_amd64.go:212] [ 1058: 1058] Found the pattern at ip 46b214:sysno 13 D0713 00:00:37.226177 762332 usertrap_amd64.go:122] [ 1058: 1058] Allocate a new trap: 0xc000d98930 6 D0713 00:00:37.226326 762332 usertrap_amd64.go:225] [ 1058: 1058] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:37.246939 762332 usertrap_amd64.go:212] [ 1058: 1058] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:37.247015 762332 usertrap_amd64.go:122] [ 1058: 1058] Allocate a new trap: 0xc000d98930 7 D0713 00:00:37.247196 762332 usertrap_amd64.go:225] [ 1058: 1058] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:37.248816 762332 usertrap_amd64.go:212] [ 1058: 1059] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:37.248905 762332 usertrap_amd64.go:122] [ 1058: 1059] Allocate a new trap: 0xc000d98930 8 D0713 00:00:37.249111 762332 usertrap_amd64.go:225] [ 1058: 1059] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:37.251896 762332 usertrap_amd64.go:212] [ 1058: 1059] Found the pattern at ip 46af76:sysno 35 D0713 00:00:37.251976 762332 usertrap_amd64.go:122] [ 1058: 1059] Allocate a new trap: 0xc000d98930 9 D0713 00:00:37.252813 762332 usertrap_amd64.go:225] [ 1058: 1059] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:37.253457 762332 usertrap_amd64.go:212] [ 1058: 1058] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:37.253543 762332 usertrap_amd64.go:122] [ 1058: 1058] Allocate a new trap: 0xc000d98930 10 D0713 00:00:37.253904 762332 usertrap_amd64.go:225] [ 1058: 1058] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:37.267494 762332 usertrap_amd64.go:212] [ 1058: 1059] Found the pattern at ip 46b020:sysno 39 D0713 00:00:37.267607 762332 usertrap_amd64.go:122] [ 1058: 1059] Allocate a new trap: 0xc000d98930 11 D0713 00:00:37.268181 762332 usertrap_amd64.go:225] [ 1058: 1059] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:37.268506 762332 usertrap_amd64.go:212] [ 1058: 1059] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:37.268554 762332 usertrap_amd64.go:122] [ 1058: 1059] Allocate a new trap: 0xc000d98930 12 D0713 00:00:37.268658 762332 usertrap_amd64.go:225] [ 1058: 1059] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:37.269103 762332 task_signals.go:470] [ 1058: 1058] Notified of signal 23 D0713 00:00:37.269362 762332 task_signals.go:220] [ 1058: 1058] Signal 23: delivering to handler D0713 00:00:37.271148 762332 task_signals.go:470] [ 1058: 1058] Notified of signal 23 D0713 00:00:37.271536 762332 task_signals.go:220] [ 1058: 1058] Signal 23: delivering to handler D0713 00:00:37.272537 762332 task_signals.go:470] [ 1058: 1058] Notified of signal 23 D0713 00:00:37.272680 762332 task_signals.go:220] [ 1058: 1058] Signal 23: delivering to handler D0713 00:00:37.278981 762332 usertrap_amd64.go:212] [ 1058: 1058] Found the pattern at ip 46af29:sysno 293 D0713 00:00:37.279065 762332 usertrap_amd64.go:122] [ 1058: 1058] Allocate a new trap: 0xc000d98930 13 D0713 00:00:37.279230 762332 usertrap_amd64.go:225] [ 1058: 1058] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:37.285259 762332 task_signals.go:470] [ 1058: 1058] Notified of signal 23 D0713 00:00:37.285607 762332 task_signals.go:220] [ 1058: 1058] Signal 23: delivering to handler D0713 00:00:37.301986 762332 task_signals.go:470] [ 1058: 1058] Notified of signal 23 D0713 00:00:37.304379 762332 task_signals.go:220] [ 1058: 1058] Signal 23: delivering to handler D0713 00:00:37.311340 762332 usertrap_amd64.go:212] [ 1058: 1058] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:37.311457 762332 usertrap_amd64.go:122] [ 1058: 1058] Allocate a new trap: 0xc000d98930 14 D0713 00:00:37.311626 762332 usertrap_amd64.go:225] [ 1058: 1058] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:37.312168 762332 task_exit.go:204] [ 1058: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.312504 762332 task_signals.go:204] [ 1058: 1061] Signal 1058, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.312508 762332 task_signals.go:204] [ 1058: 1063] Signal 1058, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.312740 762332 task_signals.go:204] [ 1058: 1059] Signal 1058, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.312850 762332 task_exit.go:204] [ 1058: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.313188 762332 task_signals.go:204] [ 1058: 1062] Signal 1058, PID: 1062, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.313254 762332 task_signals.go:204] [ 1058: 1060] Signal 1058, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.313427 762332 task_exit.go:204] [ 1058: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.313588 762332 task_exit.go:204] [ 1058: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.313895 762332 task_exit.go:204] [ 1058: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.314105 762332 task_exit.go:204] [ 1058: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.315149 762332 task_exit.go:204] [ 1058: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.315379 762332 task_exit.go:204] [ 1058: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.315460 762332 task_exit.go:204] [ 1058: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.315707 762332 task_exit.go:204] [ 1058: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.315770 762332 task_exit.go:204] [ 1058: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.315938 762332 task_exit.go:204] [ 1058: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.316035 762332 task_exit.go:204] [ 1058: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.316251 762332 task_exit.go:204] [ 1058: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.316311 762332 task_exit.go:204] [ 1058: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.336515 762332 task_exit.go:204] [ 1058: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.336605 762332 task_exit.go:204] [ 1058: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.336830 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:37.337267 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:37.337339 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:37.338026 762332 task_exit.go:204] [ 1058: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.345409 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.348368 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:37.367313 762332 syscalls.go:262] [ 1064: 1064] Allocating stack with size of 8388608 bytes D0713 00:00:37.370675 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.371209 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:37.375288 762332 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:37.375529 762332 usertrap_amd64.go:106] [ 1064: 1064] Map a usertrap vma at 69000 D0713 00:00:37.377228 762332 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc002888d50 1 D0713 00:00:37.377623 762332 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:37.380022 762332 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:37.380094 762332 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc002888d50 2 D0713 00:00:37.380358 762332 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:37.383435 762332 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:37.383513 762332 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc002888d50 3 D0713 00:00:37.383718 762332 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:37.408041 762332 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:37.408136 762332 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc002888d50 4 D0713 00:00:37.408292 762332 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:37.411768 762332 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:37.411846 762332 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc002888d50 5 D0713 00:00:37.412019 762332 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:37.412517 762332 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b214:sysno 13 D0713 00:00:37.412567 762332 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc002888d50 6 D0713 00:00:37.412706 762332 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:37.434217 762332 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:37.434306 762332 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc002888d50 7 D0713 00:00:37.434484 762332 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:37.436380 762332 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:37.436491 762332 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc002888d50 8 D0713 00:00:37.436719 762332 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:37.438246 762332 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46af76:sysno 35 D0713 00:00:37.438337 762332 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc002888d50 9 D0713 00:00:37.438525 762332 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:37.440056 762332 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:37.440203 762332 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc002888d50 10 D0713 00:00:37.440448 762332 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:37.457125 762332 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46b020:sysno 39 D0713 00:00:37.457238 762332 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc002888d50 11 D0713 00:00:37.457463 762332 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:37.457988 762332 usertrap_amd64.go:212] [ 1064: 1065] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:37.458070 762332 usertrap_amd64.go:122] [ 1064: 1065] Allocate a new trap: 0xc002888d50 12 D0713 00:00:37.458281 762332 usertrap_amd64.go:225] [ 1064: 1065] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:37.458973 762332 task_signals.go:470] [ 1064: 1064] Notified of signal 23 D0713 00:00:37.459500 762332 task_signals.go:220] [ 1064: 1064] Signal 23: delivering to handler D0713 00:00:37.470376 762332 task_signals.go:470] [ 1064: 1064] Notified of signal 23 D0713 00:00:37.473701 762332 task_signals.go:220] [ 1064: 1064] Signal 23: delivering to handler D0713 00:00:37.477516 762332 task_signals.go:470] [ 1064: 1064] Notified of signal 23 D0713 00:00:37.477836 762332 task_signals.go:220] [ 1064: 1064] Signal 23: delivering to handler D0713 00:00:37.486578 762332 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46af29:sysno 293 D0713 00:00:37.486641 762332 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc002888d50 13 D0713 00:00:37.486808 762332 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:37.497552 762332 task_signals.go:470] [ 1064: 1064] Notified of signal 23 D0713 00:00:37.498088 762332 task_signals.go:220] [ 1064: 1064] Signal 23: delivering to handler D0713 00:00:37.508693 762332 usertrap_amd64.go:212] [ 1064: 1064] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:37.508797 762332 usertrap_amd64.go:122] [ 1064: 1064] Allocate a new trap: 0xc002888d50 14 D0713 00:00:37.508992 762332 usertrap_amd64.go:225] [ 1064: 1064] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:37.509514 762332 task_exit.go:204] [ 1064: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.509980 762332 task_signals.go:204] [ 1064: 1067] Signal 1064, PID: 1067, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.509976 762332 task_signals.go:204] [ 1064: 1065] Signal 1064, PID: 1065, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.510108 762332 task_signals.go:204] [ 1064: 1066] Signal 1064, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.510276 762332 task_signals.go:204] [ 1064: 1068] Signal 1064, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.510522 762332 task_exit.go:204] [ 1064: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.510821 762332 task_exit.go:204] [ 1064: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.510833 762332 task_signals.go:204] [ 1064: 1069] Signal 1064, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.510962 762332 task_exit.go:204] [ 1064: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.511147 762332 task_exit.go:204] [ 1064: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.511302 762332 task_exit.go:204] [ 1064: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.511638 762332 task_exit.go:204] [ 1064: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.512608 762332 task_exit.go:204] [ 1064: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.512703 762332 task_exit.go:204] [ 1064: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.513181 762332 task_exit.go:204] [ 1064: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.513279 762332 task_exit.go:204] [ 1064: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.513556 762332 task_exit.go:204] [ 1064: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.513618 762332 task_exit.go:204] [ 1064: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.513892 762332 task_exit.go:204] [ 1064: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.513987 762332 task_exit.go:204] [ 1064: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.538797 762332 task_exit.go:204] [ 1064: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.538915 762332 task_exit.go:204] [ 1064: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.539125 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:37.539739 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:37.539795 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:37.539831 762332 task_exit.go:204] [ 1064: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.546687 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.550061 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:37.569378 762332 syscalls.go:262] [ 1070: 1070] Allocating stack with size of 8388608 bytes D0713 00:00:37.573239 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.573768 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:37.583849 762332 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:37.584394 762332 usertrap_amd64.go:106] [ 1070: 1070] Map a usertrap vma at 66000 D0713 00:00:37.585609 762332 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0008e2e10 1 D0713 00:00:37.585995 762332 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:37.588387 762332 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:37.588464 762332 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0008e2e10 2 D0713 00:00:37.588578 762332 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:37.591566 762332 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:37.591657 762332 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0008e2e10 3 D0713 00:00:37.591799 762332 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:37.614748 762332 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:37.614834 762332 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0008e2e10 4 D0713 00:00:37.614959 762332 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:37.617950 762332 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:37.618052 762332 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0008e2e10 5 D0713 00:00:37.618266 762332 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:37.618706 762332 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b214:sysno 13 D0713 00:00:37.618762 762332 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0008e2e10 6 D0713 00:00:37.618930 762332 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:37.637749 762332 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:37.637821 762332 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0008e2e10 7 D0713 00:00:37.637947 762332 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:37.639850 762332 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:37.639977 762332 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc0008e2e10 8 D0713 00:00:37.640206 762332 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:37.643312 762332 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:37.643413 762332 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0008e2e10 9 D0713 00:00:37.644210 762332 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:37.644748 762332 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46af76:sysno 35 D0713 00:00:37.644854 762332 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc0008e2e10 10 D0713 00:00:37.645168 762332 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:37.658752 762332 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46b020:sysno 39 D0713 00:00:37.658854 762332 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc0008e2e10 11 D0713 00:00:37.659015 762332 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:37.659652 762332 usertrap_amd64.go:212] [ 1070: 1071] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:37.659736 762332 usertrap_amd64.go:122] [ 1070: 1071] Allocate a new trap: 0xc0008e2e10 12 D0713 00:00:37.659929 762332 usertrap_amd64.go:225] [ 1070: 1071] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:37.660486 762332 task_signals.go:470] [ 1070: 1070] Notified of signal 23 D0713 00:00:37.661307 762332 task_signals.go:220] [ 1070: 1070] Signal 23: delivering to handler D0713 00:00:37.673027 762332 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46af29:sysno 293 D0713 00:00:37.673084 762332 task_signals.go:470] [ 1070: 1070] Notified of signal 23 D0713 00:00:37.673140 762332 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0008e2e10 13 D0713 00:00:37.673356 762332 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:37.673691 762332 task_signals.go:220] [ 1070: 1070] Signal 23: delivering to handler D0713 00:00:37.675135 762332 task_signals.go:470] [ 1070: 1070] Notified of signal 23 D0713 00:00:37.675555 762332 task_signals.go:220] [ 1070: 1070] Signal 23: delivering to handler D0713 00:00:37.691811 762332 task_signals.go:470] [ 1070: 1070] Notified of signal 23 D0713 00:00:37.692274 762332 task_signals.go:220] [ 1070: 1070] Signal 23: delivering to handler D0713 00:00:37.699021 762332 usertrap_amd64.go:212] [ 1070: 1070] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:37.699121 762332 usertrap_amd64.go:122] [ 1070: 1070] Allocate a new trap: 0xc0008e2e10 14 D0713 00:00:37.699242 762332 usertrap_amd64.go:225] [ 1070: 1070] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:37.699611 762332 task_exit.go:204] [ 1070: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.700044 762332 task_signals.go:204] [ 1070: 1072] Signal 1070, PID: 1072, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.700283 762332 task_signals.go:204] [ 1070: 1071] Signal 1070, PID: 1071, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.700285 762332 task_signals.go:204] [ 1070: 1075] Signal 1070, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.700500 762332 task_signals.go:204] [ 1070: 1074] Signal 1070, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.700521 762332 task_signals.go:204] [ 1070: 1073] Signal 1070, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.700570 762332 task_exit.go:204] [ 1070: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.700714 762332 task_exit.go:204] [ 1070: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.701267 762332 task_exit.go:204] [ 1070: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.701343 762332 task_exit.go:204] [ 1070: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.701551 762332 task_exit.go:204] [ 1070: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.701808 762332 task_exit.go:204] [ 1070: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.702040 762332 task_exit.go:204] [ 1070: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.702220 762332 task_exit.go:204] [ 1070: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.702952 762332 task_exit.go:204] [ 1070: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.703033 762332 task_exit.go:204] [ 1070: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.703237 762332 task_exit.go:204] [ 1070: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.703281 762332 task_exit.go:204] [ 1070: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.703566 762332 task_exit.go:204] [ 1070: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.703609 762332 task_exit.go:204] [ 1070: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.726260 762332 task_exit.go:204] [ 1070: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.726481 762332 task_exit.go:204] [ 1070: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.726844 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:37.727182 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:37.727335 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:37.727502 762332 task_exit.go:204] [ 1070: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.734957 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.737906 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:37.754289 762332 syscalls.go:262] [ 1076: 1076] Allocating stack with size of 8388608 bytes D0713 00:00:37.757802 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.758310 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:37.762887 762332 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:37.763027 762332 usertrap_amd64.go:106] [ 1076: 1076] Map a usertrap vma at 66000 D0713 00:00:37.764116 762332 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000993020 1 D0713 00:00:37.764793 762332 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:37.767710 762332 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:37.767840 762332 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000993020 2 D0713 00:00:37.768092 762332 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:37.771599 762332 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:37.771694 762332 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000993020 3 D0713 00:00:37.771830 762332 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:37.794522 762332 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:37.794622 762332 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000993020 4 D0713 00:00:37.794746 762332 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:37.797564 762332 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:37.797622 762332 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000993020 5 D0713 00:00:37.797741 762332 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:37.798085 762332 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b214:sysno 13 D0713 00:00:37.798127 762332 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000993020 6 D0713 00:00:37.798298 762332 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:37.819412 762332 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:37.819532 762332 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000993020 7 D0713 00:00:37.819724 762332 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:37.821664 762332 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:37.821834 762332 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc000993020 8 D0713 00:00:37.822047 762332 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:37.824170 762332 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46af76:sysno 35 D0713 00:00:37.824261 762332 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc000993020 9 D0713 00:00:37.824458 762332 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:37.825755 762332 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:37.825863 762332 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000993020 10 D0713 00:00:37.826140 762332 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:37.838800 762332 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b020:sysno 39 D0713 00:00:37.838911 762332 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc000993020 11 D0713 00:00:37.839141 762332 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:37.840384 762332 usertrap_amd64.go:212] [ 1076: 1077] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:37.840487 762332 usertrap_amd64.go:122] [ 1076: 1077] Allocate a new trap: 0xc000993020 12 D0713 00:00:37.840781 762332 usertrap_amd64.go:225] [ 1076: 1077] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:37.841440 762332 task_signals.go:470] [ 1076: 1076] Notified of signal 23 D0713 00:00:37.843758 762332 task_signals.go:220] [ 1076: 1076] Signal 23: delivering to handler D0713 00:00:37.855013 762332 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46af29:sysno 293 D0713 00:00:37.855102 762332 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000993020 13 D0713 00:00:37.855001 762332 task_signals.go:470] [ 1076: 1076] Notified of signal 23 D0713 00:00:37.855261 762332 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:37.855501 762332 task_signals.go:220] [ 1076: 1076] Signal 23: delivering to handler D0713 00:00:37.856423 762332 task_signals.go:470] [ 1076: 1076] Notified of signal 23 D0713 00:00:37.856802 762332 task_signals.go:220] [ 1076: 1076] Signal 23: delivering to handler D0713 00:00:37.858063 762332 task_signals.go:470] [ 1076: 1076] Notified of signal 23 D0713 00:00:37.858377 762332 task_signals.go:220] [ 1076: 1076] Signal 23: delivering to handler D0713 00:00:37.874848 762332 task_signals.go:470] [ 1076: 1076] Notified of signal 23 D0713 00:00:37.875165 762332 task_signals.go:220] [ 1076: 1076] Signal 23: delivering to handler I0713 00:00:37.890445 762332 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0713 00:00:37.890687 762332 usertrap_amd64.go:212] [ 1076: 1076] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:37.890758 762332 usertrap_amd64.go:122] [ 1076: 1076] Allocate a new trap: 0xc000993020 14 D0713 00:00:37.890935 762332 usertrap_amd64.go:225] [ 1076: 1076] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:37.891369 762332 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.891831 762332 task_signals.go:204] [ 1076: 1077] Signal 1076, PID: 1077, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.891921 762332 task_signals.go:204] [ 1076: 1080] Signal 1076, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.891970 762332 task_signals.go:204] [ 1076: 1078] Signal 1076, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.892129 762332 task_signals.go:204] [ 1076: 1079] Signal 1076, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:37.892162 762332 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.892462 762332 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.893164 762332 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.893360 762332 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.893582 762332 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:37.894061 762332 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.894154 762332 task_exit.go:204] [ 1076: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.894443 762332 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.894513 762332 task_exit.go:204] [ 1076: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.895022 762332 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.895108 762332 task_exit.go:204] [ 1076: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.919141 762332 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:37.919288 762332 task_exit.go:204] [ 1076: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.919567 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:37.919948 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:37.920050 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:37.920349 762332 task_exit.go:204] [ 1076: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:37.928976 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.931006 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:37.947487 762332 syscalls.go:262] [ 1081: 1081] Allocating stack with size of 8388608 bytes D0713 00:00:37.951144 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:37.951775 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:37.955659 762332 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:37.955854 762332 usertrap_amd64.go:106] [ 1081: 1081] Map a usertrap vma at 63000 D0713 00:00:37.956626 762332 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002a8f620 1 D0713 00:00:37.956987 762332 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:37.958990 762332 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:37.959057 762332 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002a8f620 2 D0713 00:00:37.959186 762332 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:37.962171 762332 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:37.962252 762332 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002a8f620 3 D0713 00:00:37.962443 762332 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:37.988216 762332 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:37.988308 762332 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002a8f620 4 D0713 00:00:37.988528 762332 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:37.994748 762332 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:37.994906 762332 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002a8f620 5 D0713 00:00:37.995101 762332 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:37.995684 762332 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b214:sysno 13 D0713 00:00:37.995749 762332 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002a8f620 6 D0713 00:00:37.995932 762332 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:38.024041 762332 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:38.024158 762332 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002a8f620 7 D0713 00:00:38.024380 762332 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:38.026354 762332 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:38.026463 762332 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc002a8f620 8 D0713 00:00:38.026618 762332 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:38.027985 762332 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46af76:sysno 35 D0713 00:00:38.028085 762332 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc002a8f620 9 D0713 00:00:38.028282 762332 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:38.030722 762332 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:38.030805 762332 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002a8f620 10 D0713 00:00:38.030992 762332 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:38.043849 762332 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46b020:sysno 39 D0713 00:00:38.043946 762332 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc002a8f620 11 D0713 00:00:38.044100 762332 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:38.044544 762332 usertrap_amd64.go:212] [ 1081: 1082] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:38.044614 762332 usertrap_amd64.go:122] [ 1081: 1082] Allocate a new trap: 0xc002a8f620 12 D0713 00:00:38.044801 762332 usertrap_amd64.go:225] [ 1081: 1082] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:38.045336 762332 task_signals.go:470] [ 1081: 1081] Notified of signal 23 D0713 00:00:38.045576 762332 task_signals.go:179] [ 1081: 1081] Restarting syscall 202: interrupted by signal 23 D0713 00:00:38.045693 762332 task_signals.go:220] [ 1081: 1081] Signal 23: delivering to handler D0713 00:00:38.059155 762332 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46af29:sysno 293 D0713 00:00:38.059253 762332 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002a8f620 13 D0713 00:00:38.059397 762332 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:38.059997 762332 task_signals.go:470] [ 1081: 1081] Notified of signal 23 D0713 00:00:38.060618 762332 task_signals.go:220] [ 1081: 1081] Signal 23: delivering to handler D0713 00:00:38.076368 762332 task_signals.go:470] [ 1081: 1081] Notified of signal 23 D0713 00:00:38.076812 762332 task_signals.go:220] [ 1081: 1081] Signal 23: delivering to handler I0713 00:00:38.090369 762332 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0713 00:00:38.090631 762332 usertrap_amd64.go:212] [ 1081: 1081] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:38.090691 762332 usertrap_amd64.go:122] [ 1081: 1081] Allocate a new trap: 0xc002a8f620 14 D0713 00:00:38.090803 762332 usertrap_amd64.go:225] [ 1081: 1081] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:38.091281 762332 task_exit.go:204] [ 1081: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.091638 762332 task_signals.go:204] [ 1081: 1082] Signal 1081, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.091920 762332 task_signals.go:204] [ 1081: 1083] Signal 1081, PID: 1083, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.092008 762332 task_exit.go:204] [ 1081: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.092242 762332 task_signals.go:204] [ 1081: 1084] Signal 1081, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.092337 762332 task_signals.go:204] [ 1081: 1085] Signal 1081, PID: 1085, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.092416 762332 task_exit.go:204] [ 1081: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.092737 762332 task_exit.go:204] [ 1081: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.093181 762332 task_exit.go:204] [ 1081: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.093237 762332 task_exit.go:204] [ 1081: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.093415 762332 task_exit.go:204] [ 1081: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.093619 762332 task_exit.go:204] [ 1081: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.093668 762332 task_exit.go:204] [ 1081: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.094023 762332 task_exit.go:204] [ 1081: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.094092 762332 task_exit.go:204] [ 1081: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.094222 762332 task_exit.go:204] [ 1081: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.117803 762332 task_exit.go:204] [ 1081: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.117941 762332 task_exit.go:204] [ 1081: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.118183 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:38.118854 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:38.118958 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:38.119171 762332 task_exit.go:204] [ 1081: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.127345 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.129862 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 executing program D0713 00:00:38.151951 762332 syscalls.go:262] [ 1086: 1086] Allocating stack with size of 8388608 bytes D0713 00:00:38.155136 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.155761 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:38.158992 762332 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:38.159181 762332 usertrap_amd64.go:106] [ 1086: 1086] Map a usertrap vma at 65000 D0713 00:00:38.160076 762332 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc0028895c0 1 D0713 00:00:38.160344 762332 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:38.162428 762332 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:38.162496 762332 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc0028895c0 2 D0713 00:00:38.162638 762332 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:38.165545 762332 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:38.165609 762332 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc0028895c0 3 D0713 00:00:38.165773 762332 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:38.189846 762332 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:38.189944 762332 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc0028895c0 4 D0713 00:00:38.190078 762332 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:38.192811 762332 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:38.192867 762332 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc0028895c0 5 D0713 00:00:38.193030 762332 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:38.193358 762332 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b214:sysno 13 D0713 00:00:38.193405 762332 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc0028895c0 6 D0713 00:00:38.193531 762332 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:38.213241 762332 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:38.213315 762332 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc0028895c0 7 D0713 00:00:38.213447 762332 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:38.215121 762332 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:38.215232 762332 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc0028895c0 8 D0713 00:00:38.215470 762332 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:38.217693 762332 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46af76:sysno 35 D0713 00:00:38.217771 762332 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc0028895c0 9 D0713 00:00:38.217950 762332 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:38.219419 762332 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:38.219503 762332 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc0028895c0 10 D0713 00:00:38.219826 762332 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:38.220775 762332 usertrap_amd64.go:212] [ 1086: 1089] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:38.220872 762332 usertrap_amd64.go:122] [ 1086: 1089] Allocate a new trap: 0xc0028895c0 11 D0713 00:00:38.221207 762332 usertrap_amd64.go:225] [ 1086: 1089] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:38.233248 762332 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46b020:sysno 39 D0713 00:00:38.233352 762332 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc0028895c0 12 D0713 00:00:38.234869 762332 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:38.235937 762332 usertrap_amd64.go:212] [ 1086: 1087] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:38.235991 762332 usertrap_amd64.go:122] [ 1086: 1087] Allocate a new trap: 0xc0028895c0 13 D0713 00:00:38.236795 762332 usertrap_amd64.go:225] [ 1086: 1087] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:38.237465 762332 task_signals.go:470] [ 1086: 1086] Notified of signal 23 D0713 00:00:38.237778 762332 task_signals.go:220] [ 1086: 1086] Signal 23: delivering to handler D0713 00:00:38.244847 762332 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46af29:sysno 293 D0713 00:00:38.244911 762332 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc0028895c0 14 D0713 00:00:38.245120 762332 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46af29 trap addr 65460 ([184 37 1 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:38.250691 762332 task_signals.go:470] [ 1086: 1086] Notified of signal 23 D0713 00:00:38.254132 762332 task_signals.go:220] [ 1086: 1086] Signal 23: delivering to handler I0713 00:00:38.269102 762332 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0713 00:00:38.269479 762332 usertrap_amd64.go:212] [ 1086: 1086] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:38.269545 762332 usertrap_amd64.go:122] [ 1086: 1086] Allocate a new trap: 0xc0028895c0 15 D0713 00:00:38.269772 762332 usertrap_amd64.go:225] [ 1086: 1086] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 00:00:38.270224 762332 task_exit.go:204] [ 1086: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.270619 762332 task_signals.go:204] [ 1086: 1088] Signal 1086, PID: 1088, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.270625 762332 task_signals.go:204] [ 1086: 1089] Signal 1086, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.270838 762332 task_signals.go:204] [ 1086: 1090] Signal 1086, PID: 1090, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.270890 762332 task_exit.go:204] [ 1086: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.271148 762332 task_exit.go:204] [ 1086: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.271342 762332 task_signals.go:204] [ 1086: 1087] Signal 1086, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.271624 762332 task_signals.go:204] [ 1086: 1091] Signal 1086, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.271661 762332 task_exit.go:204] [ 1086: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.272210 762332 task_exit.go:204] [ 1086: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.272283 762332 task_exit.go:204] [ 1086: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.272490 762332 task_exit.go:204] [ 1086: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.272862 762332 task_exit.go:204] [ 1086: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.272982 762332 task_exit.go:204] [ 1086: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.273432 762332 task_exit.go:204] [ 1086: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.273484 762332 task_exit.go:204] [ 1086: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.273677 762332 task_exit.go:204] [ 1086: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.274313 762332 task_exit.go:204] [ 1086: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.274375 762332 task_exit.go:204] [ 1086: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.274567 762332 task_exit.go:204] [ 1086: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.296685 762332 task_exit.go:204] [ 1086: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.296765 762332 task_exit.go:204] [ 1086: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.296986 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:38.297366 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:38.297436 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:38.297670 762332 task_exit.go:204] [ 1086: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.305531 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.308397 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:38.329898 762332 syscalls.go:262] [ 1092: 1092] Allocating stack with size of 8388608 bytes D0713 00:00:38.334109 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.334660 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:38.337777 762332 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:38.337975 762332 usertrap_amd64.go:106] [ 1092: 1092] Map a usertrap vma at 6a000 D0713 00:00:38.338867 762332 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000d99890 1 D0713 00:00:38.339261 762332 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:38.341554 762332 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:38.341646 762332 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000d99890 2 D0713 00:00:38.341813 762332 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:38.344875 762332 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:38.344963 762332 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000d99890 3 D0713 00:00:38.345133 762332 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:38.366216 762332 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:38.366310 762332 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000d99890 4 D0713 00:00:38.366520 762332 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:38.369810 762332 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:38.369883 762332 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000d99890 5 D0713 00:00:38.370040 762332 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:38.370514 762332 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b214:sysno 13 D0713 00:00:38.370592 762332 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000d99890 6 D0713 00:00:38.370763 762332 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:38.393049 762332 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:38.393143 762332 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000d99890 7 D0713 00:00:38.393306 762332 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:38.395315 762332 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:38.395407 762332 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc000d99890 8 D0713 00:00:38.395608 762332 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:38.397711 762332 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46af76:sysno 35 D0713 00:00:38.397799 762332 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc000d99890 9 D0713 00:00:38.398855 762332 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:38.399506 762332 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:38.399566 762332 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000d99890 10 D0713 00:00:38.399821 762332 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:38.416686 762332 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b020:sysno 39 D0713 00:00:38.416772 762332 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc000d99890 11 D0713 00:00:38.417618 762332 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:38.418192 762332 usertrap_amd64.go:212] [ 1092: 1093] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:38.418262 762332 usertrap_amd64.go:122] [ 1092: 1093] Allocate a new trap: 0xc000d99890 12 D0713 00:00:38.418658 762332 usertrap_amd64.go:225] [ 1092: 1093] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:38.419173 762332 task_signals.go:470] [ 1092: 1092] Notified of signal 23 D0713 00:00:38.419991 762332 task_signals.go:220] [ 1092: 1092] Signal 23: delivering to handler D0713 00:00:38.430672 762332 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46af29:sysno 293 D0713 00:00:38.430796 762332 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000d99890 13 D0713 00:00:38.430690 762332 task_signals.go:470] [ 1092: 1092] Notified of signal 23 D0713 00:00:38.431007 762332 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:38.431327 762332 task_signals.go:220] [ 1092: 1092] Signal 23: delivering to handler D0713 00:00:38.432734 762332 task_signals.go:470] [ 1092: 1092] Notified of signal 23 D0713 00:00:38.433526 762332 task_signals.go:220] [ 1092: 1092] Signal 23: delivering to handler D0713 00:00:38.434966 762332 task_signals.go:481] [ 1092: 1092] No task notified of signal 23 D0713 00:00:38.435498 762332 task_signals.go:220] [ 1092: 1092] Signal 23: delivering to handler D0713 00:00:38.437417 762332 task_signals.go:470] [ 1092: 1092] Notified of signal 23 D0713 00:00:38.438000 762332 task_signals.go:179] [ 1092: 1092] Restarting syscall 202: interrupted by signal 23 D0713 00:00:38.438195 762332 task_signals.go:220] [ 1092: 1092] Signal 23: delivering to handler D0713 00:00:38.455787 762332 task_signals.go:470] [ 1092: 1092] Notified of signal 23 D0713 00:00:38.456411 762332 task_signals.go:220] [ 1092: 1092] Signal 23: delivering to handler I0713 00:00:38.465511 762332 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0713 00:00:38.465845 762332 usertrap_amd64.go:212] [ 1092: 1092] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:38.465919 762332 usertrap_amd64.go:122] [ 1092: 1092] Allocate a new trap: 0xc000d99890 14 D0713 00:00:38.466082 762332 usertrap_amd64.go:225] [ 1092: 1092] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:38.466556 762332 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.467038 762332 task_signals.go:204] [ 1092: 1095] Signal 1092, PID: 1095, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.467374 762332 task_signals.go:204] [ 1092: 1094] Signal 1092, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.467453 762332 task_signals.go:204] [ 1092: 1096] Signal 1092, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.467641 762332 task_signals.go:204] [ 1092: 1097] Signal 1092, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.467750 762332 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.468089 762332 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.468069 762332 task_signals.go:204] [ 1092: 1093] Signal 1092, PID: 1093, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.468275 762332 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.468423 762332 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.468803 762332 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.469016 762332 task_exit.go:204] [ 1092: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.469938 762332 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.470022 762332 task_exit.go:204] [ 1092: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.470513 762332 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.470606 762332 task_exit.go:204] [ 1092: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.470967 762332 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.471109 762332 task_exit.go:204] [ 1092: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.471415 762332 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.471496 762332 task_exit.go:204] [ 1092: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.493243 762332 task_exit.go:204] [ 1092: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.493497 762332 task_exit.go:204] [ 1092: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.493799 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:38.494263 762332 task_exit.go:204] [ 1092: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.495023 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:38.495074 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:38.503292 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.505427 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:38.523535 762332 syscalls.go:262] [ 1098: 1098] Allocating stack with size of 8388608 bytes D0713 00:00:38.526421 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.526925 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:38.530492 762332 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:38.530686 762332 usertrap_amd64.go:106] [ 1098: 1098] Map a usertrap vma at 64000 D0713 00:00:38.531620 762332 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc001583dd0 1 D0713 00:00:38.531951 762332 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:38.534878 762332 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:38.534948 762332 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc001583dd0 2 D0713 00:00:38.535088 762332 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:38.538248 762332 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:38.538301 762332 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc001583dd0 3 D0713 00:00:38.538435 762332 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:38.565492 762332 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:38.565613 762332 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc001583dd0 4 D0713 00:00:38.565828 762332 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:38.568735 762332 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:38.568798 762332 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc001583dd0 5 D0713 00:00:38.568923 762332 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:38.569418 762332 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b214:sysno 13 D0713 00:00:38.569517 762332 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc001583dd0 6 D0713 00:00:38.569703 762332 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:38.591079 762332 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:38.591158 762332 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc001583dd0 7 D0713 00:00:38.591305 762332 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:38.593312 762332 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:38.593474 762332 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc001583dd0 8 D0713 00:00:38.593732 762332 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:38.596174 762332 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46af76:sysno 35 D0713 00:00:38.596282 762332 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc001583dd0 9 D0713 00:00:38.596551 762332 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:38.597634 762332 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:38.597761 762332 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc001583dd0 10 D0713 00:00:38.598003 762332 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:38.601682 762332 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b020:sysno 39 D0713 00:00:38.601764 762332 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc001583dd0 11 D0713 00:00:38.602545 762332 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:38.603159 762332 usertrap_amd64.go:212] [ 1098: 1099] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:38.603239 762332 usertrap_amd64.go:122] [ 1098: 1099] Allocate a new trap: 0xc001583dd0 12 D0713 00:00:38.603438 762332 usertrap_amd64.go:225] [ 1098: 1099] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:38.603931 762332 task_signals.go:470] [ 1098: 1098] Notified of signal 23 D0713 00:00:38.604865 762332 task_signals.go:220] [ 1098: 1098] Signal 23: delivering to handler D0713 00:00:38.617063 762332 task_signals.go:470] [ 1098: 1098] Notified of signal 23 D0713 00:00:38.617219 762332 task_signals.go:220] [ 1098: 1098] Signal 23: delivering to handler D0713 00:00:38.623771 762332 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46af29:sysno 293 D0713 00:00:38.623845 762332 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc001583dd0 13 D0713 00:00:38.623984 762332 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:38.629523 762332 task_signals.go:470] [ 1098: 1098] Notified of signal 23 D0713 00:00:38.630975 762332 task_signals.go:220] [ 1098: 1098] Signal 23: delivering to handler D0713 00:00:38.646397 762332 usertrap_amd64.go:212] [ 1098: 1098] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:38.646509 762332 usertrap_amd64.go:122] [ 1098: 1098] Allocate a new trap: 0xc001583dd0 14 D0713 00:00:38.646712 762332 usertrap_amd64.go:225] [ 1098: 1098] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:38.647120 762332 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.647456 762332 task_signals.go:204] [ 1098: 1099] Signal 1098, PID: 1099, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.647598 762332 task_signals.go:204] [ 1098: 1100] Signal 1098, PID: 1100, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.647672 762332 task_signals.go:204] [ 1098: 1102] Signal 1098, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.647743 762332 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.647854 762332 task_signals.go:204] [ 1098: 1101] Signal 1098, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.647980 762332 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.648310 762332 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.648361 762332 task_exit.go:204] [ 1098: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.648565 762332 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.648876 762332 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.648923 762332 task_exit.go:204] [ 1098: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.649147 762332 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.649270 762332 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.649791 762332 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.649855 762332 task_exit.go:204] [ 1098: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.674057 762332 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.674139 762332 task_exit.go:204] [ 1098: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.674451 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:38.675156 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:38.675396 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:38.675497 762332 task_exit.go:204] [ 1098: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.677002 762332 task_signals.go:470] [ 6: 11] Notified of signal 23 D0713 00:00:38.678097 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:38.685300 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.687889 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:38.705882 762332 syscalls.go:262] [ 1103: 1103] Allocating stack with size of 8388608 bytes D0713 00:00:38.709845 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.710477 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:38.716219 762332 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:38.716459 762332 usertrap_amd64.go:106] [ 1103: 1103] Map a usertrap vma at 65000 D0713 00:00:38.717485 762332 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0008e3f80 1 D0713 00:00:38.717846 762332 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:38.720038 762332 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:38.720125 762332 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0008e3f80 2 D0713 00:00:38.720313 762332 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:38.723725 762332 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:38.723822 762332 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0008e3f80 3 D0713 00:00:38.724023 762332 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:38.747353 762332 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:38.747432 762332 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0008e3f80 4 D0713 00:00:38.747583 762332 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:38.750211 762332 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:38.750316 762332 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0008e3f80 5 D0713 00:00:38.750445 762332 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:38.750795 762332 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b214:sysno 13 D0713 00:00:38.750847 762332 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0008e3f80 6 D0713 00:00:38.751013 762332 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:38.770729 762332 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:38.770801 762332 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0008e3f80 7 D0713 00:00:38.770931 762332 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:38.772708 762332 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:38.772855 762332 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc0008e3f80 8 D0713 00:00:38.773212 762332 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:38.775863 762332 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46af76:sysno 35 D0713 00:00:38.775945 762332 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc0008e3f80 9 D0713 00:00:38.776194 762332 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:38.776728 762332 usertrap_amd64.go:212] [ 1103: 1106] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:38.776823 762332 usertrap_amd64.go:122] [ 1103: 1106] Allocate a new trap: 0xc0008e3f80 10 D0713 00:00:38.777168 762332 usertrap_amd64.go:225] [ 1103: 1106] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:38.793024 762332 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46b020:sysno 39 D0713 00:00:38.793122 762332 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc0008e3f80 11 D0713 00:00:38.793799 762332 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:38.794251 762332 usertrap_amd64.go:212] [ 1103: 1104] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:38.794324 762332 usertrap_amd64.go:122] [ 1103: 1104] Allocate a new trap: 0xc0008e3f80 12 D0713 00:00:38.794561 762332 usertrap_amd64.go:225] [ 1103: 1104] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:38.794980 762332 task_signals.go:470] [ 1103: 1103] Notified of signal 23 D0713 00:00:38.795999 762332 task_signals.go:220] [ 1103: 1103] Signal 23: delivering to handler D0713 00:00:38.805302 762332 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46af29:sysno 293 D0713 00:00:38.805417 762332 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0008e3f80 13 D0713 00:00:38.805575 762332 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:38.806971 762332 task_signals.go:470] [ 1103: 1103] Notified of signal 23 D0713 00:00:38.807436 762332 task_signals.go:220] [ 1103: 1103] Signal 23: delivering to handler D0713 00:00:38.824294 762332 task_signals.go:470] [ 1103: 1103] Notified of signal 23 D0713 00:00:38.824886 762332 task_signals.go:220] [ 1103: 1103] Signal 23: delivering to handler D0713 00:00:38.833522 762332 usertrap_amd64.go:212] [ 1103: 1103] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:38.833608 762332 usertrap_amd64.go:122] [ 1103: 1103] Allocate a new trap: 0xc0008e3f80 14 D0713 00:00:38.833826 762332 usertrap_amd64.go:225] [ 1103: 1103] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:38.834309 762332 task_exit.go:204] [ 1103: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.834770 762332 task_signals.go:204] [ 1103: 1107] Signal 1103, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.834937 762332 task_signals.go:204] [ 1103: 1105] Signal 1103, PID: 1105, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.834934 762332 task_signals.go:204] [ 1103: 1104] Signal 1103, PID: 1104, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.834989 762332 task_signals.go:204] [ 1103: 1106] Signal 1103, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:38.835082 762332 task_exit.go:204] [ 1103: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.835285 762332 task_exit.go:204] [ 1103: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.835694 762332 task_exit.go:204] [ 1103: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.835756 762332 task_exit.go:204] [ 1103: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.835963 762332 task_exit.go:204] [ 1103: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.836229 762332 task_exit.go:204] [ 1103: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.836379 762332 task_exit.go:204] [ 1103: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:38.837494 762332 task_exit.go:204] [ 1103: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.837619 762332 task_exit.go:204] [ 1103: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.837869 762332 task_exit.go:204] [ 1103: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.837995 762332 task_exit.go:204] [ 1103: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.859303 762332 task_exit.go:204] [ 1103: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:38.859399 762332 task_exit.go:204] [ 1103: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.859588 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:38.859821 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:38.859893 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:38.860087 762332 task_exit.go:204] [ 1103: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:38.868488 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.871592 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:38.891800 762332 syscalls.go:262] [ 1108: 1108] Allocating stack with size of 8388608 bytes D0713 00:00:38.895501 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:38.896065 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:38.902630 762332 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:38.902780 762332 usertrap_amd64.go:106] [ 1108: 1108] Map a usertrap vma at 6a000 D0713 00:00:38.903595 762332 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc001583f50 1 D0713 00:00:38.903868 762332 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:38.906171 762332 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:38.906280 762332 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc001583f50 2 D0713 00:00:38.906468 762332 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:38.909953 762332 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:38.910071 762332 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc001583f50 3 D0713 00:00:38.910258 762332 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:38.937741 762332 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:38.937848 762332 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc001583f50 4 D0713 00:00:38.938094 762332 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:38.943968 762332 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:38.944052 762332 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc001583f50 5 D0713 00:00:38.944244 762332 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:38.944806 762332 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b214:sysno 13 D0713 00:00:38.944887 762332 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc001583f50 6 D0713 00:00:38.945148 762332 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:38.971542 762332 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:38.971665 762332 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc001583f50 7 D0713 00:00:38.971827 762332 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:38.973695 762332 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:38.973797 762332 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc001583f50 8 D0713 00:00:38.974038 762332 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:38.975857 762332 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46af76:sysno 35 D0713 00:00:38.975940 762332 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc001583f50 9 D0713 00:00:38.976144 762332 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:38.977339 762332 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:38.977416 762332 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc001583f50 10 D0713 00:00:38.977675 762332 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:38.990274 762332 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b020:sysno 39 D0713 00:00:38.990373 762332 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc001583f50 11 D0713 00:00:38.990557 762332 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:38.991106 762332 usertrap_amd64.go:212] [ 1108: 1109] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:38.991198 762332 usertrap_amd64.go:122] [ 1108: 1109] Allocate a new trap: 0xc001583f50 12 D0713 00:00:38.991371 762332 usertrap_amd64.go:225] [ 1108: 1109] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:38.991832 762332 task_signals.go:470] [ 1108: 1108] Notified of signal 23 D0713 00:00:38.992609 762332 task_signals.go:220] [ 1108: 1108] Signal 23: delivering to handler D0713 00:00:38.999240 762332 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46af29:sysno 293 D0713 00:00:38.999355 762332 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc001583f50 13 D0713 00:00:38.999539 762332 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:39.004485 762332 task_signals.go:470] [ 1108: 1108] Notified of signal 23 D0713 00:00:39.004759 762332 task_signals.go:220] [ 1108: 1108] Signal 23: delivering to handler D0713 00:00:39.023748 762332 usertrap_amd64.go:212] [ 1108: 1108] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:39.023853 762332 usertrap_amd64.go:122] [ 1108: 1108] Allocate a new trap: 0xc001583f50 14 D0713 00:00:39.024034 762332 usertrap_amd64.go:225] [ 1108: 1108] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:39.024243 762332 task_signals.go:470] [ 1108: 1108] Notified of signal 23 D0713 00:00:39.024688 762332 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.025073 762332 task_signals.go:204] [ 1108: 1109] Signal 1108, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.025296 762332 task_signals.go:204] [ 1108: 1112] Signal 1108, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.025430 762332 task_signals.go:204] [ 1108: 1111] Signal 1108, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.025584 762332 task_signals.go:204] [ 1108: 1110] Signal 1108, PID: 1110, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.025628 762332 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.025720 762332 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.025832 762332 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.026138 762332 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.026517 762332 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.026591 762332 task_exit.go:204] [ 1108: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.026832 762332 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.027964 762332 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.028075 762332 task_exit.go:204] [ 1108: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.028361 762332 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.028443 762332 task_exit.go:204] [ 1108: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.049510 762332 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.049589 762332 task_exit.go:204] [ 1108: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.049778 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:39.050116 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:39.050228 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:39.050474 762332 task_exit.go:204] [ 1108: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.058046 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.060510 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:39.077836 762332 syscalls.go:262] [ 1113: 1113] Allocating stack with size of 8388608 bytes D0713 00:00:39.080841 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.081400 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:39.084540 762332 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:39.084662 762332 usertrap_amd64.go:106] [ 1113: 1113] Map a usertrap vma at 69000 D0713 00:00:39.085379 762332 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000993ce0 1 D0713 00:00:39.085673 762332 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:39.087307 762332 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:39.087384 762332 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000993ce0 2 D0713 00:00:39.087534 762332 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:39.090093 762332 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:39.090223 762332 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000993ce0 3 D0713 00:00:39.090395 762332 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:39.123353 762332 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:39.123431 762332 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000993ce0 4 D0713 00:00:39.123546 762332 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:39.126303 762332 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:39.126350 762332 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000993ce0 5 D0713 00:00:39.126456 762332 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:39.126847 762332 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b214:sysno 13 D0713 00:00:39.126911 762332 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000993ce0 6 D0713 00:00:39.127074 762332 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:39.146402 762332 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:39.146485 762332 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000993ce0 7 D0713 00:00:39.146680 762332 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:39.148655 762332 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:39.148733 762332 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc000993ce0 8 D0713 00:00:39.148895 762332 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:39.151763 762332 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46af76:sysno 35 D0713 00:00:39.151883 762332 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc000993ce0 9 D0713 00:00:39.152189 762332 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:39.153225 762332 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:39.153302 762332 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000993ce0 10 D0713 00:00:39.153510 762332 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:39.167353 762332 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46b020:sysno 39 D0713 00:00:39.167430 762332 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc000993ce0 11 D0713 00:00:39.167608 762332 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:39.168861 762332 usertrap_amd64.go:212] [ 1113: 1114] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:39.168980 762332 usertrap_amd64.go:122] [ 1113: 1114] Allocate a new trap: 0xc000993ce0 12 D0713 00:00:39.170163 762332 usertrap_amd64.go:225] [ 1113: 1114] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:39.171799 762332 task_signals.go:470] [ 1113: 1113] Notified of signal 23 D0713 00:00:39.172569 762332 task_signals.go:220] [ 1113: 1113] Signal 23: delivering to handler D0713 00:00:39.174289 762332 task_signals.go:470] [ 1113: 1113] Notified of signal 23 D0713 00:00:39.174649 762332 task_signals.go:220] [ 1113: 1113] Signal 23: delivering to handler D0713 00:00:39.182398 762332 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46af29:sysno 293 D0713 00:00:39.182487 762332 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000993ce0 13 D0713 00:00:39.182671 762332 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:39.188435 762332 task_signals.go:470] [ 1113: 1113] Notified of signal 23 D0713 00:00:39.191088 762332 task_signals.go:220] [ 1113: 1113] Signal 23: delivering to handler D0713 00:00:39.205008 762332 usertrap_amd64.go:212] [ 1113: 1113] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:39.205118 762332 usertrap_amd64.go:122] [ 1113: 1113] Allocate a new trap: 0xc000993ce0 14 D0713 00:00:39.205281 762332 usertrap_amd64.go:225] [ 1113: 1113] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:39.205608 762332 task_signals.go:470] [ 1113: 1113] Notified of signal 23 D0713 00:00:39.206047 762332 task_exit.go:204] [ 1113: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.206581 762332 task_signals.go:204] [ 1113: 1116] Signal 1113, PID: 1116, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.206540 762332 task_signals.go:204] [ 1113: 1114] Signal 1113, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.206600 762332 task_signals.go:204] [ 1113: 1115] Signal 1113, PID: 1115, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.206857 762332 task_signals.go:204] [ 1113: 1117] Signal 1113, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.206899 762332 task_signals.go:204] [ 1113: 1118] Signal 1113, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.206956 762332 task_exit.go:204] [ 1113: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.207319 762332 task_exit.go:204] [ 1113: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.207531 762332 task_exit.go:204] [ 1113: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.207886 762332 task_exit.go:204] [ 1113: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.208294 762332 task_exit.go:204] [ 1113: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.208502 762332 task_exit.go:204] [ 1113: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.209599 762332 task_exit.go:204] [ 1113: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.209711 762332 task_exit.go:204] [ 1113: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.209959 762332 task_exit.go:204] [ 1113: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.210023 762332 task_exit.go:204] [ 1113: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.210286 762332 task_exit.go:204] [ 1113: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.210337 762332 task_exit.go:204] [ 1113: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.210549 762332 task_exit.go:204] [ 1113: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.210616 762332 task_exit.go:204] [ 1113: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.231694 762332 task_exit.go:204] [ 1113: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.231792 762332 task_exit.go:204] [ 1113: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.232020 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:39.232488 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:39.232586 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:39.232664 762332 task_exit.go:204] [ 1113: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.241265 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.242741 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:39.261856 762332 syscalls.go:262] [ 1119: 1119] Allocating stack with size of 8388608 bytes D0713 00:00:39.264435 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.265080 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:39.269451 762332 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:39.269622 762332 usertrap_amd64.go:106] [ 1119: 1119] Map a usertrap vma at 62000 D0713 00:00:39.270713 762332 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc001b21530 1 D0713 00:00:39.271049 762332 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:39.273107 762332 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:39.273169 762332 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc001b21530 2 D0713 00:00:39.273298 762332 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:39.275679 762332 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:39.275731 762332 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc001b21530 3 D0713 00:00:39.275858 762332 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:39.295927 762332 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:39.296019 762332 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc001b21530 4 D0713 00:00:39.296225 762332 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:39.298934 762332 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:39.298987 762332 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc001b21530 5 D0713 00:00:39.299098 762332 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:39.299426 762332 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b214:sysno 13 D0713 00:00:39.299467 762332 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc001b21530 6 D0713 00:00:39.299590 762332 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:39.321223 762332 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:39.321306 762332 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc001b21530 7 D0713 00:00:39.321490 762332 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:39.323370 762332 usertrap_amd64.go:212] [ 1119: 1120] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:39.323473 762332 usertrap_amd64.go:122] [ 1119: 1120] Allocate a new trap: 0xc001b21530 8 D0713 00:00:39.323726 762332 usertrap_amd64.go:225] [ 1119: 1120] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:39.327375 762332 usertrap_amd64.go:212] [ 1119: 1120] Found the pattern at ip 46af76:sysno 35 D0713 00:00:39.327653 762332 usertrap_amd64.go:122] [ 1119: 1120] Allocate a new trap: 0xc001b21530 9 D0713 00:00:39.327909 762332 usertrap_amd64.go:225] [ 1119: 1120] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:39.328298 762332 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:39.328386 762332 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc001b21530 10 D0713 00:00:39.328564 762332 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:39.342302 762332 usertrap_amd64.go:212] [ 1119: 1120] Found the pattern at ip 46b020:sysno 39 D0713 00:00:39.342374 762332 usertrap_amd64.go:122] [ 1119: 1120] Allocate a new trap: 0xc001b21530 11 D0713 00:00:39.342555 762332 usertrap_amd64.go:225] [ 1119: 1120] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:39.343211 762332 usertrap_amd64.go:212] [ 1119: 1120] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:39.343286 762332 usertrap_amd64.go:122] [ 1119: 1120] Allocate a new trap: 0xc001b21530 12 D0713 00:00:39.343438 762332 usertrap_amd64.go:225] [ 1119: 1120] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:39.343904 762332 task_signals.go:470] [ 1119: 1119] Notified of signal 23 D0713 00:00:39.344591 762332 task_signals.go:220] [ 1119: 1119] Signal 23: delivering to handler D0713 00:00:39.357499 762332 task_signals.go:470] [ 1119: 1119] Notified of signal 23 D0713 00:00:39.357666 762332 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46af29:sysno 293 D0713 00:00:39.357745 762332 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc001b21530 13 D0713 00:00:39.357965 762332 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:39.358329 762332 task_signals.go:220] [ 1119: 1119] Signal 23: delivering to handler D0713 00:00:39.359811 762332 task_signals.go:470] [ 1119: 1119] Notified of signal 23 D0713 00:00:39.360195 762332 task_signals.go:220] [ 1119: 1119] Signal 23: delivering to handler D0713 00:00:39.361315 762332 task_signals.go:470] [ 1119: 1119] Notified of signal 23 D0713 00:00:39.361624 762332 task_signals.go:220] [ 1119: 1119] Signal 23: delivering to handler D0713 00:00:39.375598 762332 task_signals.go:470] [ 1119: 1119] Notified of signal 23 D0713 00:00:39.375987 762332 task_signals.go:220] [ 1119: 1119] Signal 23: delivering to handler D0713 00:00:39.388162 762332 usertrap_amd64.go:212] [ 1119: 1119] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:39.388242 762332 usertrap_amd64.go:122] [ 1119: 1119] Allocate a new trap: 0xc001b21530 14 D0713 00:00:39.388406 762332 usertrap_amd64.go:225] [ 1119: 1119] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:39.388837 762332 task_exit.go:204] [ 1119: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.389313 762332 task_signals.go:204] [ 1119: 1120] Signal 1119, PID: 1120, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.389404 762332 task_signals.go:204] [ 1119: 1123] Signal 1119, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.389551 762332 task_signals.go:204] [ 1119: 1124] Signal 1119, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.389657 762332 task_signals.go:204] [ 1119: 1121] Signal 1119, PID: 1121, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.389699 762332 task_exit.go:204] [ 1119: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.389938 762332 task_exit.go:204] [ 1119: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.390210 762332 task_signals.go:204] [ 1119: 1122] Signal 1119, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.390242 762332 task_exit.go:204] [ 1119: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.390711 762332 task_signals.go:204] [ 1119: 1125] Signal 1119, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.390824 762332 task_exit.go:204] [ 1119: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.391093 762332 task_exit.go:204] [ 1119: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.391267 762332 task_exit.go:204] [ 1119: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.391786 762332 task_exit.go:204] [ 1119: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.391876 762332 task_exit.go:204] [ 1119: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.392099 762332 task_exit.go:204] [ 1119: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.392618 762332 task_exit.go:204] [ 1119: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.392687 762332 task_exit.go:204] [ 1119: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.392902 762332 task_exit.go:204] [ 1119: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.393013 762332 task_exit.go:204] [ 1119: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.393310 762332 task_exit.go:204] [ 1119: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.393429 762332 task_exit.go:204] [ 1119: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.393941 762332 task_exit.go:204] [ 1119: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.394012 762332 task_exit.go:204] [ 1119: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.415803 762332 task_exit.go:204] [ 1119: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.415917 762332 task_exit.go:204] [ 1119: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.416155 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:39.416502 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:39.416641 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:39.417034 762332 task_exit.go:204] [ 1119: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.425826 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.426854 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:39.446625 762332 syscalls.go:262] [ 1126: 1126] Allocating stack with size of 8388608 bytes D0713 00:00:39.449842 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.450415 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:39.454195 762332 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:39.454382 762332 usertrap_amd64.go:106] [ 1126: 1126] Map a usertrap vma at 65000 D0713 00:00:39.455400 762332 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000a58810 1 D0713 00:00:39.455751 762332 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:39.458219 762332 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:39.458279 762332 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000a58810 2 D0713 00:00:39.458476 762332 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:39.461810 762332 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:39.461918 762332 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000a58810 3 D0713 00:00:39.462149 762332 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:39.481400 762332 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:39.481463 762332 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000a58810 4 D0713 00:00:39.481580 762332 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:39.484167 762332 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:39.484220 762332 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000a58810 5 D0713 00:00:39.484355 762332 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:39.484700 762332 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b214:sysno 13 D0713 00:00:39.484776 762332 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000a58810 6 D0713 00:00:39.484914 762332 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:39.502385 762332 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:39.502459 762332 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000a58810 7 D0713 00:00:39.502569 762332 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:39.504021 762332 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:39.504133 762332 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000a58810 8 D0713 00:00:39.504297 762332 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:39.505837 762332 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46af76:sysno 35 D0713 00:00:39.505900 762332 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000a58810 9 D0713 00:00:39.506106 762332 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:39.507459 762332 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:39.507598 762332 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000a58810 10 D0713 00:00:39.508933 762332 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:39.529530 762332 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b020:sysno 39 D0713 00:00:39.529695 762332 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000a58810 11 D0713 00:00:39.529836 762332 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:39.532199 762332 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:39.532285 762332 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc000a58810 12 D0713 00:00:39.532453 762332 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:39.533027 762332 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0713 00:00:39.533516 762332 task_signals.go:220] [ 1126: 1126] Signal 23: delivering to handler D0713 00:00:39.534725 762332 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0713 00:00:39.535068 762332 task_signals.go:220] [ 1126: 1126] Signal 23: delivering to handler D0713 00:00:39.542900 762332 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46af29:sysno 293 D0713 00:00:39.543056 762332 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000a58810 13 D0713 00:00:39.543300 762332 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:39.549464 762332 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0713 00:00:39.557150 762332 task_signals.go:220] [ 1126: 1126] Signal 23: delivering to handler I0713 00:00:39.573911 762332 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0713 00:00:39.574283 762332 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:39.574368 762332 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc000a58810 14 D0713 00:00:39.574543 762332 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:39.575397 762332 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0713 00:00:39.576149 762332 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.576406 762332 task_signals.go:204] [ 1126: 1131] Signal 1126, PID: 1131, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.576436 762332 task_signals.go:204] [ 1126: 1127] Signal 1126, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.576721 762332 task_signals.go:204] [ 1126: 1129] Signal 1126, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.576787 762332 task_signals.go:204] [ 1126: 1128] Signal 1126, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.577063 762332 task_signals.go:204] [ 1126: 1130] Signal 1126, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.577261 762332 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.577617 762332 task_exit.go:204] [ 1126: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.578288 762332 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.578579 762332 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.578776 762332 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.578998 762332 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.579303 762332 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.579389 762332 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.579768 762332 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.579835 762332 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.580258 762332 task_exit.go:204] [ 1126: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.580376 762332 task_exit.go:204] [ 1126: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.580878 762332 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.581020 762332 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.605449 762332 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.605707 762332 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.606241 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:39.606754 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:39.606881 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:39.608064 762332 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.616362 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.616519 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:39.638309 762332 syscalls.go:262] [ 1132: 1132] Allocating stack with size of 8388608 bytes D0713 00:00:39.641085 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.641653 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:39.645359 762332 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:39.645499 762332 usertrap_amd64.go:106] [ 1132: 1132] Map a usertrap vma at 60000 D0713 00:00:39.646313 762332 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0014ec9c0 1 D0713 00:00:39.646635 762332 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:39.648535 762332 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:39.648589 762332 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0014ec9c0 2 D0713 00:00:39.648695 762332 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:39.651435 762332 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:39.651519 762332 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0014ec9c0 3 D0713 00:00:39.651658 762332 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:39.675022 762332 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:39.675122 762332 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0014ec9c0 4 D0713 00:00:39.675313 762332 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:39.678378 762332 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:39.678463 762332 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0014ec9c0 5 D0713 00:00:39.678657 762332 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:39.679154 762332 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b214:sysno 13 D0713 00:00:39.679208 762332 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0014ec9c0 6 D0713 00:00:39.679393 762332 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:39.697678 762332 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:39.697766 762332 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0014ec9c0 7 D0713 00:00:39.697915 762332 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:39.699487 762332 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:39.699558 762332 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc0014ec9c0 8 D0713 00:00:39.699723 762332 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:39.701079 762332 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46af76:sysno 35 D0713 00:00:39.701161 762332 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc0014ec9c0 9 D0713 00:00:39.701338 762332 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:39.703125 762332 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:39.703287 762332 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0014ec9c0 10 D0713 00:00:39.703972 762332 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:39.716148 762332 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46b020:sysno 39 D0713 00:00:39.716224 762332 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc0014ec9c0 11 D0713 00:00:39.717001 762332 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:39.717506 762332 usertrap_amd64.go:212] [ 1132: 1133] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:39.717588 762332 usertrap_amd64.go:122] [ 1132: 1133] Allocate a new trap: 0xc0014ec9c0 12 D0713 00:00:39.717740 762332 usertrap_amd64.go:225] [ 1132: 1133] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:39.718144 762332 task_signals.go:470] [ 1132: 1132] Notified of signal 23 D0713 00:00:39.718356 762332 task_signals.go:220] [ 1132: 1132] Signal 23: delivering to handler D0713 00:00:39.724656 762332 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46af29:sysno 293 D0713 00:00:39.724734 762332 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0014ec9c0 13 D0713 00:00:39.724854 762332 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:39.730956 762332 task_signals.go:470] [ 1132: 1132] Notified of signal 23 D0713 00:00:39.731570 762332 task_signals.go:220] [ 1132: 1132] Signal 23: delivering to handler I0713 00:00:39.744529 762332 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0713 00:00:39.744773 762332 usertrap_amd64.go:212] [ 1132: 1132] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:39.744823 762332 usertrap_amd64.go:122] [ 1132: 1132] Allocate a new trap: 0xc0014ec9c0 14 D0713 00:00:39.744970 762332 usertrap_amd64.go:225] [ 1132: 1132] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:39.745395 762332 task_exit.go:204] [ 1132: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.745725 762332 task_signals.go:204] [ 1132: 1133] Signal 1132, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.745722 762332 task_signals.go:204] [ 1132: 1134] Signal 1132, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.745905 762332 task_exit.go:204] [ 1132: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.745927 762332 task_signals.go:204] [ 1132: 1135] Signal 1132, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.746132 762332 task_exit.go:204] [ 1132: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.746294 762332 task_signals.go:204] [ 1132: 1136] Signal 1132, PID: 1136, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.746445 762332 task_exit.go:204] [ 1132: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.746635 762332 task_exit.go:204] [ 1132: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.746870 762332 task_exit.go:204] [ 1132: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.747552 762332 task_exit.go:204] [ 1132: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.747638 762332 task_exit.go:204] [ 1132: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.747825 762332 task_exit.go:204] [ 1132: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.747900 762332 task_exit.go:204] [ 1132: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.748118 762332 task_exit.go:204] [ 1132: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.748170 762332 task_exit.go:204] [ 1132: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.770419 762332 task_exit.go:204] [ 1132: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.770533 762332 task_exit.go:204] [ 1132: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.770791 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:39.771144 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:39.771207 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:39.771546 762332 task_exit.go:204] [ 1132: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.777494 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.781214 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:39.797214 762332 syscalls.go:262] [ 1137: 1137] Allocating stack with size of 8388608 bytes D0713 00:00:39.800050 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.800507 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:39.803995 762332 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:39.804159 762332 usertrap_amd64.go:106] [ 1137: 1137] Map a usertrap vma at 64000 D0713 00:00:39.804877 762332 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0020aab10 1 D0713 00:00:39.805183 762332 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 00:00:39.808745 762332 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:39.808830 762332 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0020aab10 2 D0713 00:00:39.809025 762332 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 00:00:39.811588 762332 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:39.811658 762332 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0020aab10 3 D0713 00:00:39.811808 762332 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 00:00:39.833128 762332 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:39.833233 762332 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0020aab10 4 D0713 00:00:39.833384 762332 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 00:00:39.836922 762332 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:39.837036 762332 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0020aab10 5 D0713 00:00:39.837183 762332 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 00:00:39.837513 762332 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b214:sysno 13 D0713 00:00:39.837577 762332 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0020aab10 6 D0713 00:00:39.837729 762332 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 00:00:39.857770 762332 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:39.857929 762332 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0020aab10 7 D0713 00:00:39.858160 762332 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 00:00:39.859952 762332 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:39.860038 762332 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc0020aab10 8 D0713 00:00:39.860269 762332 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 00:00:39.862422 762332 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46af76:sysno 35 D0713 00:00:39.862577 762332 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc0020aab10 9 D0713 00:00:39.862842 762332 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 00:00:39.864120 762332 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:39.864275 762332 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0020aab10 10 D0713 00:00:39.864556 762332 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 00:00:39.878253 762332 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b020:sysno 39 D0713 00:00:39.878327 762332 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc0020aab10 11 D0713 00:00:39.879156 762332 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 00:00:39.881194 762332 usertrap_amd64.go:212] [ 1137: 1138] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:39.881285 762332 usertrap_amd64.go:122] [ 1137: 1138] Allocate a new trap: 0xc0020aab10 12 D0713 00:00:39.882122 762332 usertrap_amd64.go:225] [ 1137: 1138] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 00:00:39.882728 762332 task_signals.go:470] [ 1137: 1137] Notified of signal 23 D0713 00:00:39.882985 762332 task_signals.go:220] [ 1137: 1137] Signal 23: delivering to handler D0713 00:00:39.889724 762332 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46af29:sysno 293 D0713 00:00:39.889782 762332 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0020aab10 13 D0713 00:00:39.889935 762332 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 00:00:39.896477 762332 task_signals.go:470] [ 1137: 1137] Notified of signal 23 D0713 00:00:39.898280 762332 task_signals.go:220] [ 1137: 1137] Signal 23: delivering to handler D0713 00:00:39.914061 762332 usertrap_amd64.go:212] [ 1137: 1137] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:39.914197 762332 usertrap_amd64.go:122] [ 1137: 1137] Allocate a new trap: 0xc0020aab10 14 D0713 00:00:39.914359 762332 usertrap_amd64.go:225] [ 1137: 1137] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 00:00:39.914781 762332 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.915217 762332 task_signals.go:204] [ 1137: 1138] Signal 1137, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.915275 762332 task_signals.go:204] [ 1137: 1139] Signal 1137, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.915414 762332 task_signals.go:204] [ 1137: 1141] Signal 1137, PID: 1141, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.915443 762332 task_signals.go:204] [ 1137: 1142] Signal 1137, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.915664 762332 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.915842 762332 task_signals.go:204] [ 1137: 1140] Signal 1137, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:39.916009 762332 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.916241 762332 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.916557 762332 task_exit.go:204] [ 1137: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.916902 762332 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:39.917284 762332 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.917972 762332 task_exit.go:204] [ 1137: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.918099 762332 task_exit.go:204] [ 1137: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.918356 762332 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.918482 762332 task_exit.go:204] [ 1137: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.918801 762332 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.918904 762332 task_exit.go:204] [ 1137: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.919261 762332 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.919410 762332 task_exit.go:204] [ 1137: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.942239 762332 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:39.942379 762332 task_exit.go:204] [ 1137: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.942629 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:39.943447 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:39.943539 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:39.944708 762332 task_exit.go:204] [ 1137: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:39.953497 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.953787 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:39.975906 762332 syscalls.go:262] [ 1143: 1143] Allocating stack with size of 8388608 bytes D0713 00:00:39.979167 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:39.979893 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:39.987574 762332 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:39.987776 762332 usertrap_amd64.go:106] [ 1143: 1143] Map a usertrap vma at 61000 D0713 00:00:39.989013 762332 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001b21dd0 1 D0713 00:00:39.989508 762332 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:39.991859 762332 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:39.991917 762332 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001b21dd0 2 D0713 00:00:39.992076 762332 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:39.994735 762332 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:39.994817 762332 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001b21dd0 3 D0713 00:00:39.994980 762332 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:40.017309 762332 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:40.017416 762332 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001b21dd0 4 D0713 00:00:40.017635 762332 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:40.021672 762332 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:40.021807 762332 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001b21dd0 5 D0713 00:00:40.022036 762332 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:40.022717 762332 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b214:sysno 13 D0713 00:00:40.022821 762332 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001b21dd0 6 D0713 00:00:40.022983 762332 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:40.048013 762332 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:40.048116 762332 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001b21dd0 7 D0713 00:00:40.048310 762332 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:40.050190 762332 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:40.050272 762332 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc001b21dd0 8 D0713 00:00:40.050426 762332 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:40.051855 762332 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46af76:sysno 35 D0713 00:00:40.051928 762332 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc001b21dd0 9 D0713 00:00:40.052098 762332 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:40.055226 762332 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:40.055295 762332 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001b21dd0 10 D0713 00:00:40.055457 762332 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:40.068222 762332 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46b020:sysno 39 D0713 00:00:40.068293 762332 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc001b21dd0 11 D0713 00:00:40.068441 762332 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:40.069916 762332 usertrap_amd64.go:212] [ 1143: 1144] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:40.069994 762332 usertrap_amd64.go:122] [ 1143: 1144] Allocate a new trap: 0xc001b21dd0 12 D0713 00:00:40.070156 762332 usertrap_amd64.go:225] [ 1143: 1144] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:40.070658 762332 task_signals.go:470] [ 1143: 1143] Notified of signal 23 D0713 00:00:40.070918 762332 task_signals.go:220] [ 1143: 1143] Signal 23: delivering to handler D0713 00:00:40.076889 762332 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46af29:sysno 293 D0713 00:00:40.076978 762332 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001b21dd0 13 D0713 00:00:40.077145 762332 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:40.082485 762332 task_signals.go:470] [ 1143: 1143] Notified of signal 23 D0713 00:00:40.084474 762332 task_signals.go:220] [ 1143: 1143] Signal 23: delivering to handler D0713 00:00:40.098619 762332 task_signals.go:470] [ 1143: 1143] Notified of signal 23 D0713 00:00:40.098807 762332 task_signals.go:220] [ 1143: 1143] Signal 23: delivering to handler D0713 00:00:40.100765 762332 usertrap_amd64.go:212] [ 1143: 1143] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.100867 762332 usertrap_amd64.go:122] [ 1143: 1143] Allocate a new trap: 0xc001b21dd0 14 D0713 00:00:40.101072 762332 usertrap_amd64.go:225] [ 1143: 1143] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:40.101515 762332 task_exit.go:204] [ 1143: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.101914 762332 task_signals.go:204] [ 1143: 1144] Signal 1143, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.102178 762332 task_signals.go:204] [ 1143: 1147] Signal 1143, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.102204 762332 task_signals.go:204] [ 1143: 1146] Signal 1143, PID: 1146, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.102216 762332 task_signals.go:204] [ 1143: 1145] Signal 1143, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.102246 762332 task_exit.go:204] [ 1143: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.102419 762332 task_exit.go:204] [ 1143: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.102775 762332 task_exit.go:204] [ 1143: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.103138 762332 task_exit.go:204] [ 1143: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.103525 762332 task_exit.go:204] [ 1143: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.103615 762332 task_exit.go:204] [ 1143: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.104239 762332 task_exit.go:204] [ 1143: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.104367 762332 task_exit.go:204] [ 1143: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.104403 762332 task_exit.go:204] [ 1143: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.104640 762332 task_exit.go:204] [ 1143: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.104693 762332 task_exit.go:204] [ 1143: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.126574 762332 task_exit.go:204] [ 1143: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.126689 762332 task_exit.go:204] [ 1143: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.126933 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:40.127326 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:40.127395 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:40.127786 762332 task_exit.go:204] [ 1143: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.135641 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.137313 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:40.155081 762332 syscalls.go:262] [ 1148: 1148] Allocating stack with size of 8388608 bytes D0713 00:00:40.158498 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.159058 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:40.162723 762332 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:40.162891 762332 usertrap_amd64.go:106] [ 1148: 1148] Map a usertrap vma at 61000 D0713 00:00:40.163763 762332 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00202c540 1 D0713 00:00:40.164077 762332 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:40.166086 762332 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:40.166151 762332 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00202c540 2 D0713 00:00:40.166274 762332 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:40.168854 762332 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:40.168924 762332 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00202c540 3 D0713 00:00:40.169127 762332 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:40.187647 762332 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:40.187709 762332 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00202c540 4 D0713 00:00:40.187831 762332 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:40.190802 762332 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:40.190877 762332 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00202c540 5 D0713 00:00:40.191051 762332 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:40.191512 762332 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b214:sysno 13 D0713 00:00:40.191593 762332 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00202c540 6 D0713 00:00:40.191728 762332 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:40.214675 762332 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:40.214742 762332 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00202c540 7 D0713 00:00:40.214879 762332 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:40.216190 762332 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:40.216264 762332 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc00202c540 8 D0713 00:00:40.216429 762332 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:40.218564 762332 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46af76:sysno 35 D0713 00:00:40.218658 762332 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc00202c540 9 D0713 00:00:40.218892 762332 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:40.220625 762332 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b6e0:sysno 24 D0713 00:00:40.220697 762332 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00202c540 10 D0713 00:00:40.220894 762332 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b6e0 trap addr 61320 ([184 24 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:40.221595 762332 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:40.221673 762332 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00202c540 11 D0713 00:00:40.221872 762332 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46b57c trap addr 61370 ([184 202 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:40.222812 762332 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46b020:sysno 39 D0713 00:00:40.222871 762332 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc00202c540 12 D0713 00:00:40.223121 762332 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:40.223725 762332 usertrap_amd64.go:212] [ 1148: 1149] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:40.223791 762332 usertrap_amd64.go:122] [ 1148: 1149] Allocate a new trap: 0xc00202c540 13 D0713 00:00:40.223941 762332 usertrap_amd64.go:225] [ 1148: 1149] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:40.224425 762332 task_signals.go:470] [ 1148: 1151] Notified of signal 23 D0713 00:00:40.225036 762332 task_signals.go:179] [ 1148: 1151] Restarting syscall 202: interrupted by signal 23 D0713 00:00:40.225094 762332 task_signals.go:220] [ 1148: 1151] Signal 23: delivering to handler D0713 00:00:40.235512 762332 task_signals.go:470] [ 1148: 1148] Notified of signal 23 D0713 00:00:40.235866 762332 task_signals.go:220] [ 1148: 1148] Signal 23: delivering to handler D0713 00:00:40.236781 762332 task_signals.go:470] [ 1148: 1148] Notified of signal 23 D0713 00:00:40.236921 762332 task_signals.go:179] [ 1148: 1148] Restarting syscall 202: interrupted by signal 23 D0713 00:00:40.237033 762332 task_signals.go:220] [ 1148: 1148] Signal 23: delivering to handler D0713 00:00:40.241804 762332 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46af29:sysno 293 D0713 00:00:40.241857 762332 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00202c540 14 D0713 00:00:40.241983 762332 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46af29 trap addr 61460 ([184 37 1 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:40.251645 762332 task_signals.go:470] [ 1148: 1148] Notified of signal 23 D0713 00:00:40.251982 762332 task_signals.go:220] [ 1148: 1148] Signal 23: delivering to handler D0713 00:00:40.261980 762332 task_signals.go:470] [ 1148: 1148] Notified of signal 23 D0713 00:00:40.262318 762332 task_signals.go:220] [ 1148: 1148] Signal 23: delivering to handler D0713 00:00:40.263980 762332 usertrap_amd64.go:212] [ 1148: 1148] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.264051 762332 usertrap_amd64.go:122] [ 1148: 1148] Allocate a new trap: 0xc00202c540 15 D0713 00:00:40.264198 762332 usertrap_amd64.go:225] [ 1148: 1148] Apply the binary patch addr 46ae44 trap addr 614b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 20 6 0]) D0713 00:00:40.264596 762332 task_exit.go:204] [ 1148: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.264888 762332 task_signals.go:204] [ 1148: 1151] Signal 1148, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.264881 762332 task_signals.go:204] [ 1148: 1152] Signal 1148, PID: 1152, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.265123 762332 task_signals.go:204] [ 1148: 1149] Signal 1148, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.265148 762332 task_exit.go:204] [ 1148: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.265289 762332 task_signals.go:204] [ 1148: 1150] Signal 1148, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.265383 762332 task_exit.go:204] [ 1148: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.265688 762332 task_exit.go:204] [ 1148: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.266090 762332 task_exit.go:204] [ 1148: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.266627 762332 task_exit.go:204] [ 1148: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.266929 762332 task_exit.go:204] [ 1148: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.267033 762332 task_exit.go:204] [ 1148: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.267325 762332 task_exit.go:204] [ 1148: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.267412 762332 task_exit.go:204] [ 1148: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.267616 762332 task_exit.go:204] [ 1148: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.267683 762332 task_exit.go:204] [ 1148: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.288612 762332 task_exit.go:204] [ 1148: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.288674 762332 task_exit.go:204] [ 1148: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.288820 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:40.289157 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:40.289215 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:40.289345 762332 task_exit.go:204] [ 1148: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.294749 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.299033 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:40.310107 762332 syscalls.go:262] [ 1153: 1153] Allocating stack with size of 8388608 bytes D0713 00:00:40.313180 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.313749 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:40.318003 762332 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:40.318123 762332 usertrap_amd64.go:106] [ 1153: 1153] Map a usertrap vma at 66000 D0713 00:00:40.318758 762332 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00202c870 1 D0713 00:00:40.319053 762332 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:40.320872 762332 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:40.320977 762332 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00202c870 2 D0713 00:00:40.321144 762332 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:40.323844 762332 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:40.323899 762332 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00202c870 3 D0713 00:00:40.324020 762332 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:40.345336 762332 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:40.345404 762332 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00202c870 4 D0713 00:00:40.345524 762332 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:40.348288 762332 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:40.348349 762332 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00202c870 5 D0713 00:00:40.348454 762332 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:40.348858 762332 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b214:sysno 13 D0713 00:00:40.348911 762332 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00202c870 6 D0713 00:00:40.349071 762332 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:40.369724 762332 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:40.369781 762332 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00202c870 7 D0713 00:00:40.369939 762332 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:40.371313 762332 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:40.371396 762332 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc00202c870 8 D0713 00:00:40.371595 762332 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:40.372822 762332 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46af76:sysno 35 D0713 00:00:40.372907 762332 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc00202c870 9 D0713 00:00:40.373099 762332 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:40.374083 762332 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:40.374154 762332 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00202c870 10 D0713 00:00:40.374332 762332 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:40.386459 762332 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b020:sysno 39 D0713 00:00:40.386521 762332 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc00202c870 11 D0713 00:00:40.387138 762332 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:40.387493 762332 usertrap_amd64.go:212] [ 1153: 1154] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:40.387543 762332 usertrap_amd64.go:122] [ 1153: 1154] Allocate a new trap: 0xc00202c870 12 D0713 00:00:40.387737 762332 usertrap_amd64.go:225] [ 1153: 1154] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:40.388097 762332 task_signals.go:470] [ 1153: 1153] Notified of signal 23 D0713 00:00:40.388295 762332 task_signals.go:220] [ 1153: 1153] Signal 23: delivering to handler D0713 00:00:40.394302 762332 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46af29:sysno 293 D0713 00:00:40.394363 762332 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00202c870 13 D0713 00:00:40.394534 762332 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:40.398980 762332 task_signals.go:470] [ 1153: 1153] Notified of signal 23 D0713 00:00:40.401298 762332 task_signals.go:220] [ 1153: 1153] Signal 23: delivering to handler D0713 00:00:40.414416 762332 usertrap_amd64.go:212] [ 1153: 1153] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.414487 762332 usertrap_amd64.go:122] [ 1153: 1153] Allocate a new trap: 0xc00202c870 14 D0713 00:00:40.414607 762332 usertrap_amd64.go:225] [ 1153: 1153] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:40.415006 762332 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.415413 762332 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.417856 762332 task_signals.go:204] [ 1153: 1156] Signal 1153, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.417909 762332 task_signals.go:204] [ 1153: 1155] Signal 1153, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.417972 762332 task_signals.go:204] [ 1153: 1157] Signal 1153, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.418125 762332 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.418500 762332 task_signals.go:204] [ 1153: 1154] Signal 1153, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.418747 762332 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.419042 762332 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.419811 762332 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.419879 762332 task_exit.go:204] [ 1153: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.420102 762332 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.420165 762332 task_exit.go:204] [ 1153: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.420379 762332 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.420439 762332 task_exit.go:204] [ 1153: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.420628 762332 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.444037 762332 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.444151 762332 task_exit.go:204] [ 1153: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.444379 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:40.445041 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:40.445272 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:40.446114 762332 task_exit.go:204] [ 1153: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.454055 762332 task_stop.go:118] [ 6: 12] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.457781 762332 task_signals.go:481] [ 6: 12] No task notified of signal 23 D0713 00:00:40.471988 762332 syscalls.go:262] [ 1158: 1158] Allocating stack with size of 8388608 bytes D0713 00:00:40.474923 762332 task_stop.go:138] [ 6: 12] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.475573 762332 task_signals.go:220] [ 6: 12] Signal 23: delivering to handler D0713 00:00:40.478997 762332 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:40.479220 762332 usertrap_amd64.go:106] [ 1158: 1158] Map a usertrap vma at 65000 D0713 00:00:40.480185 762332 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc000f2e8d0 1 D0713 00:00:40.480523 762332 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:40.483235 762332 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:40.483344 762332 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc000f2e8d0 2 D0713 00:00:40.483528 762332 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:40.486667 762332 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:40.486741 762332 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc000f2e8d0 3 D0713 00:00:40.486918 762332 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:40.508619 762332 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:40.508694 762332 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc000f2e8d0 4 D0713 00:00:40.508843 762332 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:40.511678 762332 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:40.511750 762332 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc000f2e8d0 5 D0713 00:00:40.511927 762332 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:40.512247 762332 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b214:sysno 13 D0713 00:00:40.512292 762332 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc000f2e8d0 6 D0713 00:00:40.512390 762332 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:40.529575 762332 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:40.529678 762332 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc000f2e8d0 7 D0713 00:00:40.529856 762332 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:40.531841 762332 usertrap_amd64.go:212] [ 1158: 1159] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:40.531951 762332 usertrap_amd64.go:122] [ 1158: 1159] Allocate a new trap: 0xc000f2e8d0 8 D0713 00:00:40.532182 762332 usertrap_amd64.go:225] [ 1158: 1159] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:40.535242 762332 usertrap_amd64.go:212] [ 1158: 1159] Found the pattern at ip 46af76:sysno 35 D0713 00:00:40.535350 762332 usertrap_amd64.go:122] [ 1158: 1159] Allocate a new trap: 0xc000f2e8d0 9 D0713 00:00:40.535555 762332 usertrap_amd64.go:225] [ 1158: 1159] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:40.536820 762332 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:40.536896 762332 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc000f2e8d0 10 D0713 00:00:40.537173 762332 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:40.537606 762332 usertrap_amd64.go:212] [ 1158: 1159] Found the pattern at ip 46b020:sysno 39 D0713 00:00:40.537715 762332 usertrap_amd64.go:122] [ 1158: 1159] Allocate a new trap: 0xc000f2e8d0 11 D0713 00:00:40.537940 762332 usertrap_amd64.go:225] [ 1158: 1159] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:40.538598 762332 usertrap_amd64.go:212] [ 1158: 1159] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:40.538682 762332 usertrap_amd64.go:122] [ 1158: 1159] Allocate a new trap: 0xc000f2e8d0 12 D0713 00:00:40.538902 762332 usertrap_amd64.go:225] [ 1158: 1159] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:40.539629 762332 task_signals.go:470] [ 1158: 1161] Notified of signal 23 D0713 00:00:40.540321 762332 task_signals.go:179] [ 1158: 1161] Restarting syscall 202: interrupted by signal 23 D0713 00:00:40.540399 762332 task_signals.go:220] [ 1158: 1161] Signal 23: delivering to handler D0713 00:00:40.551016 762332 task_signals.go:470] [ 1158: 1158] Notified of signal 23 D0713 00:00:40.551260 762332 task_signals.go:220] [ 1158: 1158] Signal 23: delivering to handler D0713 00:00:40.552852 762332 task_signals.go:470] [ 1158: 1158] Notified of signal 23 D0713 00:00:40.553197 762332 task_signals.go:220] [ 1158: 1158] Signal 23: delivering to handler D0713 00:00:40.554556 762332 task_signals.go:481] [ 1158: 1158] No task notified of signal 23 D0713 00:00:40.554829 762332 task_signals.go:220] [ 1158: 1158] Signal 23: delivering to handler D0713 00:00:40.556202 762332 task_signals.go:470] [ 1158: 1158] Notified of signal 23 D0713 00:00:40.557001 762332 task_signals.go:220] [ 1158: 1158] Signal 23: delivering to handler D0713 00:00:40.558503 762332 task_signals.go:470] [ 1158: 1158] Notified of signal 23 D0713 00:00:40.558752 762332 task_signals.go:220] [ 1158: 1158] Signal 23: delivering to handler D0713 00:00:40.566326 762332 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46af29:sysno 293 D0713 00:00:40.566420 762332 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc000f2e8d0 13 D0713 00:00:40.566602 762332 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:40.573156 762332 task_signals.go:470] [ 1158: 1158] Notified of signal 23 D0713 00:00:40.574271 762332 task_signals.go:220] [ 1158: 1158] Signal 23: delivering to handler D0713 00:00:40.587298 762332 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.587364 762332 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc000f2e8d0 14 D0713 00:00:40.587476 762332 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:40.587842 762332 task_exit.go:204] [ 1158: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.588252 762332 task_signals.go:204] [ 1158: 1162] Signal 1158, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.588449 762332 task_signals.go:204] [ 1158: 1161] Signal 1158, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.588609 762332 task_signals.go:204] [ 1158: 1159] Signal 1158, PID: 1159, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.588645 762332 task_exit.go:204] [ 1158: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.589006 762332 task_exit.go:204] [ 1158: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.589210 762332 task_signals.go:204] [ 1158: 1160] Signal 1158, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.589293 762332 task_exit.go:204] [ 1158: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.589491 762332 task_exit.go:204] [ 1158: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.590136 762332 task_exit.go:204] [ 1158: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.590749 762332 task_exit.go:204] [ 1158: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.590846 762332 task_exit.go:204] [ 1158: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.591573 762332 task_exit.go:204] [ 1158: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.591644 762332 task_exit.go:204] [ 1158: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.591871 762332 task_exit.go:204] [ 1158: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.591995 762332 task_exit.go:204] [ 1158: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.612263 762332 task_exit.go:204] [ 1158: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.612339 762332 task_exit.go:204] [ 1158: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.612521 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:40.613143 762332 task_exit.go:204] [ 1158: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.613438 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:40.613527 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:40.621805 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.624005 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:40.642006 762332 syscalls.go:262] [ 1163: 1163] Allocating stack with size of 8388608 bytes D0713 00:00:40.645680 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.646358 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:40.650369 762332 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:40.650552 762332 usertrap_amd64.go:106] [ 1163: 1163] Map a usertrap vma at 6a000 D0713 00:00:40.651457 762332 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc0014ed9e0 1 D0713 00:00:40.651835 762332 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 00:00:40.654145 762332 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:40.654214 762332 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc0014ed9e0 2 D0713 00:00:40.654357 762332 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 00:00:40.657325 762332 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:40.657420 762332 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc0014ed9e0 3 D0713 00:00:40.657623 762332 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 00:00:40.679795 762332 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:40.679890 762332 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc0014ed9e0 4 D0713 00:00:40.680051 762332 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 00:00:40.682729 762332 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:40.682784 762332 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc0014ed9e0 5 D0713 00:00:40.682957 762332 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 00:00:40.683340 762332 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b214:sysno 13 D0713 00:00:40.683430 762332 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc0014ed9e0 6 D0713 00:00:40.683577 762332 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 00:00:40.700974 762332 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:40.701052 762332 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc0014ed9e0 7 D0713 00:00:40.701192 762332 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 00:00:40.702858 762332 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:40.702955 762332 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc0014ed9e0 8 D0713 00:00:40.703235 762332 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 00:00:40.706104 762332 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46af76:sysno 35 D0713 00:00:40.706203 762332 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc0014ed9e0 9 D0713 00:00:40.706445 762332 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 00:00:40.707889 762332 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:40.707971 762332 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc0014ed9e0 10 D0713 00:00:40.708200 762332 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 00:00:40.711775 762332 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46b020:sysno 39 D0713 00:00:40.711863 762332 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc0014ed9e0 11 D0713 00:00:40.712605 762332 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 00:00:40.713071 762332 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:40.713130 762332 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc0014ed9e0 12 D0713 00:00:40.713736 762332 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 00:00:40.714238 762332 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0713 00:00:40.714719 762332 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler D0713 00:00:40.725052 762332 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0713 00:00:40.725241 762332 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler D0713 00:00:40.731921 762332 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46af29:sysno 293 D0713 00:00:40.731992 762332 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc0014ed9e0 13 D0713 00:00:40.732109 762332 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 00:00:40.738532 762332 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0713 00:00:40.739168 762332 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler D0713 00:00:40.753169 762332 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.753269 762332 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc0014ed9e0 14 D0713 00:00:40.753413 762332 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 00:00:40.753843 762332 task_exit.go:204] [ 1163: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.754267 762332 task_signals.go:204] [ 1163: 1167] Signal 1163, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.754390 762332 task_signals.go:204] [ 1163: 1166] Signal 1163, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.754404 762332 task_signals.go:204] [ 1163: 1164] Signal 1163, PID: 1164, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.754714 762332 task_exit.go:204] [ 1163: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.754934 762332 task_signals.go:204] [ 1163: 1168] Signal 1163, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.755222 762332 task_exit.go:204] [ 1163: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.755393 762332 task_signals.go:204] [ 1163: 1165] Signal 1163, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.755790 762332 task_exit.go:204] [ 1163: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.756012 762332 task_exit.go:204] [ 1163: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.756230 762332 task_exit.go:204] [ 1163: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.756506 762332 task_exit.go:204] [ 1163: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.756922 762332 task_exit.go:204] [ 1163: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.757025 762332 task_exit.go:204] [ 1163: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.757688 762332 task_exit.go:204] [ 1163: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.757765 762332 task_exit.go:204] [ 1163: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.758001 762332 task_exit.go:204] [ 1163: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.758053 762332 task_exit.go:204] [ 1163: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.758263 762332 task_exit.go:204] [ 1163: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.758336 762332 task_exit.go:204] [ 1163: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.780081 762332 task_exit.go:204] [ 1163: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.780296 762332 task_exit.go:204] [ 1163: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.780591 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:40.781072 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:40.781179 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:40.781407 762332 task_exit.go:204] [ 1163: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.789846 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.791552 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:40.809581 762332 syscalls.go:262] [ 1169: 1169] Allocating stack with size of 8388608 bytes D0713 00:00:40.812547 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.813215 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:40.817516 762332 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:40.817730 762332 usertrap_amd64.go:106] [ 1169: 1169] Map a usertrap vma at 61000 D0713 00:00:40.818759 762332 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00047e9f0 1 D0713 00:00:40.819103 762332 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 00:00:40.821172 762332 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:40.821241 762332 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00047e9f0 2 D0713 00:00:40.821367 762332 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 00:00:40.824249 762332 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:40.824345 762332 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00047e9f0 3 D0713 00:00:40.824558 762332 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 00:00:40.845731 762332 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:40.845814 762332 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00047e9f0 4 D0713 00:00:40.845961 762332 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 00:00:40.849059 762332 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:40.849139 762332 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00047e9f0 5 D0713 00:00:40.849324 762332 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 00:00:40.849862 762332 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b214:sysno 13 D0713 00:00:40.849969 762332 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00047e9f0 6 D0713 00:00:40.850221 762332 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 00:00:40.871666 762332 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:40.871749 762332 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00047e9f0 7 D0713 00:00:40.871918 762332 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 00:00:40.873829 762332 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:40.873909 762332 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc00047e9f0 8 D0713 00:00:40.874139 762332 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 00:00:40.876800 762332 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46af76:sysno 35 D0713 00:00:40.876882 762332 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc00047e9f0 9 D0713 00:00:40.877839 762332 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 00:00:40.878338 762332 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:40.878414 762332 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00047e9f0 10 D0713 00:00:40.878653 762332 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 00:00:40.890285 762332 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b020:sysno 39 D0713 00:00:40.890388 762332 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc00047e9f0 11 D0713 00:00:40.890544 762332 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 00:00:40.892102 762332 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:40.892173 762332 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc00047e9f0 12 D0713 00:00:40.892338 762332 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 00:00:40.892917 762332 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0713 00:00:40.893203 762332 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0713 00:00:40.900294 762332 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46af29:sysno 293 D0713 00:00:40.900367 762332 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00047e9f0 13 D0713 00:00:40.900564 762332 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 00:00:40.906629 762332 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0713 00:00:40.909074 762332 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0713 00:00:40.922052 762332 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0713 00:00:40.922926 762332 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0713 00:00:40.924647 762332 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:40.924729 762332 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc00047e9f0 14 D0713 00:00:40.924936 762332 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 00:00:40.925528 762332 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.926028 762332 task_signals.go:204] [ 1169: 1172] Signal 1169, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.926081 762332 task_signals.go:204] [ 1169: 1170] Signal 1169, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.926121 762332 task_signals.go:204] [ 1169: 1171] Signal 1169, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.926432 762332 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.926607 762332 task_signals.go:204] [ 1169: 1173] Signal 1169, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:40.926758 762332 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.927301 762332 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.927596 762332 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:40.927759 762332 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.927994 762332 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.928075 762332 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.928466 762332 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.928526 762332 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.929006 762332 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.929076 762332 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.948637 762332 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:40.948725 762332 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.948934 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:40.949312 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:40.949459 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:40.949778 762332 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:40.957324 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.959829 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:40.977799 762332 syscalls.go:262] [ 1174: 1174] Allocating stack with size of 8388608 bytes D0713 00:00:40.980597 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:40.981286 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:40.985226 762332 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:40.985407 762332 usertrap_amd64.go:106] [ 1174: 1174] Map a usertrap vma at 65000 D0713 00:00:40.986184 762332 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00202d140 1 D0713 00:00:40.986442 762332 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 00:00:40.988322 762332 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:40.988384 762332 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00202d140 2 D0713 00:00:40.988505 762332 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 00:00:40.990802 762332 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:40.990866 762332 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00202d140 3 D0713 00:00:40.990971 762332 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 00:00:41.012622 762332 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:41.012705 762332 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00202d140 4 D0713 00:00:41.013002 762332 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 00:00:41.016143 762332 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:41.016198 762332 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00202d140 5 D0713 00:00:41.016328 762332 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 00:00:41.016660 762332 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b214:sysno 13 D0713 00:00:41.016701 762332 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00202d140 6 D0713 00:00:41.016838 762332 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 00:00:41.038922 762332 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:41.038981 762332 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00202d140 7 D0713 00:00:41.039128 762332 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 00:00:41.040972 762332 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:41.041066 762332 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc00202d140 8 D0713 00:00:41.041305 762332 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 00:00:41.044267 762332 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46af76:sysno 35 D0713 00:00:41.044355 762332 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc00202d140 9 D0713 00:00:41.045300 762332 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 00:00:41.045846 762332 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:41.045946 762332 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00202d140 10 D0713 00:00:41.046194 762332 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 00:00:41.059405 762332 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b020:sysno 39 D0713 00:00:41.059560 762332 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc00202d140 11 D0713 00:00:41.061486 762332 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 00:00:41.062486 762332 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:41.062557 762332 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc00202d140 12 D0713 00:00:41.062690 762332 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 00:00:41.063441 762332 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 00:00:41.063911 762332 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 00:00:41.065027 762332 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 00:00:41.065473 762332 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 00:00:41.072717 762332 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46af29:sysno 293 D0713 00:00:41.072800 762332 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00202d140 13 D0713 00:00:41.073051 762332 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 00:00:41.079515 762332 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 00:00:41.079717 762332 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 00:00:41.097897 762332 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 00:00:41.098370 762332 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 00:00:41.100311 762332 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:41.100396 762332 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc00202d140 14 D0713 00:00:41.100519 762332 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 00:00:41.100897 762332 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.101261 762332 task_signals.go:204] [ 1174: 1178] Signal 1174, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.101517 762332 task_signals.go:204] [ 1174: 1175] Signal 1174, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.101563 762332 task_signals.go:204] [ 1174: 1177] Signal 1174, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.101630 762332 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.101614 762332 task_signals.go:204] [ 1174: 1176] Signal 1174, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.101812 762332 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.102046 762332 task_signals.go:204] [ 1174: 1179] Signal 1174, PID: 1179, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.102155 762332 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.102596 762332 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.102669 762332 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.102859 762332 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.103008 762332 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.103252 762332 task_exit.go:204] [ 1174: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.104072 762332 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.104190 762332 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.104734 762332 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.104824 762332 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.105149 762332 task_exit.go:204] [ 1174: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.105226 762332 task_exit.go:204] [ 1174: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.127237 762332 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.127353 762332 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.127569 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:41.127924 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:41.127999 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:41.128337 762332 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead executing program D0713 00:00:41.136443 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.137915 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:41.157599 762332 syscalls.go:262] [ 1180: 1180] Allocating stack with size of 8388608 bytes D0713 00:00:41.160905 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.161729 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:41.167254 762332 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:41.167499 762332 usertrap_amd64.go:106] [ 1180: 1180] Map a usertrap vma at 68000 D0713 00:00:41.168276 762332 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc00101a420 1 D0713 00:00:41.168579 762332 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:41.170285 762332 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:41.170341 762332 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc00101a420 2 D0713 00:00:41.170485 762332 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:41.173172 762332 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:41.173240 762332 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc00101a420 3 D0713 00:00:41.173383 762332 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:41.197770 762332 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:41.197869 762332 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc00101a420 4 D0713 00:00:41.198049 762332 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:41.200760 762332 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:41.200829 762332 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc00101a420 5 D0713 00:00:41.201024 762332 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:41.201537 762332 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b214:sysno 13 D0713 00:00:41.201605 762332 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc00101a420 6 D0713 00:00:41.201729 762332 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:41.223373 762332 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:41.223449 762332 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc00101a420 7 D0713 00:00:41.223598 762332 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:41.225159 762332 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:41.225248 762332 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc00101a420 8 D0713 00:00:41.225411 762332 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:41.227220 762332 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46af76:sysno 35 D0713 00:00:41.227288 762332 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc00101a420 9 D0713 00:00:41.227451 762332 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:41.229350 762332 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:41.229432 762332 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc00101a420 10 D0713 00:00:41.229797 762332 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:41.243663 762332 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b020:sysno 39 D0713 00:00:41.243779 762332 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc00101a420 11 D0713 00:00:41.243993 762332 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:41.246585 762332 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:41.246683 762332 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc00101a420 12 D0713 00:00:41.246910 762332 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:41.248227 762332 task_signals.go:470] [ 1180: 1180] Notified of signal 23 D0713 00:00:41.248532 762332 task_signals.go:220] [ 1180: 1180] Signal 23: delivering to handler D0713 00:00:41.256593 762332 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46af29:sysno 293 D0713 00:00:41.256679 762332 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc00101a420 13 D0713 00:00:41.256933 762332 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:41.263066 762332 task_signals.go:470] [ 1180: 1180] Notified of signal 23 D0713 00:00:41.265611 762332 task_signals.go:220] [ 1180: 1180] Signal 23: delivering to handler I0713 00:00:41.283783 762332 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0713 00:00:41.284316 762332 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:41.284448 762332 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc00101a420 14 D0713 00:00:41.284638 762332 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:41.285215 762332 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.285624 762332 task_signals.go:204] [ 1180: 1185] Signal 1180, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.285866 762332 task_signals.go:204] [ 1180: 1181] Signal 1180, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.285871 762332 task_signals.go:204] [ 1180: 1182] Signal 1180, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.286205 762332 task_exit.go:204] [ 1180: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.286576 762332 task_signals.go:204] [ 1180: 1184] Signal 1180, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.286996 762332 task_signals.go:204] [ 1180: 1183] Signal 1180, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.287192 762332 task_exit.go:204] [ 1180: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.287262 762332 task_exit.go:204] [ 1180: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.287437 762332 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.287589 762332 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.287957 762332 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.288008 762332 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.288174 762332 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.288528 762332 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.288614 762332 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.288789 762332 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.289262 762332 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.289336 762332 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.289469 762332 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.315165 762332 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.315281 762332 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.315568 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:41.316692 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:41.316798 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:41.317234 762332 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.327624 762332 task_signals.go:470] [ 6: 13] Notified of signal 23 D0713 00:00:41.327936 762332 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 00:00:41.332015 762332 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.338962 762332 task_signals.go:481] [ 6: 13] No task notified of signal 23 D0713 00:00:41.357258 762332 syscalls.go:262] [ 1186: 1186] Allocating stack with size of 8388608 bytes D0713 00:00:41.360360 762332 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.361279 762332 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 00:00:41.373346 762332 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:41.373538 762332 usertrap_amd64.go:106] [ 1186: 1186] Map a usertrap vma at 68000 D0713 00:00:41.374521 762332 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a58150 1 D0713 00:00:41.374798 762332 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:41.376655 762332 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:41.376708 762332 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a58150 2 D0713 00:00:41.376862 762332 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:41.379782 762332 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:41.379847 762332 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a58150 3 D0713 00:00:41.379956 762332 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:41.402102 762332 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:41.402188 762332 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a58150 4 D0713 00:00:41.402363 762332 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:41.405595 762332 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:41.405649 762332 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a58150 5 D0713 00:00:41.405787 762332 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:41.406142 762332 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b214:sysno 13 D0713 00:00:41.406203 762332 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a58150 6 D0713 00:00:41.406303 762332 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:41.426984 762332 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:41.427070 762332 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a58150 7 D0713 00:00:41.427224 762332 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:41.429078 762332 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:41.429221 762332 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc000a58150 8 D0713 00:00:41.429512 762332 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:41.431830 762332 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46af76:sysno 35 D0713 00:00:41.431927 762332 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc000a58150 9 D0713 00:00:41.432100 762332 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:41.433478 762332 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:41.433545 762332 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a58150 10 D0713 00:00:41.434441 762332 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:41.446813 762332 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b020:sysno 39 D0713 00:00:41.446955 762332 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc000a58150 11 D0713 00:00:41.447171 762332 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:41.449622 762332 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:41.449725 762332 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc000a58150 12 D0713 00:00:41.449923 762332 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:41.450343 762332 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0713 00:00:41.450776 762332 task_signals.go:220] [ 1186: 1186] Signal 23: delivering to handler D0713 00:00:41.457950 762332 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46af29:sysno 293 D0713 00:00:41.458040 762332 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a58150 13 D0713 00:00:41.458231 762332 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:41.464650 762332 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0713 00:00:41.466964 762332 task_signals.go:220] [ 1186: 1186] Signal 23: delivering to handler D0713 00:00:41.468466 762332 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0713 00:00:41.468705 762332 task_signals.go:179] [ 1186: 1186] Restarting syscall 202: interrupted by signal 23 D0713 00:00:41.468790 762332 task_signals.go:220] [ 1186: 1186] Signal 23: delivering to handler D0713 00:00:41.481974 762332 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:41.482068 762332 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a58150 14 D0713 00:00:41.482238 762332 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:41.482565 762332 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0713 00:00:41.482800 762332 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.483008 762332 task_signals.go:204] [ 1186: 1187] Signal 1186, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.483156 762332 task_signals.go:204] [ 1186: 1190] Signal 1186, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.483363 762332 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.483407 762332 task_signals.go:204] [ 1186: 1189] Signal 1186, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.483616 762332 task_signals.go:204] [ 1186: 1188] Signal 1186, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.483792 762332 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.484055 762332 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.484340 762332 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.484414 762332 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.484681 762332 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.485140 762332 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.485679 762332 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.485750 762332 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.485920 762332 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.485998 762332 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.509305 762332 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.509429 762332 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.509754 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:41.510180 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:41.510344 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:41.510369 762332 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.519320 762332 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.521570 762332 task_signals.go:481] [ 6: 13] No task notified of signal 23 D0713 00:00:41.543821 762332 syscalls.go:262] [ 1191: 1191] Allocating stack with size of 8388608 bytes D0713 00:00:41.547436 762332 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.548090 762332 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 00:00:41.551426 762332 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:41.551596 762332 usertrap_amd64.go:106] [ 1191: 1191] Map a usertrap vma at 66000 D0713 00:00:41.552449 762332 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000a58600 1 D0713 00:00:41.552772 762332 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 00:00:41.554879 762332 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:41.554939 762332 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000a58600 2 D0713 00:00:41.555098 762332 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 00:00:41.557856 762332 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:41.557936 762332 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000a58600 3 D0713 00:00:41.558070 762332 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 00:00:41.579933 762332 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:41.580037 762332 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000a58600 4 D0713 00:00:41.580188 762332 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 00:00:41.583071 762332 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:41.583167 762332 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000a58600 5 D0713 00:00:41.583337 762332 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 00:00:41.583717 762332 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b214:sysno 13 D0713 00:00:41.583880 762332 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000a58600 6 D0713 00:00:41.584049 762332 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 00:00:41.605036 762332 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:41.605155 762332 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000a58600 7 D0713 00:00:41.605320 762332 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 00:00:41.607227 762332 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:41.607336 762332 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000a58600 8 D0713 00:00:41.607615 762332 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 00:00:41.611379 762332 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46af76:sysno 35 D0713 00:00:41.611460 762332 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000a58600 9 D0713 00:00:41.611673 762332 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 00:00:41.613531 762332 usertrap_amd64.go:212] [ 1191: 1193] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:41.613617 762332 usertrap_amd64.go:122] [ 1191: 1193] Allocate a new trap: 0xc000a58600 10 D0713 00:00:41.613793 762332 usertrap_amd64.go:225] [ 1191: 1193] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 00:00:41.633312 762332 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b020:sysno 39 D0713 00:00:41.633428 762332 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000a58600 11 D0713 00:00:41.634377 762332 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 00:00:41.635510 762332 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:41.635682 762332 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc000a58600 12 D0713 00:00:41.635904 762332 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 00:00:41.636649 762332 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 00:00:41.636975 762332 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 00:00:41.642923 762332 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46af29:sysno 293 D0713 00:00:41.643002 762332 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000a58600 13 D0713 00:00:41.643185 762332 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 00:00:41.648521 762332 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 00:00:41.650529 762332 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 00:00:41.664830 762332 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 00:00:41.666389 762332 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 00:00:41.668638 762332 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:41.668714 762332 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc000a58600 14 D0713 00:00:41.668902 762332 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 00:00:41.669457 762332 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.669953 762332 task_signals.go:204] [ 1191: 1195] Signal 1191, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.670100 762332 task_signals.go:204] [ 1191: 1192] Signal 1191, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.670336 762332 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.670344 762332 task_signals.go:204] [ 1191: 1194] Signal 1191, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.670519 762332 task_signals.go:204] [ 1191: 1193] Signal 1191, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.670615 762332 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.670770 762332 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.671038 762332 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.671202 762332 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.671666 762332 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.671732 762332 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.671906 762332 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.671966 762332 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.672484 762332 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.672559 762332 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.695876 762332 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.695989 762332 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.696201 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:41.696565 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:41.696660 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:41.697098 762332 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.706562 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.708731 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:41.727243 762332 syscalls.go:262] [ 1196: 1196] Allocating stack with size of 8388608 bytes D0713 00:00:41.730389 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.731092 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:41.742700 762332 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:41.742878 762332 usertrap_amd64.go:106] [ 1196: 1196] Map a usertrap vma at 68000 D0713 00:00:41.743816 762332 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000f2e390 1 D0713 00:00:41.744136 762332 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:41.746511 762332 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:41.746595 762332 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000f2e390 2 D0713 00:00:41.746774 762332 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:41.750583 762332 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:41.750656 762332 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000f2e390 3 D0713 00:00:41.750821 762332 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:41.775523 762332 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:41.775623 762332 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000f2e390 4 D0713 00:00:41.775787 762332 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:41.778772 762332 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:41.778834 762332 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000f2e390 5 D0713 00:00:41.779021 762332 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:41.779440 762332 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b214:sysno 13 D0713 00:00:41.779519 762332 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000f2e390 6 D0713 00:00:41.779664 762332 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:41.806201 762332 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:41.806296 762332 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000f2e390 7 D0713 00:00:41.806468 762332 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:41.808195 762332 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:41.808312 762332 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000f2e390 8 D0713 00:00:41.808537 762332 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:41.810917 762332 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46af76:sysno 35 D0713 00:00:41.811006 762332 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000f2e390 9 D0713 00:00:41.811200 762332 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:41.811532 762332 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:41.811611 762332 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000f2e390 10 D0713 00:00:41.811865 762332 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:41.825767 762332 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b020:sysno 39 D0713 00:00:41.825862 762332 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000f2e390 11 D0713 00:00:41.826088 762332 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:41.828308 762332 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:41.828392 762332 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc000f2e390 12 D0713 00:00:41.828698 762332 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:41.829403 762332 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 00:00:41.829631 762332 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 00:00:41.837485 762332 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46af29:sysno 293 D0713 00:00:41.837692 762332 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000f2e390 13 D0713 00:00:41.837926 762332 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:41.843644 762332 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 00:00:41.844132 762332 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 00:00:41.862475 762332 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 00:00:41.862847 762332 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 00:00:41.865580 762332 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:41.865688 762332 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc000f2e390 14 D0713 00:00:41.866049 762332 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:41.866632 762332 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.867485 762332 task_signals.go:204] [ 1196: 1200] Signal 1196, PID: 1200, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.867491 762332 task_signals.go:204] [ 1196: 1197] Signal 1196, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.867650 762332 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.867743 762332 task_signals.go:204] [ 1196: 1199] Signal 1196, PID: 1199, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.867910 762332 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.868452 762332 task_signals.go:204] [ 1196: 1198] Signal 1196, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:41.868480 762332 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.868802 762332 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.869344 762332 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.869411 762332 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.869565 762332 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.869629 762332 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.869949 762332 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.870007 762332 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.870203 762332 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:41.896434 762332 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:41.896523 762332 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.896771 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:41.897322 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:41.897408 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:41.897505 762332 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:41.906413 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.909440 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:41.928034 762332 syscalls.go:262] [ 1201: 1201] Allocating stack with size of 8388608 bytes D0713 00:00:41.931852 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:41.932991 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:41.939359 762332 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:41.939603 762332 usertrap_amd64.go:106] [ 1201: 1201] Map a usertrap vma at 69000 D0713 00:00:41.940519 762332 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0020aa6f0 1 D0713 00:00:41.940908 762332 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 00:00:41.944673 762332 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:41.944793 762332 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0020aa6f0 2 D0713 00:00:41.945025 762332 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 00:00:41.949107 762332 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:41.949212 762332 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0020aa6f0 3 D0713 00:00:41.949352 762332 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 00:00:41.975527 762332 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:41.975608 762332 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0020aa6f0 4 D0713 00:00:41.975788 762332 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 00:00:41.979134 762332 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:41.979227 762332 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0020aa6f0 5 D0713 00:00:41.979364 762332 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 00:00:41.979771 762332 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b214:sysno 13 D0713 00:00:41.979836 762332 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0020aa6f0 6 D0713 00:00:41.979973 762332 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 00:00:42.001262 762332 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:42.001338 762332 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0020aa6f0 7 D0713 00:00:42.001480 762332 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 00:00:42.003554 762332 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:42.003651 762332 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0020aa6f0 8 D0713 00:00:42.003916 762332 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 00:00:42.007262 762332 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46af76:sysno 35 D0713 00:00:42.007362 762332 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0020aa6f0 9 D0713 00:00:42.007542 762332 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 00:00:42.008646 762332 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:42.008728 762332 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0020aa6f0 10 D0713 00:00:42.008921 762332 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 00:00:42.009622 762332 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b020:sysno 39 D0713 00:00:42.009688 762332 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0020aa6f0 11 D0713 00:00:42.010085 762332 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 00:00:42.010683 762332 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:42.010846 762332 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0020aa6f0 12 D0713 00:00:42.011179 762332 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 00:00:42.011934 762332 task_signals.go:470] [ 1201: 1204] Notified of signal 23 D0713 00:00:42.012370 762332 task_signals.go:179] [ 1201: 1204] Restarting syscall 202: interrupted by signal 23 D0713 00:00:42.012465 762332 task_signals.go:220] [ 1201: 1204] Signal 23: delivering to handler D0713 00:00:42.024170 762332 task_signals.go:470] [ 1201: 1201] Notified of signal 23 D0713 00:00:42.024851 762332 task_signals.go:220] [ 1201: 1201] Signal 23: delivering to handler D0713 00:00:42.026383 762332 task_signals.go:470] [ 1201: 1201] Notified of signal 23 D0713 00:00:42.027389 762332 task_signals.go:220] [ 1201: 1201] Signal 23: delivering to handler D0713 00:00:42.028785 762332 task_signals.go:470] [ 1201: 1201] Notified of signal 23 D0713 00:00:42.029136 762332 task_signals.go:220] [ 1201: 1201] Signal 23: delivering to handler D0713 00:00:42.037536 762332 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46af29:sysno 293 D0713 00:00:42.037653 762332 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0020aa6f0 13 D0713 00:00:42.037904 762332 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 00:00:42.044910 762332 task_signals.go:470] [ 1201: 1201] Notified of signal 23 D0713 00:00:42.047714 762332 task_signals.go:220] [ 1201: 1201] Signal 23: delivering to handler D0713 00:00:42.049375 762332 task_signals.go:470] [ 1201: 1201] Notified of signal 23 D0713 00:00:42.049609 762332 task_signals.go:220] [ 1201: 1201] Signal 23: delivering to handler D0713 00:00:42.065999 762332 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:42.066077 762332 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0020aa6f0 14 D0713 00:00:42.066206 762332 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 00:00:42.066908 762332 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.067344 762332 task_signals.go:204] [ 1201: 1202] Signal 1201, PID: 1202, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.067493 762332 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.067523 762332 task_signals.go:204] [ 1201: 1203] Signal 1201, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.067685 762332 task_signals.go:204] [ 1201: 1205] Signal 1201, PID: 1205, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.067795 762332 task_signals.go:204] [ 1201: 1204] Signal 1201, PID: 1204, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.067915 762332 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.068302 762332 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.068753 762332 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.069219 762332 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.069903 762332 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.070003 762332 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.070399 762332 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.070474 762332 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.070690 762332 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.070782 762332 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.093578 762332 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.093799 762332 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.094110 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:42.094440 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:42.094514 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:42.094987 762332 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.103230 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.105581 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:42.128277 762332 syscalls.go:262] [ 1206: 1206] Allocating stack with size of 8388608 bytes D0713 00:00:42.131885 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.132835 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:42.138125 762332 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:42.138364 762332 usertrap_amd64.go:106] [ 1206: 1206] Map a usertrap vma at 62000 D0713 00:00:42.139503 762332 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0020aac30 1 D0713 00:00:42.140017 762332 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:42.142699 762332 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:42.142793 762332 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0020aac30 2 D0713 00:00:42.142997 762332 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:42.148387 762332 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:42.148444 762332 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0020aac30 3 D0713 00:00:42.148632 762332 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:42.176402 762332 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:42.176545 762332 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0020aac30 4 D0713 00:00:42.176726 762332 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:42.180512 762332 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:42.180575 762332 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0020aac30 5 D0713 00:00:42.180717 762332 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:42.181280 762332 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b214:sysno 13 D0713 00:00:42.181336 762332 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0020aac30 6 D0713 00:00:42.181484 762332 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:42.211456 762332 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:42.211568 762332 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0020aac30 7 D0713 00:00:42.211786 762332 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:42.214169 762332 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:42.214259 762332 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0020aac30 8 D0713 00:00:42.214461 762332 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:42.217628 762332 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46af76:sysno 35 D0713 00:00:42.217711 762332 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0020aac30 9 D0713 00:00:42.218912 762332 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:42.219414 762332 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:42.219502 762332 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0020aac30 10 D0713 00:00:42.219717 762332 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:42.233066 762332 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b020:sysno 39 D0713 00:00:42.233164 762332 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0020aac30 11 D0713 00:00:42.233335 762332 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:42.233973 762332 usertrap_amd64.go:212] [ 1206: 1207] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:42.234042 762332 usertrap_amd64.go:122] [ 1206: 1207] Allocate a new trap: 0xc0020aac30 12 D0713 00:00:42.234382 762332 usertrap_amd64.go:225] [ 1206: 1207] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:42.235633 762332 task_signals.go:470] [ 1206: 1206] Notified of signal 23 D0713 00:00:42.236283 762332 task_signals.go:220] [ 1206: 1206] Signal 23: delivering to handler D0713 00:00:42.246911 762332 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46af29:sysno 293 D0713 00:00:42.246992 762332 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0020aac30 13 D0713 00:00:42.247151 762332 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:42.247737 762332 task_signals.go:470] [ 1206: 1206] Notified of signal 23 D0713 00:00:42.248106 762332 task_signals.go:220] [ 1206: 1206] Signal 23: delivering to handler D0713 00:00:42.249218 762332 task_signals.go:470] [ 1206: 1206] Notified of signal 23 D0713 00:00:42.249445 762332 task_signals.go:220] [ 1206: 1206] Signal 23: delivering to handler D0713 00:00:42.261775 762332 task_signals.go:470] [ 1206: 1206] Notified of signal 23 D0713 00:00:42.262891 762332 task_signals.go:220] [ 1206: 1206] Signal 23: delivering to handler D0713 00:00:42.277971 762332 usertrap_amd64.go:212] [ 1206: 1206] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:42.278086 762332 usertrap_amd64.go:122] [ 1206: 1206] Allocate a new trap: 0xc0020aac30 14 D0713 00:00:42.278291 762332 usertrap_amd64.go:225] [ 1206: 1206] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:42.278956 762332 task_exit.go:204] [ 1206: 1206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.279394 762332 task_signals.go:204] [ 1206: 1210] Signal 1206, PID: 1210, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.279519 762332 task_signals.go:204] [ 1206: 1208] Signal 1206, PID: 1208, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.279519 762332 task_signals.go:204] [ 1206: 1209] Signal 1206, PID: 1209, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.279728 762332 task_signals.go:204] [ 1206: 1207] Signal 1206, PID: 1207, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.279738 762332 task_signals.go:204] [ 1206: 1211] Signal 1206, PID: 1211, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.279968 762332 task_exit.go:204] [ 1206: 1209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.280376 762332 task_exit.go:204] [ 1206: 1207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.280704 762332 task_exit.go:204] [ 1206: 1210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.281168 762332 task_exit.go:204] [ 1206: 1211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.281707 762332 task_exit.go:204] [ 1206: 1211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.281787 762332 task_exit.go:204] [ 1206: 1211] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.282040 762332 task_exit.go:204] [ 1206: 1209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.282175 762332 task_exit.go:204] [ 1206: 1209] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.282410 762332 task_exit.go:204] [ 1206: 1208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.283310 762332 task_exit.go:204] [ 1206: 1206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.283547 762332 task_exit.go:204] [ 1206: 1207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.283632 762332 task_exit.go:204] [ 1206: 1207] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.283898 762332 task_exit.go:204] [ 1206: 1210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.283983 762332 task_exit.go:204] [ 1206: 1210] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.311689 762332 task_exit.go:204] [ 1206: 1208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.311813 762332 task_exit.go:204] [ 1206: 1208] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.312084 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:42.312443 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:42.312514 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:42.313105 762332 task_exit.go:204] [ 1206: 1206] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.320712 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.323468 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:42.342873 762332 syscalls.go:262] [ 1212: 1212] Allocating stack with size of 8388608 bytes D0713 00:00:42.346885 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.347461 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:42.350801 762332 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:42.350977 762332 usertrap_amd64.go:106] [ 1212: 1212] Map a usertrap vma at 63000 D0713 00:00:42.351891 762332 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00202c5a0 1 D0713 00:00:42.352207 762332 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:42.354250 762332 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:42.354315 762332 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00202c5a0 2 D0713 00:00:42.354487 762332 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:42.357202 762332 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:42.357276 762332 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00202c5a0 3 D0713 00:00:42.357414 762332 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:42.380426 762332 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:42.380523 762332 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00202c5a0 4 D0713 00:00:42.380722 762332 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:42.383956 762332 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:42.384041 762332 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00202c5a0 5 D0713 00:00:42.384230 762332 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:42.384718 762332 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b214:sysno 13 D0713 00:00:42.384800 762332 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00202c5a0 6 D0713 00:00:42.385027 762332 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:42.409185 762332 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:42.409332 762332 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00202c5a0 7 D0713 00:00:42.409462 762332 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:42.411225 762332 usertrap_amd64.go:212] [ 1212: 1213] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:42.411334 762332 usertrap_amd64.go:122] [ 1212: 1213] Allocate a new trap: 0xc00202c5a0 8 D0713 00:00:42.411617 762332 usertrap_amd64.go:225] [ 1212: 1213] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:42.413435 762332 usertrap_amd64.go:212] [ 1212: 1213] Found the pattern at ip 46af76:sysno 35 D0713 00:00:42.413511 762332 usertrap_amd64.go:122] [ 1212: 1213] Allocate a new trap: 0xc00202c5a0 9 D0713 00:00:42.413726 762332 usertrap_amd64.go:225] [ 1212: 1213] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:42.415155 762332 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:42.415274 762332 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00202c5a0 10 D0713 00:00:42.415500 762332 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:42.429525 762332 usertrap_amd64.go:212] [ 1212: 1213] Found the pattern at ip 46b020:sysno 39 D0713 00:00:42.429602 762332 usertrap_amd64.go:122] [ 1212: 1213] Allocate a new trap: 0xc00202c5a0 11 D0713 00:00:42.429787 762332 usertrap_amd64.go:225] [ 1212: 1213] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:42.430971 762332 usertrap_amd64.go:212] [ 1212: 1213] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:42.431069 762332 usertrap_amd64.go:122] [ 1212: 1213] Allocate a new trap: 0xc00202c5a0 12 D0713 00:00:42.431333 762332 usertrap_amd64.go:225] [ 1212: 1213] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:42.432048 762332 task_signals.go:470] [ 1212: 1212] Notified of signal 23 D0713 00:00:42.432579 762332 task_signals.go:220] [ 1212: 1212] Signal 23: delivering to handler D0713 00:00:42.438537 762332 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46af29:sysno 293 D0713 00:00:42.438619 762332 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00202c5a0 13 D0713 00:00:42.438808 762332 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:42.444782 762332 task_signals.go:470] [ 1212: 1212] Notified of signal 23 D0713 00:00:42.446696 762332 task_signals.go:220] [ 1212: 1212] Signal 23: delivering to handler D0713 00:00:42.447955 762332 task_signals.go:470] [ 1212: 1212] Notified of signal 23 D0713 00:00:42.448292 762332 task_signals.go:179] [ 1212: 1212] Restarting syscall 202: interrupted by signal 23 D0713 00:00:42.448380 762332 task_signals.go:220] [ 1212: 1212] Signal 23: delivering to handler D0713 00:00:42.462114 762332 sys_signal.go:495] [ 1212: 1212] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0713 00:00:42.462451 762332 usertrap_amd64.go:212] [ 1212: 1212] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:42.462544 762332 usertrap_amd64.go:122] [ 1212: 1212] Allocate a new trap: 0xc00202c5a0 14 D0713 00:00:42.462763 762332 task_signals.go:470] [ 1212: 1212] Notified of signal 23 D0713 00:00:42.462752 762332 usertrap_amd64.go:225] [ 1212: 1212] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 00:00:42.463119 762332 task_signals.go:220] [ 1212: 1212] Signal 23: delivering to handler D0713 00:00:42.464420 762332 task_exit.go:204] [ 1212: 1212] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.464925 762332 task_signals.go:204] [ 1212: 1216] Signal 1212, PID: 1216, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.465271 762332 task_signals.go:204] [ 1212: 1215] Signal 1212, PID: 1215, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.465422 762332 task_exit.go:204] [ 1212: 1216] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.465671 762332 task_signals.go:204] [ 1212: 1213] Signal 1212, PID: 1213, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.465688 762332 task_signals.go:204] [ 1212: 1214] Signal 1212, PID: 1214, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.465960 762332 task_exit.go:204] [ 1212: 1213] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.466204 762332 task_exit.go:204] [ 1212: 1215] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.466418 762332 task_exit.go:204] [ 1212: 1214] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.467174 762332 task_exit.go:204] [ 1212: 1214] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.467260 762332 task_exit.go:204] [ 1212: 1214] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.468050 762332 task_exit.go:204] [ 1212: 1212] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.468577 762332 task_exit.go:204] [ 1212: 1213] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.468662 762332 task_exit.go:204] [ 1212: 1213] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.469064 762332 task_exit.go:204] [ 1212: 1216] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.469134 762332 task_exit.go:204] [ 1212: 1216] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.492631 762332 task_exit.go:204] [ 1212: 1215] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.492728 762332 task_exit.go:204] [ 1212: 1215] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.493187 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:42.493671 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:42.493850 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:42.494354 762332 task_exit.go:204] [ 1212: 1212] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.502190 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.505271 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:42.522939 762332 syscalls.go:262] [ 1217: 1217] Allocating stack with size of 8388608 bytes D0713 00:00:42.526432 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.527387 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:42.533446 762332 usertrap_amd64.go:212] [ 1217: 1217] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:42.533599 762332 usertrap_amd64.go:106] [ 1217: 1217] Map a usertrap vma at 60000 D0713 00:00:42.534428 762332 usertrap_amd64.go:122] [ 1217: 1217] Allocate a new trap: 0xc000d58ae0 1 D0713 00:00:42.534998 762332 usertrap_amd64.go:225] [ 1217: 1217] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:42.537266 762332 usertrap_amd64.go:212] [ 1217: 1217] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:42.537327 762332 usertrap_amd64.go:122] [ 1217: 1217] Allocate a new trap: 0xc000d58ae0 2 D0713 00:00:42.537431 762332 usertrap_amd64.go:225] [ 1217: 1217] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:42.539948 762332 usertrap_amd64.go:212] [ 1217: 1217] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:42.540001 762332 usertrap_amd64.go:122] [ 1217: 1217] Allocate a new trap: 0xc000d58ae0 3 D0713 00:00:42.540105 762332 usertrap_amd64.go:225] [ 1217: 1217] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:42.564207 762332 usertrap_amd64.go:212] [ 1217: 1217] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:42.564301 762332 usertrap_amd64.go:122] [ 1217: 1217] Allocate a new trap: 0xc000d58ae0 4 D0713 00:00:42.564417 762332 usertrap_amd64.go:225] [ 1217: 1217] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:42.567604 762332 usertrap_amd64.go:212] [ 1217: 1217] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:42.567667 762332 usertrap_amd64.go:122] [ 1217: 1217] Allocate a new trap: 0xc000d58ae0 5 D0713 00:00:42.567781 762332 usertrap_amd64.go:225] [ 1217: 1217] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:42.568296 762332 usertrap_amd64.go:212] [ 1217: 1217] Found the pattern at ip 46b214:sysno 13 D0713 00:00:42.568402 762332 usertrap_amd64.go:122] [ 1217: 1217] Allocate a new trap: 0xc000d58ae0 6 D0713 00:00:42.568619 762332 usertrap_amd64.go:225] [ 1217: 1217] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:42.587608 762332 usertrap_amd64.go:212] [ 1217: 1217] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:42.587692 762332 usertrap_amd64.go:122] [ 1217: 1217] Allocate a new trap: 0xc000d58ae0 7 D0713 00:00:42.587810 762332 usertrap_amd64.go:225] [ 1217: 1217] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:42.589450 762332 usertrap_amd64.go:212] [ 1217: 1218] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:42.589546 762332 usertrap_amd64.go:122] [ 1217: 1218] Allocate a new trap: 0xc000d58ae0 8 D0713 00:00:42.589780 762332 usertrap_amd64.go:225] [ 1217: 1218] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:42.591791 762332 usertrap_amd64.go:212] [ 1217: 1217] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:42.591860 762332 usertrap_amd64.go:122] [ 1217: 1217] Allocate a new trap: 0xc000d58ae0 9 D0713 00:00:42.592020 762332 usertrap_amd64.go:225] [ 1217: 1217] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:42.592584 762332 usertrap_amd64.go:212] [ 1217: 1218] Found the pattern at ip 46af76:sysno 35 D0713 00:00:42.592638 762332 usertrap_amd64.go:122] [ 1217: 1218] Allocate a new trap: 0xc000d58ae0 10 D0713 00:00:42.592757 762332 usertrap_amd64.go:225] [ 1217: 1218] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:42.606271 762332 usertrap_amd64.go:212] [ 1217: 1218] Found the pattern at ip 46b020:sysno 39 D0713 00:00:42.606376 762332 usertrap_amd64.go:122] [ 1217: 1218] Allocate a new trap: 0xc000d58ae0 11 D0713 00:00:42.607338 762332 usertrap_amd64.go:225] [ 1217: 1218] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:42.607764 762332 usertrap_amd64.go:212] [ 1217: 1218] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:42.607813 762332 usertrap_amd64.go:122] [ 1217: 1218] Allocate a new trap: 0xc000d58ae0 12 D0713 00:00:42.607956 762332 usertrap_amd64.go:225] [ 1217: 1218] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:42.608508 762332 task_signals.go:470] [ 1217: 1217] Notified of signal 23 D0713 00:00:42.608795 762332 task_signals.go:220] [ 1217: 1217] Signal 23: delivering to handler D0713 00:00:42.616384 762332 usertrap_amd64.go:212] [ 1217: 1217] Found the pattern at ip 46af29:sysno 293 D0713 00:00:42.616474 762332 usertrap_amd64.go:122] [ 1217: 1217] Allocate a new trap: 0xc000d58ae0 13 D0713 00:00:42.616587 762332 usertrap_amd64.go:225] [ 1217: 1217] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:42.620852 762332 task_signals.go:470] [ 1217: 1217] Notified of signal 23 D0713 00:00:42.621193 762332 task_signals.go:220] [ 1217: 1217] Signal 23: delivering to handler D0713 00:00:42.635414 762332 task_signals.go:470] [ 1217: 1217] Notified of signal 23 D0713 00:00:42.637089 762332 task_signals.go:220] [ 1217: 1217] Signal 23: delivering to handler D0713 00:00:42.638970 762332 usertrap_amd64.go:212] [ 1217: 1217] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:42.639032 762332 usertrap_amd64.go:122] [ 1217: 1217] Allocate a new trap: 0xc000d58ae0 14 D0713 00:00:42.639180 762332 usertrap_amd64.go:225] [ 1217: 1217] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:42.639507 762332 task_exit.go:204] [ 1217: 1217] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.639746 762332 task_signals.go:204] [ 1217: 1221] Signal 1217, PID: 1221, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.639847 762332 task_signals.go:204] [ 1217: 1218] Signal 1217, PID: 1218, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.639920 762332 task_signals.go:204] [ 1217: 1220] Signal 1217, PID: 1220, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.639993 762332 task_exit.go:204] [ 1217: 1218] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.640192 762332 task_signals.go:204] [ 1217: 1219] Signal 1217, PID: 1219, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.640228 762332 task_exit.go:204] [ 1217: 1221] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.640600 762332 task_exit.go:204] [ 1217: 1219] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.640848 762332 task_exit.go:204] [ 1217: 1218] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.640968 762332 task_exit.go:204] [ 1217: 1218] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.641212 762332 task_exit.go:204] [ 1217: 1219] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.641269 762332 task_exit.go:204] [ 1217: 1219] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.641453 762332 task_exit.go:204] [ 1217: 1220] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.641615 762332 task_exit.go:204] [ 1217: 1217] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.641759 762332 task_exit.go:204] [ 1217: 1221] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.641825 762332 task_exit.go:204] [ 1217: 1221] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.661256 762332 task_exit.go:204] [ 1217: 1220] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.661337 762332 task_exit.go:204] [ 1217: 1220] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.661574 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:42.661969 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:42.662098 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:42.662215 762332 task_exit.go:204] [ 1217: 1217] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.669076 762332 task_stop.go:118] [ 6: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.672670 762332 task_signals.go:481] [ 6: 11] No task notified of signal 23 D0713 00:00:42.688699 762332 syscalls.go:262] [ 1222: 1222] Allocating stack with size of 8388608 bytes D0713 00:00:42.691359 762332 task_stop.go:138] [ 6: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.691857 762332 task_signals.go:220] [ 6: 11] Signal 23: delivering to handler D0713 00:00:42.694850 762332 usertrap_amd64.go:212] [ 1222: 1222] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:42.695007 762332 usertrap_amd64.go:106] [ 1222: 1222] Map a usertrap vma at 62000 D0713 00:00:42.696452 762332 usertrap_amd64.go:122] [ 1222: 1222] Allocate a new trap: 0xc00202c870 1 D0713 00:00:42.696763 762332 usertrap_amd64.go:225] [ 1222: 1222] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 00:00:42.699135 762332 usertrap_amd64.go:212] [ 1222: 1222] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:42.699234 762332 usertrap_amd64.go:122] [ 1222: 1222] Allocate a new trap: 0xc00202c870 2 D0713 00:00:42.699374 762332 usertrap_amd64.go:225] [ 1222: 1222] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 00:00:42.701916 762332 usertrap_amd64.go:212] [ 1222: 1222] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:42.702003 762332 usertrap_amd64.go:122] [ 1222: 1222] Allocate a new trap: 0xc00202c870 3 D0713 00:00:42.702203 762332 usertrap_amd64.go:225] [ 1222: 1222] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 00:00:42.723905 762332 usertrap_amd64.go:212] [ 1222: 1222] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:42.724018 762332 usertrap_amd64.go:122] [ 1222: 1222] Allocate a new trap: 0xc00202c870 4 D0713 00:00:42.724223 762332 usertrap_amd64.go:225] [ 1222: 1222] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 00:00:42.726942 762332 usertrap_amd64.go:212] [ 1222: 1222] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:42.727019 762332 usertrap_amd64.go:122] [ 1222: 1222] Allocate a new trap: 0xc00202c870 5 D0713 00:00:42.727150 762332 usertrap_amd64.go:225] [ 1222: 1222] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 00:00:42.727492 762332 usertrap_amd64.go:212] [ 1222: 1222] Found the pattern at ip 46b214:sysno 13 D0713 00:00:42.727546 762332 usertrap_amd64.go:122] [ 1222: 1222] Allocate a new trap: 0xc00202c870 6 D0713 00:00:42.727644 762332 usertrap_amd64.go:225] [ 1222: 1222] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 00:00:42.745382 762332 usertrap_amd64.go:212] [ 1222: 1222] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:42.745464 762332 usertrap_amd64.go:122] [ 1222: 1222] Allocate a new trap: 0xc00202c870 7 D0713 00:00:42.745569 762332 usertrap_amd64.go:225] [ 1222: 1222] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 00:00:42.747080 762332 usertrap_amd64.go:212] [ 1222: 1223] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:42.747174 762332 usertrap_amd64.go:122] [ 1222: 1223] Allocate a new trap: 0xc00202c870 8 D0713 00:00:42.747341 762332 usertrap_amd64.go:225] [ 1222: 1223] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 00:00:42.748781 762332 usertrap_amd64.go:212] [ 1222: 1223] Found the pattern at ip 46af76:sysno 35 D0713 00:00:42.748852 762332 usertrap_amd64.go:122] [ 1222: 1223] Allocate a new trap: 0xc00202c870 9 D0713 00:00:42.749127 762332 usertrap_amd64.go:225] [ 1222: 1223] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 00:00:42.750434 762332 usertrap_amd64.go:212] [ 1222: 1222] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:42.750531 762332 usertrap_amd64.go:122] [ 1222: 1222] Allocate a new trap: 0xc00202c870 10 D0713 00:00:42.751405 762332 usertrap_amd64.go:225] [ 1222: 1222] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 00:00:42.763118 762332 usertrap_amd64.go:212] [ 1222: 1223] Found the pattern at ip 46b020:sysno 39 D0713 00:00:42.763206 762332 usertrap_amd64.go:122] [ 1222: 1223] Allocate a new trap: 0xc00202c870 11 D0713 00:00:42.764140 762332 usertrap_amd64.go:225] [ 1222: 1223] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 00:00:42.765752 762332 usertrap_amd64.go:212] [ 1222: 1223] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:42.765881 762332 usertrap_amd64.go:122] [ 1222: 1223] Allocate a new trap: 0xc00202c870 12 D0713 00:00:42.766097 762332 usertrap_amd64.go:225] [ 1222: 1223] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 00:00:42.766792 762332 task_signals.go:470] [ 1222: 1222] Notified of signal 23 D0713 00:00:42.767601 762332 task_signals.go:220] [ 1222: 1222] Signal 23: delivering to handler D0713 00:00:42.773151 762332 usertrap_amd64.go:212] [ 1222: 1222] Found the pattern at ip 46af29:sysno 293 D0713 00:00:42.773215 762332 usertrap_amd64.go:122] [ 1222: 1222] Allocate a new trap: 0xc00202c870 13 D0713 00:00:42.773377 762332 usertrap_amd64.go:225] [ 1222: 1222] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 00:00:42.778077 762332 task_signals.go:470] [ 1222: 1222] Notified of signal 23 D0713 00:00:42.778294 762332 task_signals.go:220] [ 1222: 1222] Signal 23: delivering to handler D0713 00:00:42.791743 762332 task_signals.go:470] [ 1222: 1222] Notified of signal 23 D0713 00:00:42.791921 762332 task_signals.go:220] [ 1222: 1222] Signal 23: delivering to handler D0713 00:00:42.797828 762332 usertrap_amd64.go:212] [ 1222: 1222] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:42.797910 762332 usertrap_amd64.go:122] [ 1222: 1222] Allocate a new trap: 0xc00202c870 14 D0713 00:00:42.798055 762332 usertrap_amd64.go:225] [ 1222: 1222] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 00:00:42.798527 762332 task_exit.go:204] [ 1222: 1222] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.798934 762332 task_signals.go:204] [ 1222: 1223] Signal 1222, PID: 1223, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.799245 762332 task_signals.go:204] [ 1222: 1226] Signal 1222, PID: 1226, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.799311 762332 task_signals.go:204] [ 1222: 1224] Signal 1222, PID: 1224, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.799332 762332 task_exit.go:204] [ 1222: 1223] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.799673 762332 task_exit.go:204] [ 1222: 1226] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.799889 762332 task_signals.go:204] [ 1222: 1225] Signal 1222, PID: 1225, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:42.800155 762332 task_exit.go:204] [ 1222: 1225] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.800809 762332 task_exit.go:204] [ 1222: 1226] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.800904 762332 task_exit.go:204] [ 1222: 1226] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.801167 762332 task_exit.go:204] [ 1222: 1222] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.801306 762332 task_exit.go:204] [ 1222: 1223] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.801382 762332 task_exit.go:204] [ 1222: 1223] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.801605 762332 task_exit.go:204] [ 1222: 1224] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:42.801698 762332 task_exit.go:204] [ 1222: 1225] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.801769 762332 task_exit.go:204] [ 1222: 1225] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.824696 762332 task_exit.go:204] [ 1222: 1224] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:42.824784 762332 task_exit.go:204] [ 1222: 1224] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.825010 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:42.825342 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:42.825523 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:42.825827 762332 task_exit.go:204] [ 1222: 1222] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:42.833563 762332 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.836210 762332 task_signals.go:481] [ 6: 13] No task notified of signal 23 D0713 00:00:42.854021 762332 syscalls.go:262] [ 1227: 1227] Allocating stack with size of 8388608 bytes D0713 00:00:42.858174 762332 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:42.858854 762332 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 00:00:42.865036 762332 usertrap_amd64.go:212] [ 1227: 1227] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:42.865257 762332 usertrap_amd64.go:106] [ 1227: 1227] Map a usertrap vma at 60000 D0713 00:00:42.867095 762332 usertrap_amd64.go:122] [ 1227: 1227] Allocate a new trap: 0xc002388690 1 D0713 00:00:42.867514 762332 usertrap_amd64.go:225] [ 1227: 1227] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:42.870899 762332 usertrap_amd64.go:212] [ 1227: 1227] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:42.871004 762332 usertrap_amd64.go:122] [ 1227: 1227] Allocate a new trap: 0xc002388690 2 D0713 00:00:42.871182 762332 usertrap_amd64.go:225] [ 1227: 1227] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:42.874465 762332 usertrap_amd64.go:212] [ 1227: 1227] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:42.874548 762332 usertrap_amd64.go:122] [ 1227: 1227] Allocate a new trap: 0xc002388690 3 D0713 00:00:42.874764 762332 usertrap_amd64.go:225] [ 1227: 1227] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:42.906189 762332 usertrap_amd64.go:212] [ 1227: 1227] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:42.906275 762332 usertrap_amd64.go:122] [ 1227: 1227] Allocate a new trap: 0xc002388690 4 D0713 00:00:42.906420 762332 usertrap_amd64.go:225] [ 1227: 1227] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:42.909383 762332 usertrap_amd64.go:212] [ 1227: 1227] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:42.909488 762332 usertrap_amd64.go:122] [ 1227: 1227] Allocate a new trap: 0xc002388690 5 D0713 00:00:42.909651 762332 usertrap_amd64.go:225] [ 1227: 1227] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:42.910005 762332 usertrap_amd64.go:212] [ 1227: 1227] Found the pattern at ip 46b214:sysno 13 D0713 00:00:42.910044 762332 usertrap_amd64.go:122] [ 1227: 1227] Allocate a new trap: 0xc002388690 6 D0713 00:00:42.910177 762332 usertrap_amd64.go:225] [ 1227: 1227] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:42.939453 762332 usertrap_amd64.go:212] [ 1227: 1227] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:42.939555 762332 usertrap_amd64.go:122] [ 1227: 1227] Allocate a new trap: 0xc002388690 7 D0713 00:00:42.939720 762332 usertrap_amd64.go:225] [ 1227: 1227] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:42.941586 762332 usertrap_amd64.go:212] [ 1227: 1228] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:42.941707 762332 usertrap_amd64.go:122] [ 1227: 1228] Allocate a new trap: 0xc002388690 8 D0713 00:00:42.941982 762332 usertrap_amd64.go:225] [ 1227: 1228] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:42.944788 762332 usertrap_amd64.go:212] [ 1227: 1228] Found the pattern at ip 46af76:sysno 35 D0713 00:00:42.944879 762332 usertrap_amd64.go:122] [ 1227: 1228] Allocate a new trap: 0xc002388690 9 D0713 00:00:42.945160 762332 usertrap_amd64.go:225] [ 1227: 1228] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:42.947430 762332 usertrap_amd64.go:212] [ 1227: 1227] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:42.947528 762332 usertrap_amd64.go:122] [ 1227: 1227] Allocate a new trap: 0xc002388690 10 D0713 00:00:42.947744 762332 usertrap_amd64.go:225] [ 1227: 1227] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:42.950773 762332 usertrap_amd64.go:212] [ 1227: 1228] Found the pattern at ip 46b020:sysno 39 D0713 00:00:42.950891 762332 usertrap_amd64.go:122] [ 1227: 1228] Allocate a new trap: 0xc002388690 11 D0713 00:00:42.951661 762332 usertrap_amd64.go:225] [ 1227: 1228] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:42.952294 762332 usertrap_amd64.go:212] [ 1227: 1228] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:42.952369 762332 usertrap_amd64.go:122] [ 1227: 1228] Allocate a new trap: 0xc002388690 12 D0713 00:00:42.953323 762332 usertrap_amd64.go:225] [ 1227: 1228] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:42.954161 762332 task_signals.go:470] [ 1227: 1227] Notified of signal 23 D0713 00:00:42.954432 762332 task_signals.go:220] [ 1227: 1227] Signal 23: delivering to handler D0713 00:00:42.965718 762332 task_signals.go:470] [ 1227: 1227] Notified of signal 23 D0713 00:00:42.966056 762332 task_signals.go:220] [ 1227: 1227] Signal 23: delivering to handler D0713 00:00:42.967260 762332 task_signals.go:470] [ 1227: 1227] Notified of signal 23 D0713 00:00:42.967476 762332 task_signals.go:220] [ 1227: 1227] Signal 23: delivering to handler D0713 00:00:42.975220 762332 usertrap_amd64.go:212] [ 1227: 1227] Found the pattern at ip 46af29:sysno 293 D0713 00:00:42.975313 762332 usertrap_amd64.go:122] [ 1227: 1227] Allocate a new trap: 0xc002388690 13 D0713 00:00:42.975486 762332 usertrap_amd64.go:225] [ 1227: 1227] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:42.980585 762332 task_signals.go:470] [ 1227: 1227] Notified of signal 23 D0713 00:00:42.980805 762332 task_signals.go:220] [ 1227: 1227] Signal 23: delivering to handler D0713 00:00:42.995616 762332 task_signals.go:470] [ 1227: 1227] Notified of signal 23 D0713 00:00:42.995895 762332 task_signals.go:220] [ 1227: 1227] Signal 23: delivering to handler D0713 00:00:43.000206 762332 usertrap_amd64.go:212] [ 1227: 1227] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:43.000273 762332 usertrap_amd64.go:122] [ 1227: 1227] Allocate a new trap: 0xc002388690 14 D0713 00:00:43.000405 762332 usertrap_amd64.go:225] [ 1227: 1227] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:43.000756 762332 task_exit.go:204] [ 1227: 1227] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.001031 762332 task_signals.go:204] [ 1227: 1231] Signal 1227, PID: 1231, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.001194 762332 task_signals.go:204] [ 1227: 1229] Signal 1227, PID: 1229, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.001246 762332 task_signals.go:204] [ 1227: 1230] Signal 1227, PID: 1230, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.001286 762332 task_exit.go:204] [ 1227: 1231] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.001579 762332 task_signals.go:204] [ 1227: 1228] Signal 1227, PID: 1228, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.001743 762332 task_exit.go:204] [ 1227: 1230] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.002082 762332 task_exit.go:204] [ 1227: 1231] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.002144 762332 task_exit.go:204] [ 1227: 1231] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.002421 762332 task_exit.go:204] [ 1227: 1229] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.002580 762332 task_exit.go:204] [ 1227: 1228] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.003000 762332 task_exit.go:204] [ 1227: 1227] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.003350 762332 task_exit.go:204] [ 1227: 1228] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.003404 762332 task_exit.go:204] [ 1227: 1228] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.003548 762332 task_exit.go:204] [ 1227: 1230] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.003643 762332 task_exit.go:204] [ 1227: 1230] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.025662 762332 task_exit.go:204] [ 1227: 1229] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.025767 762332 task_exit.go:204] [ 1227: 1229] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.025990 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:43.026299 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:43.026392 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:43.026485 762332 task_exit.go:204] [ 1227: 1227] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.033752 762332 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.036875 762332 task_signals.go:481] [ 6: 13] No task notified of signal 23 D0713 00:00:43.056673 762332 syscalls.go:262] [ 1232: 1232] Allocating stack with size of 8388608 bytes D0713 00:00:43.059798 762332 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.060285 762332 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 00:00:43.066363 762332 usertrap_amd64.go:212] [ 1232: 1232] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:43.066561 762332 usertrap_amd64.go:106] [ 1232: 1232] Map a usertrap vma at 67000 D0713 00:00:43.067682 762332 usertrap_amd64.go:122] [ 1232: 1232] Allocate a new trap: 0xc002388930 1 D0713 00:00:43.068118 762332 usertrap_amd64.go:225] [ 1232: 1232] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 00:00:43.070543 762332 usertrap_amd64.go:212] [ 1232: 1232] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:43.070612 762332 usertrap_amd64.go:122] [ 1232: 1232] Allocate a new trap: 0xc002388930 2 D0713 00:00:43.070839 762332 usertrap_amd64.go:225] [ 1232: 1232] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 00:00:43.075958 762332 usertrap_amd64.go:212] [ 1232: 1232] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:43.076025 762332 usertrap_amd64.go:122] [ 1232: 1232] Allocate a new trap: 0xc002388930 3 D0713 00:00:43.076225 762332 usertrap_amd64.go:225] [ 1232: 1232] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 00:00:43.099065 762332 usertrap_amd64.go:212] [ 1232: 1232] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:43.099168 762332 usertrap_amd64.go:122] [ 1232: 1232] Allocate a new trap: 0xc002388930 4 D0713 00:00:43.099381 762332 usertrap_amd64.go:225] [ 1232: 1232] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 00:00:43.102481 762332 usertrap_amd64.go:212] [ 1232: 1232] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:43.102541 762332 usertrap_amd64.go:122] [ 1232: 1232] Allocate a new trap: 0xc002388930 5 D0713 00:00:43.102680 762332 usertrap_amd64.go:225] [ 1232: 1232] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 00:00:43.103063 762332 usertrap_amd64.go:212] [ 1232: 1232] Found the pattern at ip 46b214:sysno 13 D0713 00:00:43.103128 762332 usertrap_amd64.go:122] [ 1232: 1232] Allocate a new trap: 0xc002388930 6 D0713 00:00:43.103247 762332 usertrap_amd64.go:225] [ 1232: 1232] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 00:00:43.125601 762332 usertrap_amd64.go:212] [ 1232: 1232] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:43.125694 762332 usertrap_amd64.go:122] [ 1232: 1232] Allocate a new trap: 0xc002388930 7 D0713 00:00:43.125850 762332 usertrap_amd64.go:225] [ 1232: 1232] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 00:00:43.127719 762332 usertrap_amd64.go:212] [ 1232: 1233] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:43.127859 762332 usertrap_amd64.go:122] [ 1232: 1233] Allocate a new trap: 0xc002388930 8 D0713 00:00:43.128090 762332 usertrap_amd64.go:225] [ 1232: 1233] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 00:00:43.130778 762332 usertrap_amd64.go:212] [ 1232: 1233] Found the pattern at ip 46af76:sysno 35 D0713 00:00:43.130922 762332 usertrap_amd64.go:122] [ 1232: 1233] Allocate a new trap: 0xc002388930 9 D0713 00:00:43.131205 762332 usertrap_amd64.go:225] [ 1232: 1233] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 00:00:43.132768 762332 usertrap_amd64.go:212] [ 1232: 1232] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:43.132852 762332 usertrap_amd64.go:122] [ 1232: 1232] Allocate a new trap: 0xc002388930 10 D0713 00:00:43.133115 762332 usertrap_amd64.go:225] [ 1232: 1232] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 00:00:43.145452 762332 usertrap_amd64.go:212] [ 1232: 1233] Found the pattern at ip 46b020:sysno 39 D0713 00:00:43.145546 762332 usertrap_amd64.go:122] [ 1232: 1233] Allocate a new trap: 0xc002388930 11 D0713 00:00:43.145771 762332 usertrap_amd64.go:225] [ 1232: 1233] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 00:00:43.146289 762332 usertrap_amd64.go:212] [ 1232: 1233] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:43.146369 762332 usertrap_amd64.go:122] [ 1232: 1233] Allocate a new trap: 0xc002388930 12 D0713 00:00:43.146615 762332 usertrap_amd64.go:225] [ 1232: 1233] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 00:00:43.147869 762332 task_signals.go:470] [ 1232: 1232] Notified of signal 23 D0713 00:00:43.148074 762332 task_signals.go:220] [ 1232: 1232] Signal 23: delivering to handler D0713 00:00:43.158681 762332 usertrap_amd64.go:212] [ 1232: 1232] Found the pattern at ip 46af29:sysno 293 D0713 00:00:43.158769 762332 task_signals.go:470] [ 1232: 1232] Notified of signal 23 D0713 00:00:43.158769 762332 usertrap_amd64.go:122] [ 1232: 1232] Allocate a new trap: 0xc002388930 13 D0713 00:00:43.159182 762332 usertrap_amd64.go:225] [ 1232: 1232] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 00:00:43.159688 762332 task_signals.go:220] [ 1232: 1232] Signal 23: delivering to handler D0713 00:00:43.161315 762332 task_signals.go:470] [ 1232: 1232] Notified of signal 23 D0713 00:00:43.162095 762332 task_signals.go:220] [ 1232: 1232] Signal 23: delivering to handler D0713 00:00:43.186261 762332 task_signals.go:470] [ 1232: 1232] Notified of signal 23 D0713 00:00:43.186564 762332 task_signals.go:220] [ 1232: 1232] Signal 23: delivering to handler D0713 00:00:43.192105 762332 usertrap_amd64.go:212] [ 1232: 1232] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:43.192228 762332 usertrap_amd64.go:122] [ 1232: 1232] Allocate a new trap: 0xc002388930 14 D0713 00:00:43.192495 762332 usertrap_amd64.go:225] [ 1232: 1232] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 00:00:43.193283 762332 task_exit.go:204] [ 1232: 1232] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.193809 762332 task_signals.go:204] [ 1232: 1235] Signal 1232, PID: 1235, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.194007 762332 task_signals.go:204] [ 1232: 1236] Signal 1232, PID: 1236, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.194041 762332 task_exit.go:204] [ 1232: 1235] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.194471 762332 task_signals.go:204] [ 1232: 1233] Signal 1232, PID: 1233, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.194827 762332 task_exit.go:204] [ 1232: 1233] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.195107 762332 task_signals.go:204] [ 1232: 1234] Signal 1232, PID: 1234, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.195372 762332 task_exit.go:204] [ 1232: 1233] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.195452 762332 task_exit.go:204] [ 1232: 1233] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.195645 762332 task_exit.go:204] [ 1232: 1235] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.195703 762332 task_exit.go:204] [ 1232: 1235] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.195933 762332 task_exit.go:204] [ 1232: 1232] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.196048 762332 task_exit.go:204] [ 1232: 1236] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.196397 762332 task_exit.go:204] [ 1232: 1236] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.196449 762332 task_exit.go:204] [ 1232: 1236] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.196625 762332 task_exit.go:204] [ 1232: 1234] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.221415 762332 task_exit.go:204] [ 1232: 1234] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.221498 762332 task_exit.go:204] [ 1232: 1234] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.221680 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:43.222095 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:43.222162 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:43.222828 762332 task_exit.go:204] [ 1232: 1232] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.231215 762332 task_stop.go:118] [ 6: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.233294 762332 task_signals.go:481] [ 6: 13] No task notified of signal 23 D0713 00:00:43.253430 762332 syscalls.go:262] [ 1237: 1237] Allocating stack with size of 8388608 bytes D0713 00:00:43.257066 762332 task_stop.go:138] [ 6: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.257945 762332 task_signals.go:220] [ 6: 13] Signal 23: delivering to handler D0713 00:00:43.263035 762332 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:43.263240 762332 usertrap_amd64.go:106] [ 1237: 1237] Map a usertrap vma at 60000 D0713 00:00:43.264460 762332 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000d59620 1 D0713 00:00:43.265053 762332 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 00:00:43.271327 762332 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:43.271403 762332 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000d59620 2 D0713 00:00:43.271598 762332 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 00:00:43.275581 762332 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:43.275669 762332 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000d59620 3 D0713 00:00:43.275866 762332 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 00:00:43.297596 762332 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:43.297688 762332 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000d59620 4 D0713 00:00:43.297952 762332 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 00:00:43.300683 762332 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:43.300750 762332 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000d59620 5 D0713 00:00:43.300894 762332 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 00:00:43.301317 762332 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46b214:sysno 13 D0713 00:00:43.301381 762332 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000d59620 6 D0713 00:00:43.301500 762332 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 00:00:43.327335 762332 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:43.327497 762332 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000d59620 7 D0713 00:00:43.327686 762332 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 00:00:43.329830 762332 usertrap_amd64.go:212] [ 1237: 1238] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:43.329955 762332 usertrap_amd64.go:122] [ 1237: 1238] Allocate a new trap: 0xc000d59620 8 D0713 00:00:43.330162 762332 usertrap_amd64.go:225] [ 1237: 1238] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 00:00:43.331733 762332 usertrap_amd64.go:212] [ 1237: 1238] Found the pattern at ip 46af76:sysno 35 D0713 00:00:43.331795 762332 usertrap_amd64.go:122] [ 1237: 1238] Allocate a new trap: 0xc000d59620 9 D0713 00:00:43.332033 762332 usertrap_amd64.go:225] [ 1237: 1238] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 00:00:43.334056 762332 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:43.334176 762332 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000d59620 10 D0713 00:00:43.334424 762332 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 00:00:43.346702 762332 usertrap_amd64.go:212] [ 1237: 1238] Found the pattern at ip 46b020:sysno 39 D0713 00:00:43.346846 762332 usertrap_amd64.go:122] [ 1237: 1238] Allocate a new trap: 0xc000d59620 11 D0713 00:00:43.347069 762332 usertrap_amd64.go:225] [ 1237: 1238] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 00:00:43.348179 762332 usertrap_amd64.go:212] [ 1237: 1238] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:43.348242 762332 usertrap_amd64.go:122] [ 1237: 1238] Allocate a new trap: 0xc000d59620 12 D0713 00:00:43.349142 762332 usertrap_amd64.go:225] [ 1237: 1238] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 00:00:43.349755 762332 task_signals.go:470] [ 1237: 1237] Notified of signal 23 D0713 00:00:43.350083 762332 task_signals.go:220] [ 1237: 1237] Signal 23: delivering to handler D0713 00:00:43.357785 762332 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46af29:sysno 293 D0713 00:00:43.357868 762332 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000d59620 13 D0713 00:00:43.358006 762332 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 00:00:43.364652 762332 task_signals.go:470] [ 1237: 1237] Notified of signal 23 D0713 00:00:43.366084 762332 task_signals.go:220] [ 1237: 1237] Signal 23: delivering to handler I0713 00:00:43.368654 762332 watchdog.go:295] Watchdog starting loop, tasks: 23, discount: 0s D0713 00:00:43.383581 762332 usertrap_amd64.go:212] [ 1237: 1237] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:43.383682 762332 usertrap_amd64.go:122] [ 1237: 1237] Allocate a new trap: 0xc000d59620 14 D0713 00:00:43.383901 762332 usertrap_amd64.go:225] [ 1237: 1237] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 00:00:43.384380 762332 task_exit.go:204] [ 1237: 1237] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.384733 762332 task_signals.go:204] [ 1237: 1238] Signal 1237, PID: 1238, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.385048 762332 task_signals.go:204] [ 1237: 1241] Signal 1237, PID: 1241, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.385212 762332 task_signals.go:204] [ 1237: 1239] Signal 1237, PID: 1239, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.385310 762332 task_exit.go:204] [ 1237: 1238] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.385544 762332 task_signals.go:204] [ 1237: 1240] Signal 1237, PID: 1240, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.385655 762332 task_exit.go:204] [ 1237: 1239] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.385940 762332 task_exit.go:204] [ 1237: 1237] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.386173 762332 task_exit.go:204] [ 1237: 1241] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.386521 762332 task_exit.go:204] [ 1237: 1240] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.387482 762332 task_exit.go:204] [ 1237: 1241] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.387557 762332 task_exit.go:204] [ 1237: 1241] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.387787 762332 task_exit.go:204] [ 1237: 1238] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.387852 762332 task_exit.go:204] [ 1237: 1238] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.388015 762332 task_exit.go:204] [ 1237: 1239] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.388074 762332 task_exit.go:204] [ 1237: 1239] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.410418 762332 task_exit.go:204] [ 1237: 1240] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.410507 762332 task_exit.go:204] [ 1237: 1240] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.410831 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:43.411332 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:43.411479 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:43.413779 762332 task_exit.go:204] [ 1237: 1237] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.420559 762332 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.423716 762332 task_signals.go:481] [ 6: 10] No task notified of signal 23 D0713 00:00:43.442408 762332 syscalls.go:262] [ 1242: 1242] Allocating stack with size of 8388608 bytes D0713 00:00:43.446300 762332 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.446743 762332 task_signals.go:220] [ 6: 10] Signal 23: delivering to handler D0713 00:00:43.453820 762332 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:43.454006 762332 usertrap_amd64.go:106] [ 1242: 1242] Map a usertrap vma at 68000 D0713 00:00:43.454823 762332 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc002389080 1 D0713 00:00:43.455185 762332 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 00:00:43.457508 762332 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:43.457573 762332 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc002389080 2 D0713 00:00:43.457773 762332 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 00:00:43.462157 762332 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:43.462235 762332 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc002389080 3 D0713 00:00:43.462381 762332 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 00:00:43.488212 762332 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:43.488295 762332 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc002389080 4 D0713 00:00:43.488455 762332 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 00:00:43.491194 762332 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:43.491248 762332 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc002389080 5 D0713 00:00:43.491363 762332 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 00:00:43.491738 762332 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46b214:sysno 13 D0713 00:00:43.491812 762332 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc002389080 6 D0713 00:00:43.491961 762332 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 00:00:43.513128 762332 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:43.513211 762332 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc002389080 7 D0713 00:00:43.513412 762332 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 00:00:43.514881 762332 usertrap_amd64.go:212] [ 1242: 1243] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:43.514986 762332 usertrap_amd64.go:122] [ 1242: 1243] Allocate a new trap: 0xc002389080 8 D0713 00:00:43.515180 762332 usertrap_amd64.go:225] [ 1242: 1243] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 00:00:43.518051 762332 usertrap_amd64.go:212] [ 1242: 1243] Found the pattern at ip 46af76:sysno 35 D0713 00:00:43.518116 762332 usertrap_amd64.go:122] [ 1242: 1243] Allocate a new trap: 0xc002389080 9 D0713 00:00:43.518271 762332 usertrap_amd64.go:225] [ 1242: 1243] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 00:00:43.518604 762332 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:43.518682 762332 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc002389080 10 D0713 00:00:43.518871 762332 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 00:00:43.532803 762332 usertrap_amd64.go:212] [ 1242: 1243] Found the pattern at ip 46b020:sysno 39 D0713 00:00:43.532906 762332 usertrap_amd64.go:122] [ 1242: 1243] Allocate a new trap: 0xc002389080 11 D0713 00:00:43.533143 762332 usertrap_amd64.go:225] [ 1242: 1243] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 00:00:43.535428 762332 usertrap_amd64.go:212] [ 1242: 1243] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:43.535505 762332 usertrap_amd64.go:122] [ 1242: 1243] Allocate a new trap: 0xc002389080 12 D0713 00:00:43.535664 762332 usertrap_amd64.go:225] [ 1242: 1243] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 00:00:43.536133 762332 task_signals.go:470] [ 1242: 1242] Notified of signal 23 D0713 00:00:43.536383 762332 task_signals.go:220] [ 1242: 1242] Signal 23: delivering to handler D0713 00:00:43.544209 762332 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46af29:sysno 293 D0713 00:00:43.544300 762332 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc002389080 13 D0713 00:00:43.544516 762332 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 00:00:43.551863 762332 task_signals.go:470] [ 1242: 1242] Notified of signal 23 D0713 00:00:43.552218 762332 task_signals.go:220] [ 1242: 1242] Signal 23: delivering to handler D0713 00:00:43.573697 762332 usertrap_amd64.go:212] [ 1242: 1242] Found the pattern at ip 46ae44:sysno 231 D0713 00:00:43.573813 762332 usertrap_amd64.go:122] [ 1242: 1242] Allocate a new trap: 0xc002389080 14 D0713 00:00:43.574026 762332 usertrap_amd64.go:225] [ 1242: 1242] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 00:00:43.574499 762332 task_exit.go:204] [ 1242: 1242] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.574928 762332 task_signals.go:204] [ 1242: 1244] Signal 1242, PID: 1244, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.575067 762332 task_signals.go:204] [ 1242: 1243] Signal 1242, PID: 1243, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.575264 762332 task_signals.go:204] [ 1242: 1245] Signal 1242, PID: 1245, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.575274 762332 task_signals.go:204] [ 1242: 1246] Signal 1242, PID: 1246, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.575326 762332 task_exit.go:204] [ 1242: 1243] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.575704 762332 task_signals.go:204] [ 1242: 1247] Signal 1242, PID: 1247, TID: 0, fault addr: 0x9: terminating thread group D0713 00:00:43.575981 762332 task_exit.go:204] [ 1242: 1246] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.576340 762332 task_exit.go:204] [ 1242: 1245] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.576601 762332 task_exit.go:204] [ 1242: 1247] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.576915 762332 task_exit.go:204] [ 1242: 1242] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.577389 762332 task_exit.go:204] [ 1242: 1244] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 00:00:43.578209 762332 task_exit.go:204] [ 1242: 1247] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.578295 762332 task_exit.go:204] [ 1242: 1247] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.578690 762332 task_exit.go:204] [ 1242: 1245] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.578746 762332 task_exit.go:204] [ 1242: 1245] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.578917 762332 task_exit.go:204] [ 1242: 1243] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.578974 762332 task_exit.go:204] [ 1242: 1243] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.579166 762332 task_exit.go:204] [ 1242: 1246] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.579216 762332 task_exit.go:204] [ 1242: 1246] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.599424 762332 task_exit.go:204] [ 1242: 1244] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 00:00:43.599512 762332 task_exit.go:204] [ 1242: 1244] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.599761 762332 task_signals.go:470] [ 6: 6] Notified of signal 17 D0713 00:00:43.600184 762332 task_signals.go:179] [ 6: 6] Restarting syscall 202: interrupted by signal 17 D0713 00:00:43.600242 762332 task_signals.go:220] [ 6: 6] Signal 17: delivering to handler D0713 00:00:43.600504 762332 task_exit.go:204] [ 1242: 1242] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 00:00:43.609501 762332 task_stop.go:118] [ 6: 10] Entering internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.611794 762332 task_signals.go:481] [ 6: 10] No task notified of signal 23 D0713 00:00:43.630464 762332 syscalls.go:262] [ 1248: 1248] Allocating stack with size of 8388608 bytes D0713 00:00:43.633300 762332 task_stop.go:138] [ 6: 10] Leaving internal stop (*kernel.vforkStop)(nil) D0713 00:00:43.633931 762332 task_signals.go:220] [ 6: 10] Signal 23: delivering to handler D0713 00:00:43.638799 762332 usertrap_amd64.go:212] [ 1248: 1248] Found the pattern at ip 46b70f:sysno 204 D0713 00:00:43.638926 762332 usertrap_amd64.go:106] [ 1248: 1248] Map a usertrap vma at 63000 D0713 00:00:43.639752 762332 usertrap_amd64.go:122] [ 1248: 1248] Allocate a new trap: 0xc000f2f080 1 D0713 00:00:43.640096 762332 usertrap_amd64.go:225] [ 1248: 1248] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 00:00:43.642144 762332 usertrap_amd64.go:212] [ 1248: 1248] Found the pattern at ip 46ae93:sysno 257 D0713 00:00:43.642206 762332 usertrap_amd64.go:122] [ 1248: 1248] Allocate a new trap: 0xc000f2f080 2 D0713 00:00:43.642326 762332 usertrap_amd64.go:225] [ 1248: 1248] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 00:00:43.645184 762332 usertrap_amd64.go:212] [ 1248: 1248] Found the pattern at ip 46b41d:sysno 9 D0713 00:00:43.645269 762332 usertrap_amd64.go:122] [ 1248: 1248] Allocate a new trap: 0xc000f2f080 3 D0713 00:00:43.645420 762332 usertrap_amd64.go:225] [ 1248: 1248] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 00:00:43.665511 762332 usertrap_amd64.go:212] [ 1248: 1248] Found the pattern at ip 46b1d3:sysno 14 D0713 00:00:43.665598 762332 usertrap_amd64.go:122] [ 1248: 1248] Allocate a new trap: 0xc000f2f080 4 D0713 00:00:43.665781 762332 usertrap_amd64.go:225] [ 1248: 1248] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 00:00:43.668456 762332 usertrap_amd64.go:212] [ 1248: 1248] Found the pattern at ip 46afa0:sysno 186 D0713 00:00:43.668547 762332 usertrap_amd64.go:122] [ 1248: 1248] Allocate a new trap: 0xc000f2f080 5 D0713 00:00:43.668695 762332 usertrap_amd64.go:225] [ 1248: 1248] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 00:00:43.669148 762332 usertrap_amd64.go:212] [ 1248: 1248] Found the pattern at ip 46b214:sysno 13 D0713 00:00:43.669201 762332 usertrap_amd64.go:122] [ 1248: 1248] Allocate a new trap: 0xc000f2f080 6 D0713 00:00:43.669316 762332 usertrap_amd64.go:225] [ 1248: 1248] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 00:00:43.689655 762332 usertrap_amd64.go:212] [ 1248: 1248] Found the pattern at ip 46b5eb:sysno 56 D0713 00:00:43.689727 762332 usertrap_amd64.go:122] [ 1248: 1248] Allocate a new trap: 0xc000f2f080 7 D0713 00:00:43.689869 762332 usertrap_amd64.go:225] [ 1248: 1248] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 00:00:43.691308 762332 usertrap_amd64.go:212] [ 1248: 1249] Found the pattern at ip 46b60c:sysno 186 D0713 00:00:43.691388 762332 usertrap_amd64.go:122] [ 1248: 1249] Allocate a new trap: 0xc000f2f080 8 D0713 00:00:43.691615 762332 usertrap_amd64.go:225] [ 1248: 1249] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 00:00:43.693216 762332 usertrap_amd64.go:212] [ 1248: 1249] Found the pattern at ip 46af76:sysno 35 D0713 00:00:43.693280 762332 usertrap_amd64.go:122] [ 1248: 1249] Allocate a new trap: 0xc000f2f080 9 D0713 00:00:43.693414 762332 usertrap_amd64.go:225] [ 1248: 1249] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 00:00:43.694406 762332 usertrap_amd64.go:212] [ 1248: 1248] Found the pattern at ip 46b57c:sysno 202 D0713 00:00:43.694515 762332 usertrap_amd64.go:122] [ 1248: 1248] Allocate a new trap: 0xc000f2f080 10 D0713 00:00:43.694764 762332 usertrap_amd64.go:225] [ 1248: 1248] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 00:00:43.708413 762332 usertrap_amd64.go:212] [ 1248: 1249] Found the pattern at ip 46b020:sysno 39 D0713 00:00:43.708482 762332 usertrap_amd64.go:122] [ 1248: 1249] Allocate a new trap: 0xc000f2f080 11 D0713 00:00:43.708640 762332 usertrap_amd64.go:225] [ 1248: 1249] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 00:00:43.711482 762332 usertrap_amd64.go:212] [ 1248: 1249] Found the pattern at ip 46b04f:sysno 234 D0713 00:00:43.711565 762332 usertrap_amd64.go:122] [ 1248: 1249] Allocate a new trap: 0xc000f2f080 12 D0713 00:00:43.711738 762332 usertrap_amd64.go:225] [ 1248: 1249] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 00:00:43.712241 762332 task_signals.go:470] [ 1248: 1248] Notified of signal 23 D0713 00:00:43.713665 762332 task_signals.go:220] [ 1248: 1248] Signal 23: delivering to handler D0713 00:00:43.716225 762332 usertrap_amd64.go:212] [ 1248: 1248] Found the pattern at ip 46af29:sysno 293 D0713 00:00:43.716336 762332 usertrap_amd64.go:122] [ 1248: 1248] Allocate a new trap: 0xc000f2f080 13 D0713 00:00:43.716522 762332 usertrap_amd64.go:225] [ 1248: 1248] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 00:00:43.725030 762332 task_signals.go:470] [ 1248: 1248] Notified of signal 23 D0713 00:00:43.725259 762332 task_signals.go:220] [ 1248: 1248] Signal 23: delivering to handler D0713 00:00:43.736071 762332 task_signals.go:309] [ 1248: 1248] failed to restore from a signal frame: bad address D0713 00:00:43.736367 762332 task_signals.go:470] [ 1248: 1248] Notified of signal 11 D0713 00:00:43.736561 762332 task_signals.go:220] [ 1248: 1248] Signal 11: delivering to handler W0713 00:00:43.832275 762469 util.go:64] FATAL ERROR: waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-race-cover-test-1": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 6: waiting on PID 6 in sandbox "ci-gvisor-systrap-1-race-cover-test-1": urpc method "containerManager.WaitPID" failed: EOF W0713 00:00:43.832628 762469 main.go:274] Failure to execute command, err: 1 D0713 00:00:43.846995 1 connection.go:127] sock read failed, closing connection: EOF W0713 00:00:43.847046 762306 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-race-cover-test-1" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. I0713 00:00:43.847263 1 gofer.go:319] All lisafs servers exited. I0713 00:00:43.847464 1 main.go:265] Exiting with status: 0 D0713 00:00:43.848093 762306 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-race-cover-test-1 D0713 00:00:43.848246 762306 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-race-cover-test-1 D0713 00:00:43.848321 762306 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-race-cover-test-1 D0713 00:00:43.848366 762306 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.848520 762306 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-race-cover-test-1, PID: 762330 D0713 00:00:43.856723 762306 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.856852 762306 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.857071 762306 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.857186 762306 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.857310 762306 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.857392 762306 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.857554 762306 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.857678 762306 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.857764 762306 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.857849 762306 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.857933 762306 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.858027 762306 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.858111 762306 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-race-cover-test-1" D0713 00:00:43.858200 762306 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-race-cover-test-1" I0713 00:00:43.858683 762306 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0713 00:00:44.112898 764127 main.go:230] *************************** I0713 00:00:44.113005 764127 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-cover-test-1] I0713 00:00:44.113109 764127 main.go:232] Version 0.0.0 I0713 00:00:44.113151 764127 main.go:233] GOOS: linux I0713 00:00:44.113210 764127 main.go:234] GOARCH: amd64 I0713 00:00:44.113249 764127 main.go:235] PID: 764127 I0713 00:00:44.113315 764127 main.go:236] UID: 0, GID: 0 I0713 00:00:44.113377 764127 main.go:237] Configuration: I0713 00:00:44.113423 764127 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root I0713 00:00:44.113481 764127 main.go:239] Platform: systrap I0713 00:00:44.113544 764127 main.go:240] FileAccess: shared I0713 00:00:44.113595 764127 main.go:241] Directfs: true I0713 00:00:44.113655 764127 main.go:242] Overlay: none I0713 00:00:44.113709 764127 main.go:243] Network: sandbox, logging: false I0713 00:00:44.113760 764127 main.go:244] Strace: false, max size: 1024, syscalls: I0713 00:00:44.113809 764127 main.go:245] IOURING: false I0713 00:00:44.113855 764127 main.go:246] Debug: true I0713 00:00:44.113900 764127 main.go:247] Systemd: false I0713 00:00:44.113947 764127 main.go:248] *************************** W0713 00:00:44.114016 764127 main.go:253] Block the TERM signal. This is only safe in tests! D0713 00:00:44.114142 764127 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-cover-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 00:00:44.114482 764127 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-cover-test-1": file does not exist loading container "ci-gvisor-systrap-1-race-cover-test-1": file does not exist W0713 00:00:44.114802 764127 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-cover-test-1"]: exit status 128 I0713 00:00:44.112898 764127 main.go:230] *************************** I0713 00:00:44.113005 764127 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-cover-test-1] I0713 00:00:44.113109 764127 main.go:232] Version 0.0.0 I0713 00:00:44.113151 764127 main.go:233] GOOS: linux I0713 00:00:44.113210 764127 main.go:234] GOARCH: amd64 I0713 00:00:44.113249 764127 main.go:235] PID: 764127 I0713 00:00:44.113315 764127 main.go:236] UID: 0, GID: 0 I0713 00:00:44.113377 764127 main.go:237] Configuration: I0713 00:00:44.113423 764127 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root I0713 00:00:44.113481 764127 main.go:239] Platform: systrap I0713 00:00:44.113544 764127 main.go:240] FileAccess: shared I0713 00:00:44.113595 764127 main.go:241] Directfs: true I0713 00:00:44.113655 764127 main.go:242] Overlay: none I0713 00:00:44.113709 764127 main.go:243] Network: sandbox, logging: false I0713 00:00:44.113760 764127 main.go:244] Strace: false, max size: 1024, syscalls: I0713 00:00:44.113809 764127 main.go:245] IOURING: false I0713 00:00:44.113855 764127 main.go:246] Debug: true I0713 00:00:44.113900 764127 main.go:247] Systemd: false I0713 00:00:44.113947 764127 main.go:248] *************************** W0713 00:00:44.114016 764127 main.go:253] Block the TERM signal. This is only safe in tests! D0713 00:00:44.114142 764127 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-cover-test-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 00:00:44.114482 764127 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-cover-test-1": file does not exist loading container "ci-gvisor-systrap-1-race-cover-test-1": file does not exist W0713 00:00:44.114802 764127 main.go:274] Failure to execute command, err: 1 [11530660.299243] exe[360483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.334869] exe[346201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.427124] exe[342702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.530670] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530660.552515] exe[342714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530664.410846] warn_bad_vsyscall: 191 callbacks suppressed [11530664.410850] exe[347076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.517388] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.614182] exe[343158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.693391] exe[346626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530664.880133] exe[342939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946062 di:ffffffffff600000 [11530665.104198] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.164041] exe[343334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.189874] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5f9f858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.263975] exe[342775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946097 di:ffffffffff600000 [11530665.325499] exe[343333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558da8ed839 cs:33 sp:7edbf5fc0858 ax:0 si:5558da946062 di:ffffffffff600000 [11531647.091724] warn_bad_vsyscall: 119 callbacks suppressed [11531647.091728] exe[342711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.193212] exe[342712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb069858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.268456] exe[342979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.288424] exe[342975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.308161] exe[342944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.334261] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.355824] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.376295] exe[342993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.396210] exe[342766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11531647.417266] exe[342763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2a4364839 cs:33 sp:7ebdfb048858 ax:0 si:55b2a43bd097 di:ffffffffff600000 [11532345.155341] warn_bad_vsyscall: 25 callbacks suppressed [11532345.155345] exe[382188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.269530] exe[382766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532345.386757] exe[382474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3aa20940a cs:33 sp:7fd533ad3ee8 ax:12 si:ffffffffff600000 di:55e3aa275ff2 [11532767.935456] exe[384598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.011945] exe[342758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11532768.091418] exe[363806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1c78b8839 cs:33 sp:7ef0583fe858 ax:0 si:55e1c7911062 di:ffffffffff600000 [11534667.144948] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.236329] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.267961] exe[403010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.372458] exe[398882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534667.408027] exe[400419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56421d08b40a cs:33 sp:7f7f18e97ee8 ax:12 si:ffffffffff600000 di:56421d0f7ff2 [11534894.914638] exe[383063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beadbee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.957554] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.977138] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534894.997745] exe[383054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.019118] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.038723] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.059007] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.079097] exe[391454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.098979] exe[386963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11534895.118890] exe[383053] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4fe441839 cs:33 sp:7ec1beabaee8 ax:0 si:20000040 di:ffffffffff600000 [11535893.406581] warn_bad_vsyscall: 25 callbacks suppressed [11535893.406585] exe[518174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.458729] exe[498396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.521164] exe[517163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11535893.575499] exe[517648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414b2f1839 cs:33 sp:7fc160c89858 ax:0 si:56414b34a062 di:ffffffffff600000 [11536070.313225] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.380260] exe[515339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.442300] exe[515436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536070.505325] exe[517933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a0129b2839 cs:33 sp:7ea015092858 ax:0 si:55a012a0b062 di:ffffffffff600000 [11536370.456183] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.586537] exe[514004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53fbc858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.694198] exe[527281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11536370.737448] exe[527170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a59fe0839 cs:33 sp:7f2f53ffe858 ax:0 si:563a5a039062 di:ffffffffff600000 [11537650.136338] exe[430654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537650.412774] exe[548543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11537651.379743] exe[544871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c47b8f1839 cs:33 sp:7f80727e2858 ax:0 si:55c47b94a097 di:ffffffffff600000 [11539350.089743] exe[592292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fee1a62839 cs:33 sp:7f3bb8f66858 ax:0 si:55fee1abb062 di:ffffffffff600000 [11539649.231607] exe[597310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.290920] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539649.347494] exe[596254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ebe40a cs:33 sp:7ecddb471ee8 ax:12 si:ffffffffff600000 di:557f13f2aff2 [11539977.040247] exe[600851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622cbba1839 cs:33 sp:7ef62f826858 ax:0 si:5622cbbfa070 di:ffffffffff600000 [11540511.026519] exe[600753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605abe9b839 cs:33 sp:7ea0b2c49858 ax:0 si:5605abef4062 di:ffffffffff600000 [11540577.627218] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.675057] exe[580995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb471858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11540577.720870] exe[580996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557f13ec2839 cs:33 sp:7ecddb450858 ax:0 si:557f13f1b062 di:ffffffffff600000 [11541137.236749] exe[631001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8df4a8839 cs:33 sp:7ec367e7b858 ax:0 si:55d8df501070 di:ffffffffff600000 [11541804.084586] exe[636938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.009172] exe[573192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11541807.193016] exe[624964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564219e3b839 cs:33 sp:7fdaaa6b7858 ax:0 si:564219e94062 di:ffffffffff600000 [11542822.267208] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.447533] exe[615762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.599315] exe[608247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff4c858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542822.654857] exe[608085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd050ce839 cs:33 sp:7fd79ff2b858 ax:0 si:55bd05127070 di:ffffffffff600000 [11542974.046947] exe[681952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11542975.617308] exe[681959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bdb6b73839 cs:33 sp:7ea1e721f858 ax:0 si:55bdb6bcc070 di:ffffffffff600000 [11543003.003275] exe[680745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f039ea839 cs:33 sp:7f52e9f8c858 ax:0 si:560f03a43070 di:ffffffffff600000 [11543004.857028] exe[674098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11543241.124326] exe[653510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543241.246077] exe[670164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543242.057149] exe[665681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fd2d93f839 cs:33 sp:7fc3e40f4858 ax:0 si:55fd2d998070 di:ffffffffff600000 [11543265.859323] exe[669905] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.014563] exe[673318] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.109923] exe[655556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.226266] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.340307] exe[666615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.438645] exe[653578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.550820] exe[653447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543266.639930] exe[668546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11543527.564952] exe[682036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85dfee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.843021] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.872086] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.901814] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.928287] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543527.960260] exe[697411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.001419] exe[686062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.037270] exe[686072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.072724] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11543528.101714] exe[684288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d859dee8 ax:0 si:20003b00 di:ffffffffff600000 [11544123.311129] warn_bad_vsyscall: 43 callbacks suppressed [11544123.311132] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.485832] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.545188] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544123.727586] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544124.057735] exe[696402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.305506] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.507382] exe[669629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544124.623230] exe[695057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.735692] exe[694132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544124.863236] exe[665545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544128.352152] warn_bad_vsyscall: 20 callbacks suppressed [11544128.352155] exe[671775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544128.511425] exe[696712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.375128] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.536371] exe[653165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.698008] exe[653586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544129.893888] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.031510] exe[696458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544130.130359] exe[673044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.235880] exe[668891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544130.352844] exe[672186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.353612] warn_bad_vsyscall: 24 callbacks suppressed [11544133.353615] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.473154] exe[668506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.609419] exe[668533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544133.901016] exe[696718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.174452] exe[666489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.475583] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.623602] exe[651414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.772637] exe[696477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.888566] exe[670834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544134.988750] exe[697893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544138.414937] warn_bad_vsyscall: 63 callbacks suppressed [11544138.414941] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.523964] exe[680995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.625852] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.629193] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.773793] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.889988] exe[671086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544138.995711] exe[656008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.279460] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.285732] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544139.852350] exe[702011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.530343] warn_bad_vsyscall: 21 callbacks suppressed [11544143.530346] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.650402] exe[651695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.841742] exe[691644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.870995] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.902268] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.948343] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544143.989607] exe[691663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.024048] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.054902] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544144.087224] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544148.632017] warn_bad_vsyscall: 172 callbacks suppressed [11544148.632020] exe[669150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.794259] exe[668957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.989109] exe[668900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544148.994476] exe[668888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.214390] exe[700441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.375421] exe[677325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544149.743745] exe[651266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.292722] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.474228] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544150.637207] exe[681023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544153.658144] warn_bad_vsyscall: 27 callbacks suppressed [11544153.658148] exe[653423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.777426] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.903906] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544153.947438] exe[668951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.109460] exe[660365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.158525] exe[653490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.258820] exe[651422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.391447] exe[669928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.603018] exe[653409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544154.651409] exe[653440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544158.817051] warn_bad_vsyscall: 88 callbacks suppressed [11544158.817054] exe[694623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.075950] exe[673647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.301459] exe[696410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.392503] exe[694615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db48858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544159.536699] exe[694622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.643218] exe[693490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.745653] exe[687494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544159.834437] exe[669163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544159.940422] exe[693510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544160.043187] exe[673283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.101141] warn_bad_vsyscall: 21 callbacks suppressed [11544164.101144] exe[668876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.241344] exe[673287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.416813] exe[696415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.572347] exe[653157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11544164.661162] exe[700444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.764040] exe[665928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.860384] exe[665956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544164.967054] exe[651351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.069729] exe[696446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544165.167820] exe[667801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.171621] warn_bad_vsyscall: 29 callbacks suppressed [11544169.171624] exe[666533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.209223] exe[694404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.345652] exe[694608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.449276] exe[666863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.579999] exe[652022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.628929] exe[681862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.748025] exe[694768] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544169.754710] exe[651361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77070 di:ffffffffff600000 [11544170.115853] exe[695045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544170.211267] exe[694614] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11544487.006009] warn_bad_vsyscall: 7 callbacks suppressed [11544487.006013] exe[698657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56475d423839 cs:33 sp:7f017362b858 ax:0 si:56475d47c070 di:ffffffffff600000 [11544487.270484] exe[700399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563181efe839 cs:33 sp:7ebe85da1858 ax:0 si:563181f57070 di:ffffffffff600000 [11544511.054844] exe[643613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55671700d839 cs:33 sp:7fda3ebc7858 ax:0 si:556717066070 di:ffffffffff600000 [11544534.538680] exe[711402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650b2e68839 cs:33 sp:7ed2418f9858 ax:0 si:5650b2ec1070 di:ffffffffff600000 [11544541.236335] exe[714082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec31b7839 cs:33 sp:7f29fcf9d858 ax:0 si:563ec3210070 di:ffffffffff600000 [11544549.596877] exe[709232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2a820b839 cs:33 sp:7f91d85df858 ax:0 si:55f2a8264070 di:ffffffffff600000 [11544550.342713] exe[712067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cd4032839 cs:33 sp:7fe3bd6b3858 ax:0 si:564cd408b070 di:ffffffffff600000 [11544636.437853] exe[540397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df21791839 cs:33 sp:7f199a286858 ax:0 si:55df217ea070 di:ffffffffff600000 [11544650.761105] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.648325] exe[680729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353ec858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.692536] exe[680687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544651.806399] exe[654057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea1e9f839 cs:33 sp:7f20353cb858 ax:0 si:560ea1ef8070 di:ffffffffff600000 [11544684.382904] exe[599414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f284d4839 cs:33 sp:7f961e482858 ax:0 si:556f2852d070 di:ffffffffff600000 [11544687.601444] exe[605347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557bb1bb839 cs:33 sp:7eccd13f5858 ax:0 si:5557bb214070 di:ffffffffff600000 [11545051.986254] exe[681960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4cbdf3839 cs:33 sp:7ec21f245858 ax:0 si:55f4cbe4c070 di:ffffffffff600000 [11545064.270053] exe[698660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b51fb0839 cs:33 sp:7f9c7caaf858 ax:0 si:560b52009070 di:ffffffffff600000 [11545068.988305] exe[688573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564928b3b839 cs:33 sp:7ff955622858 ax:0 si:564928b94070 di:ffffffffff600000 [11545109.002939] exe[700093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a5cc9b839 cs:33 sp:7fc8cf3fe858 ax:0 si:564a5ccf4070 di:ffffffffff600000 [11545257.023788] exe[699969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858858 ax:0 si:56468e7be070 di:ffffffffff600000 [11545310.043985] exe[730419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079858 ax:0 si:559d6ffcd070 di:ffffffffff600000 [11545747.024880] exe[668885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.207869] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.208393] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545747.369587] exe[698981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.086072] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.276578] exe[655585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.440844] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.661991] exe[651380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545751.864051] exe[691659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.032545] exe[669495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.180256] exe[668971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.327971] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.464233] exe[653467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.608138] exe[694611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.724053] exe[673305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545752.821867] exe[673278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545752.940728] exe[695059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.257832] exe[690707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545753.288251] exe[694599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.081142] warn_bad_vsyscall: 180 callbacks suppressed [11545757.081146] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.214468] exe[668950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545757.680818] exe[660360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545757.976248] exe[669152] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.152711] exe[673009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db06858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.411760] exe[666512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545758.527446] exe[666632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.650734] exe[670178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.653643] exe[696363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545758.792891] exe[666858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.314186] warn_bad_vsyscall: 20 callbacks suppressed [11545762.314189] exe[694609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.467684] exe[670066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.649946] exe[673641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545762.943504] exe[660379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.043408] exe[669128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.327908] exe[669526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.366578] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545763.522288] exe[669522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.352902] exe[696365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545764.927217] exe[668856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.329883] warn_bad_vsyscall: 19 callbacks suppressed [11545767.329886] exe[669289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.356567] exe[696345] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.513570] exe[697884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.562772] exe[670199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db69858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545767.711961] exe[669506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.846666] exe[673281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545767.887751] exe[673284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.020071] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.057366] exe[666647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77097 di:ffffffffff600000 [11545768.194079] exe[677299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b8ab1e839 cs:33 sp:7fc37db8a858 ax:0 si:564b8ab77062 di:ffffffffff600000 [11545895.545245] warn_bad_vsyscall: 20 callbacks suppressed [11545895.545249] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.697993] exe[720805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c858ee8 ax:0 si:200001c0 di:ffffffffff600000 [11545895.785536] exe[721585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56468e765839 cs:33 sp:7fea8c837ee8 ax:0 si:200001c0 di:ffffffffff600000 [11546263.751083] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.760352] exe[750487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cd5eee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546264.909919] exe[733995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5646af917839 cs:33 sp:7f279cde2ee8 ax:0 si:20004cc0 di:ffffffffff600000 [11546785.957834] exe[722877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546786.864503] exe[719747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11546787.823769] exe[718998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c8d2d839 cs:33 sp:7fbe04a65ee8 ax:0 si:2000bdc0 di:ffffffffff600000 [11547088.502200] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.547606] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547088.594335] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.508654] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.559999] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.608707] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.659695] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.718362] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.781423] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.831867] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.888097] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547099.977889] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547100.030632] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547104.513495] warn_bad_vsyscall: 291 callbacks suppressed [11547104.513499] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.539086] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.559309] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.578791] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.599547] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.620080] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.640504] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.659820] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.679561] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547104.700181] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547109.524219] warn_bad_vsyscall: 177 callbacks suppressed [11547109.524223] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.571444] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.623374] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.666991] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.687953] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.739406] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547109.781901] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.828639] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.849421] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547109.897272] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.703281] warn_bad_vsyscall: 176 callbacks suppressed [11547226.703285] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.750753] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547226.799595] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.236010] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.275452] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547256.317150] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.312120] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.354274] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547257.397972] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.426494] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.481647] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547261.534048] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547286.183628] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.224975] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.249969] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547286.292623] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547292.084095] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.127160] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547292.168264] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.584508] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.638463] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.658311] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.678417] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.699893] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.719994] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.740570] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.761543] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.782276] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547297.803395] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.755488] warn_bad_vsyscall: 32 callbacks suppressed [11547304.755491] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.820801] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547304.870285] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547305.231833] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.080890] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547306.932040] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.868022] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.927403] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547308.983135] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547309.035076] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.512279] warn_bad_vsyscall: 3 callbacks suppressed [11547312.512283] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.573549] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.593042] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.613765] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.634451] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.654831] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.674844] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.695789] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.716034] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547312.735650] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.072811] warn_bad_vsyscall: 25 callbacks suppressed [11547323.072814] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.126130] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.168909] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547323.169422] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.577119] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.618137] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547326.659742] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.430811] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.470418] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.471364] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.540794] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547330.575387] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.234296] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.287869] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547331.341084] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.150024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547333.197367] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.613691] warn_bad_vsyscall: 1 callbacks suppressed [11547359.613695] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.673012] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.722811] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547359.747468] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.889779] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.945222] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547370.980565] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547371.026574] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547381.799394] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.864307] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.906009] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547381.933118] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547384.896734] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547384.942724] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547385.004823] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547394.986983] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.029433] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547395.072479] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.899409] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.945764] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547400.998894] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547402.412281] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.457209] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.458646] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539688] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547402.539824] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547414.727517] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.524355] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.575392] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547415.624984] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.681183] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.722741] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.761925] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547432.879392] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.921135] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547432.960705] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.692664] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.746736] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547441.780646] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.157398] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.227524] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547455.267610] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.241019] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.314637] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.354549] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.400116] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.441352] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.461983] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547460.499263] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.711900] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.766945] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547468.815670] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.678890] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.727877] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.747719] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.767929] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.788113] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.807588] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547469.826881] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.107205] warn_bad_vsyscall: 63 callbacks suppressed [11547478.107208] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.164816] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547478.204636] exe[771207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.384520] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.441631] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.483337] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547497.658315] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547498.516799] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.368994] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.390429] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.411047] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.430939] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547499.452865] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.945209] warn_bad_vsyscall: 28 callbacks suppressed [11547504.945212] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547504.998022] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547505.038001] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.867524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.912298] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.955068] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547526.977045] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547536.142402] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.183582] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547536.217323] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.569508] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.614546] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547537.663836] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547538.951959] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.000244] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.081981] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547539.997217] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.887928] warn_bad_vsyscall: 69 callbacks suppressed [11547564.887932] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547564.979509] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.178943] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.229576] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547566.296841] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.055098] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.108833] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.156638] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547567.185291] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.306678] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.358066] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547576.406256] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.036059] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.086889] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.108968] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547579.156744] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.880353] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.931926] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.953668] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547582.989459] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.559099] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.600969] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.648685] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547584.670795] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.298350] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.336522] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547596.375194] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547619.302393] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.356222] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547619.395199] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547628.124097] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.175121] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.195646] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547628.242715] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.055190] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.102818] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547639.146651] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.408345] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.450251] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.489444] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547644.515277] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.494419] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.543322] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.564399] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547645.602948] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.605910] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.679150] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547657.726624] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547662.729392] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.772014] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547662.817232] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547666.997387] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.036554] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547667.076179] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.948193] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547671.996557] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.038514] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547672.039086] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547673.715197] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.774874] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.796267] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547673.836633] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547696.173266] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.232828] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.255864] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.294590] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.314254] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.335246] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.355631] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.376818] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.396933] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547696.417149] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.297493] warn_bad_vsyscall: 65 callbacks suppressed [11547715.297496] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.351733] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.396006] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547715.417741] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.369570] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.412168] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.433703] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547716.476531] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.185928] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.229580] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547726.267114] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.034535] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.079956] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.081096] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547731.142656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.827814] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.871810] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.895490] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.935407] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547743.937018] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.115105] exe[765131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.155340] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.179243] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547749.226345] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.556996] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.594141] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.641491] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.738092] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.785040] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.827300] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547770.849354] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.631390] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.672124] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.713813] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547778.715026] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.110481] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.167223] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.188945] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.209538] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.229116] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547779.248124] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547785.250849] warn_bad_vsyscall: 39 callbacks suppressed [11547785.250853] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.017175] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.058414] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547790.098809] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.452423] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.491354] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547795.530741] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.157406] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.405882] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547808.569025] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.689830] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.730995] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.770001] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547811.771515] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547812.197802] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.267933] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547812.268869] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11547813.941768] warn_bad_vsyscall: 5 callbacks suppressed [11547813.941772] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547813.985351] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.023826] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.283366] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.373377] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547814.430322] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.428583] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.479106] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547819.517226] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547821.217341] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.304135] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.358901] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.381326] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.403008] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547821.917629] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547822.010021] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.374491] warn_bad_vsyscall: 6 callbacks suppressed [11547838.374495] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.433268] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.487754] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547838.517159] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.542981] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.594031] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547839.633861] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547847.990984] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.047899] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.090172] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.278529] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.318322] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.357865] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.656438] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.696366] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547848.730899] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547851.240037] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.042222] warn_bad_vsyscall: 2 callbacks suppressed [11547866.042225] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.098981] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547866.161778] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.079020] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.130030] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547870.184976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.225662] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.268419] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547872.320362] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.047221] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.096888] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547877.137370] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.386318] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.432437] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547882.486510] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547884.683356] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.762816] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547884.813991] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.189876] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.254562] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547898.293397] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547903.407887] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.447383] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.470252] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547903.506155] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.721533] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.782550] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547905.820577] exe[752300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.096045] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.142337] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547908.161621] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547911.216020] warn_bad_vsyscall: 64 callbacks suppressed [11547911.216024] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.267332] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547911.307191] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547912.057581] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.095772] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.097086] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547912.157993] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547913.388972] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.423889] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547913.465344] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547924.521450] warn_bad_vsyscall: 5 callbacks suppressed [11547924.521454] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.577796] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.602125] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547924.641611] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.133391] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.194823] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.197273] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547929.263427] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.418619] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.475719] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547937.543133] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.125423] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.228337] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.688513] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.730652] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.766521] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11547944.807188] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.851432] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.871960] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547944.914064] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.259541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.337004] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.398917] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547955.978258] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.026688] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.029306] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547956.092103] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.100263] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.144346] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.174814] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547971.211169] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.832995] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.876208] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.898352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547976.934693] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.414771] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.456497] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547977.496767] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.291929] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.329604] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547978.369969] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.372328] warn_bad_vsyscall: 3 callbacks suppressed [11547989.372332] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.421337] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.465823] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547989.485942] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.841813] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.890432] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11547993.943125] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.261522] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.301370] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548002.342764] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.299293] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.345532] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548012.381167] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.818109] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.874942] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548015.929681] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548017.498804] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.546061] exe[755951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.589351] exe[755959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dff6ee8 ax:0 si:20000680 di:ffffffffff600000 [11548017.635935] exe[756718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fd625b839 cs:33 sp:7f3b7dfd5ee8 ax:0 si:20000680 di:ffffffffff600000 [11548019.396684] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.444824] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548019.480770] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.067924] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.105876] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548020.106597] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.730218] warn_bad_vsyscall: 5 callbacks suppressed [11548023.730221] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.775332] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548023.815656] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.219256] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.300235] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548043.347676] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.947538] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548044.999970] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.040895] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548045.069553] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.004537] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.049080] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.113890] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548055.137352] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548077.206282] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.251934] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.274716] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.295013] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.315325] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.336012] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.357843] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.377872] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.398283] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548077.418613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548097.528517] warn_bad_vsyscall: 57 callbacks suppressed [11548097.528521] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.576429] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.633295] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548097.634854] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.133965] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.176503] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.214588] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.215240] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.412752] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548098.462777] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548104.996660] warn_bad_vsyscall: 1 callbacks suppressed [11548104.996663] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548105.850076] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548106.696238] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.157724] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.208597] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548119.261372] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.343202] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.382779] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548122.426112] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.403368] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.452789] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548132.499910] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.417742] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548137.522190] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.936100] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548139.988256] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.016505] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548140.070003] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.445818] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.511715] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548150.553978] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.286390] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.334009] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548171.375931] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548175.546300] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.589700] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.629037] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548175.651488] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548179.585264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.631159] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.650585] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.670448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.691290] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.711967] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.732380] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.752068] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.772801] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548179.793448] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.872059] warn_bad_vsyscall: 61 callbacks suppressed [11548193.872063] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548193.952821] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.928684] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548201.996448] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548202.037007] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.156027] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.196959] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.219143] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.258912] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548205.281350] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.546657] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.589787] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548209.627425] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.699725] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.745535] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548233.788742] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.471018] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.514946] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.515574] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548237.585099] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.038187] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.079907] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548238.127070] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.182158] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.221914] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.242963] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548239.281592] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.367833] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.410279] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.431732] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548256.485658] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.287473] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.328228] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548260.378594] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.674482] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.723577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548269.769676] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.411340] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.454118] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548270.496501] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.637682] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.680537] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548277.717881] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.175744] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.244740] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548278.289491] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.347827] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.386962] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.432610] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.452510] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.472049] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.493392] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.514001] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.534326] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.555439] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548286.575831] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.591661] warn_bad_vsyscall: 28 callbacks suppressed [11548299.591664] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548299.716645] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.218082] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.333278] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.369844] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548303.445978] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.012030] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.078579] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.134946] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548306.388423] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.442059] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548306.509579] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.182613] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.228614] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.249852] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548308.270396] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.080494] warn_bad_vsyscall: 69 callbacks suppressed [11548311.080498] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.131994] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.183761] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548311.207733] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548326.195752] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.033861] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548327.883771] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.718811] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.764692] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548334.802193] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.003147] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.061042] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.083321] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548336.123123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.557059] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.614792] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548339.654451] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.900936] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548349.950630] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548350.007839] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.826680] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.880328] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548353.934074] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.272328] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.322197] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548369.361580] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.288522] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.327273] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548370.370594] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.489698] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.541048] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.609626] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548374.631505] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.250609] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.296008] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.297139] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.354078] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.375823] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.830961] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.909476] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548382.972469] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.174820] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548383.216089] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548391.283262] warn_bad_vsyscall: 1 callbacks suppressed [11548391.283264] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.329989] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548391.374640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548393.205978] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.255260] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548393.299080] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.344484] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.405320] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.464950] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548396.467363] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.255243] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.318628] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.319151] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.399578] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.401766] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548398.568699] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.919607] warn_bad_vsyscall: 3 callbacks suppressed [11548416.919610] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.966950] exe[743797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548416.989006] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548417.034408] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.811451] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.860253] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.886942] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548432.928112] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.778887] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.820893] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.842334] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880084] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548447.880903] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.508111] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.601445] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.602653] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.704447] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548455.705345] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.826999] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872284] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.872375] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548468.986065] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.258456] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.300258] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548470.349378] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548474.517614] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.564789] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.587128] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548474.638151] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548480.604311] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.644087] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.687806] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548480.689290] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548484.123787] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.180672] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548484.239780] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548493.278360] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328236] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.328600] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548493.390304] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.833382] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548508.961149] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548509.063948] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548520.613294] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.659518] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548520.708570] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548526.299866] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.339536] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.402244] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.425302] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.894709] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.938050] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548526.982622] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.450297] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.505520] exe[753802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.528534] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548534.568597] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548544.956800] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.013667] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.033643] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548545.085490] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548549.234345] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.282824] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548549.329949] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.534109] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.597324] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.621011] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548556.681465] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.886217] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.950142] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548565.998720] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.869926] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.934033] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548568.955035] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.014796] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548569.296125] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.353392] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548569.399746] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548570.911499] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.669130] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.735195] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548594.776546] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.660338] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.699761] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548595.746611] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.932572] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.972071] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548596.994399] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548597.034578] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.022991] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.090767] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.091012] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177700] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548602.177834] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.557153] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.606340] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.653245] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548619.686798] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.776155] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.819898] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548639.872777] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.809818] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.860562] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548645.902531] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.707415] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.760809] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.817281] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.837170] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.856971] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.880580] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.901934] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.921867] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.942728] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548653.963710] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.234572] warn_bad_vsyscall: 60 callbacks suppressed [11548659.234577] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.319640] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.375122] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548659.395917] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.877517] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.920825] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.942925] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548663.984794] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548666.639541] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.680685] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548666.721252] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548685.149430] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.193561] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.234314] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548685.259938] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.046303] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.090192] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.111864] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.155942] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548686.597615] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548686.643566] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.512636] warn_bad_vsyscall: 2 callbacks suppressed [11548693.512640] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.587898] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.622954] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.672410] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.860094] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.898007] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548693.935962] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.083950] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.139793] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548695.183343] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.433839] warn_bad_vsyscall: 4 callbacks suppressed [11548701.433843] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.486929] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548701.525603] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.154317] exe[752455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.196722] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.240576] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548702.261222] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.863192] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.911865] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548706.965656] exe[765374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.905248] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.941691] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548710.983975] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.279943] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.327248] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.389725] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548715.413266] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.107500] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.162576] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548735.212182] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.593451] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.640310] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548741.696914] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.087707] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548750.134560] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.378944] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.423937] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.443330] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.463024] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.482763] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.505914] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.525847] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.546368] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.567195] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548759.587657] exe[752394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.371230] warn_bad_vsyscall: 29 callbacks suppressed [11548765.371234] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.416207] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548765.456858] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.014315] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.053783] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548777.097156] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548783.841479] exe[752103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.890700] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548783.932657] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.698534] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.744861] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.765479] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.802565] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548803.823701] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548816.611166] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.660003] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548816.708264] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.616862] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.656506] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.686639] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548817.730645] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.103497] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.175520] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.217584] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548832.239654] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.380393] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419346] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.419914] exe[743930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.482312] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.504801] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548835.673651] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548838.107208] warn_bad_vsyscall: 69 callbacks suppressed [11548838.107211] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.166865] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.212798] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.234075] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.515015] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573192] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.573250] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.637396] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.856419] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548838.903599] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.043501] warn_bad_vsyscall: 3 callbacks suppressed [11548851.043505] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.091113] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.134490] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.651270] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.696335] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.749606] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.916650] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548851.958708] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548852.000342] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.093160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.147244] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.168810] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548868.275323] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.795133] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.856035] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.904442] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548871.933821] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.146784] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.215461] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548898.263431] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.250299] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.301702] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.322428] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.363670] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548906.387918] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.562614] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.605694] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.627575] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.667298] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.692069] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.739223] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.784533] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.785479] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548912.861757] exe[743802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548914.066544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11548920.546376] warn_bad_vsyscall: 3 callbacks suppressed [11548920.546380] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.598743] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.656217] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.789652] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.873526] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548920.930080] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.662584] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.704522] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548933.747412] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548941.905328] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.002937] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.026135] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.047304] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.070126] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.093651] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.118417] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.138954] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.161818] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548942.197908] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11548947.008863] warn_bad_vsyscall: 29 callbacks suppressed [11548947.008867] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.117286] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548947.212764] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.279648] exe[744406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.345439] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548951.439123] exe[743803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.226947] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.265920] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548960.306266] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.023857] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.083854] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.084666] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.162482] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.182136] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.202273] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.225957] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.248936] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.269819] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548975.291316] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.814852] warn_bad_vsyscall: 61 callbacks suppressed [11548984.814855] exe[743776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548984.924203] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11548999.981207] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.031437] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549000.075008] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.490779] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.548739] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.596976] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549002.622828] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549003.408072] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.450273] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549003.493544] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549011.127750] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.168732] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549011.204428] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.584759] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.637945] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.661027] exe[743943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.703124] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.880815] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.931172] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549012.980221] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.112241] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.159181] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.184471] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549017.234060] exe[743887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.289213] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.338880] exe[743944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549042.384608] exe[744875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.697534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.734874] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549051.790174] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.722197] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.769295] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549059.813981] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.670371] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.708511] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549063.749962] exe[743908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.269200] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.317692] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.341079] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549064.380507] exe[743941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.807867] warn_bad_vsyscall: 1 callbacks suppressed [11549067.807871] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.870608] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549067.908220] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.669345] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.711360] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549072.754534] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.604356] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.659869] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549088.706198] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549089.981820] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.040241] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.062834] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549090.120102] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549094.367870] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.417816] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549094.462962] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549096.771134] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.818012] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549096.868139] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549098.287705] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.335253] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.362160] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549098.411664] exe[812747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602597.777330] audit: type=1326 audit(1689206344.991:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602603.869164] audit: type=1326 audit(1689206351.083:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754999 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.285215] audit: type=1326 audit(1689206425.499:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=755000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.677713] audit: type=1326 audit(1689206425.891:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602696.843980] audit: type=1326 audit(1689206444.055:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=753602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000